摘要:
A storage device has a capability of learning access patterns by which a plurality of computers access to the device. The storage device stores a specific access history for each computer and causes a management computer to report a type of file access. This allows the storage device to save information in a cache memory before start of a file access to be executed by the computer.
摘要:
The system management server 10 makes a request to the virus detection and removal server 30 for virus detection processing on a specified primary volume of the storage system 20. The virus detection and removal server 30 executes virus detection processing on the requested primary volume and the secondary volume that forms the volume pair at the storage system 20. Even during virus detection processing on the storage system 20, it is possible for the centric PCs 40 and 42 to continue write and read processing on the requested primary volume.
摘要:
A diskless computer is allowed to finish a write request with no influence of a storage device and a network of the storage device. A node device 104 passes on information sent and received between a diskless computer 101 and a storage device 102. When information sent from the diskless computer 101 is a write request to the storage device 102, target data of the write request is cached, and a response to the write request is sent to a source diskless computer of the write request. The write request for the data having been cached is sent to a storage device into which the data is written, and a response to the write request is received from the storage device.
摘要:
A computer system includes: means for centrally managing user identification names and passwords that are assigned to users, target names of storage devices, addresses, and logical units; means for acquiring target names of storage devices and logical unit names from the user identification names and passwords; means for obtaining the addresses of the storage devices from the user identification names, passwords, and target names; and means for dynamically creating access control information of the logical units for each session in iSCSI session establishment processing.
摘要:
A management device selects a storage device having a plenty of unallocated storage regions, selects a target using a port having a small allocation quantity from the storage device targets, and allocates the target, an initiator, and a storage region. When the number of targets and the allocated storage regions prepared by the storage device is within a predetermined number, the storage device manages the storage device as an allocation candidate. When the predetermined number is exceeded, the exceeding one is excluded from the allocation candidate. When the number of storage devices excluded from the allocation candidate has reached a certain number, the management device manages a new storage device and a new storage region as an allocation candidate.
摘要:
In an environment where there is a possibility that the user connects from a plurality of blade PCs to the storage, the present invention prevents the data destruction by realizing the exclusive control of the storage device. The storage connection from a blade PC which was possible to connect until now is made to be impossible by that the management server newly generates and sets to the storage device the connection information between the storage device which the blade PC keeps. Further, by sending the newly generated connection information to the other blade PC the connection from that blade PC becomes possible.
摘要:
A computer system can always execute processing under the same environments not depending on the terminal device that is directly used by the user, no matter where the client used by the user is, and no matter what device is used. In the computer system, one of plural computer PCBAs that do not install a hard disk device therein is selected from the terminal device, remotely controllable environments are constituted, and data is read and written from the hard disk device which are coupled to all of the computer PCBAs over a network that is used by the user.
摘要:
To provide a technique whereby a user can carry out operations in the same operating environment, regardless of whether the user uses a computer inside a network system, or uses a terminal outside the network system. A network system comprises: a first computer used by a designated user; and a plurality of second computers capable of being shared by a plurality of users. A management device, if a storage device is utilized by the first computer, allows the first computer to connect to a designated storage area and execute the boot-up program stored therein. The management device, if the storage device is utilized by an external terminal used by the designated user, allows one designated computer selected from the plurality of second computers to connect to the designated storage area and execute the boot-up program, and allows the external terminal to connect to the designated computer.
摘要:
For a computer system that includes a storage system and a management computer, the storage system includes a first storage area, for storing data used by a computer connected to the storage system, and a second storage area, for storing a duplicate of the data included in the first storage area. The management computer includes first management information, for managing the frequency at which the data in the first storage area are copied. When the management computer receives a notification indicating the first storage area has been unmounted from another computer, the management computer employs the first management information for determining whether the data in the first storage area should be copied. Then, when the data should be copied, the first storage area is mounted on the computer and the data in the first storage area are copied to the second storage area.
摘要:
For a computer system that includes a storage system and a management computer, the storage system includes a first storage area, for storing data used by a computer connected to the storage system, and a second storage area, for storing a duplicate of the data included in the first storage area. The management computer includes first management information, for managing the frequency at which the data in the first storage area are copied. When the management computer receives a notification indicating the first storage area has been unmounted from another computer, the management computer employs the first management information for determining whether the data in the first storage area should be copied. Then, when the data should be copied, the first storage area is mounted on the computer and the data in the first storage area are copied to the second storage area.