摘要:
A computer-implemented method for efficient data storage is provided. A first storage medium associates data stored on one or more data storage media with a unique identification value (ID) for the purpose of determining de-duplication status of the data. In response to receiving a request to read the data from a logical address, the first storage medium retrieves the data from a second storage medium based on the unique ID. In response to receiving a request to write the data to a logical address, the one or more data storage media store at least one copy of the data based on the de-duplication status of the data.
摘要:
A computer-implemented method for efficient data storage is provided. A first storage medium associates data stored on one or more data storage media with a unique identification value (ID) for the purpose of determining de-duplication status of the data. In response to receiving a request to read the data from a logical address, the first storage medium retrieves the data from a second storage medium based on the unique ID. In response to receiving a request to write the data to a logical address, the one or more data storage media store at least one copy of the data based on the de-duplication status of the data.
摘要:
A method for modifying executable logic code stored on a computing system is provided. The method comprises assessing a risk level associated with modifying a first code block and assessing an urgency level associated with modifying the first code block and then evaluating whether the first code block should be modified.
摘要:
A method for re-establishing a backup relationship between first and second volumes associated with one or more storage media in a data storage system is provided. The method comprises storing first information for preserving the backup relationship, in response to or in advance of receiving a request to terminate the backup relationship; recording changes to the first or second volumes that occur subsequent to terminating the backup relationship; and re-establishing the backup relationship between the first and second volumes according to the first information such that the first and second volumes are synchronized by merging the recorded changes with the first or second volumes.
摘要:
A method for consistent version of multiple information items is provided. The method includes receiving a conditional request to copy a version of multiple information items at a condition fulfillment point of time that is associated with a fulfillment of a condition of the conditional request. Then determining that the condition is fulfilled, and participating in generating a condition fulfillment point in time version of the multiple information items.
摘要:
A method for re-establishing a backup relationship between first and second volumes associated with one or more storage media in a data storage system is provided. The method comprises storing first information for preserving the backup relationship, in response to or in advance of receiving a request to terminate the backup relationship; recording changes to the first or second volumes that occur subsequent to terminating the backup relationship; and re-establishing the backup relationship between the first and second volumes according to the first information such that the first and second volumes are synchronized by merging the recorded changes with the first or second volumes.
摘要:
A method for consistent version of multiple information items is provided. The method includes receiving a conditional request to copy a version of multiple information items at a condition fulfillment point of time that is associated with a fulfillment of a condition of the conditional request. Then determining that the condition is fulfilled, and participating in generating a condition fulfillment point in time version of the multiple information items.
摘要:
A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.
摘要:
A method for sending one or more telephone numbers between a first telephonic device and a second telephonic device while a telephone call is in progress comprises initiating a telephone call between a first telephonic device and a second telephonic device, entering a plurality of digits into a keypad of the first telephonic device to generate a plurality of dual-tone multi-frequency signals, measuring an elapsed time between the entry of each of the digits, comparing the elapsed time between the entry of each of the digits with a standard inter-digit time gap, determining a number of digit sequences entered based upon the comparison of the elapsed time between the entry of each of the digits and the standard inter-digit time gap, wherein the number of digit sequences entered corresponds with one or more telephone numbers, detecting the dual-tone multi-frequency signals with the digital signal processor of the second telephonic device, decoding the detected dual-tone multi-frequency signals with the digital signal processor in order determine the one or more telephone numbers typed into the keypad, storing the one or more decoded telephone numbers in the temporary memory of the second telephonic device, displaying the one or more telephone numbers on the display of the second telephonic device, terminating the telephone call between the first and second telephonic devices, accessing the one or more decoded telephone numbers stored in the temporary memory, and storing the one or more decoded telephone number in the non-volatile memory of the second telephonic device.
摘要:
A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.