摘要:
Methods and apparatus for managing access to a plurality of storage resources in a computer system including a host computer and a storage system. The host computer comprises an application layer including at least one application program, and the computer system includes a plurality of storage resources visible to the application layer. The computer system has an access facility that grants access to the plurality of storage resources and requires a privilege level for the at least one application program to be granted access. In one aspect, requests to access one of the plurality of storage resources from the application layer are intercepted, and at least one of the intercepted requests is modified in a manner that will impact the access facility in determining whether the requestor satisfies the privilege level to be granted access to the one of the plurality of storage resources. Another aspect is directed to a computer system comprising a file system/LVM layer, wherein at least some requests from the application layer to access the plurality of storage resources are directed to the file system/LVM layer for processing and are intercepted, at least one of the intercepted requests is modified to create a modified access request, and a modified access request is sent to the file system/LVM layer in place of the intercepted request.
摘要:
Method and apparatus for managing access to one of a plurality of raw storage devices in a computer system including a host computer and a storage system. The computer system includes a plurality of logical volumes of data that are visible to the host computer and the storage system and are perceived by the host computer as comprising a plurality of raw storage devices. The host computer includes a file system/LVM mapping layer. In accordance with one aspect of the invention, a request, from a requester having less than system administrator access privileges, to perform an action directly on the one of the plurality of raw storage devices is granted, so that a logical channel is provided to directly access the one of the plurality of raw storage devices without the logical channel being mapped by the file system/LVM mapping layer. Another aspect is directed to a computer system including a host computer comprising an application layer including at least one application program. A plurality of volumes of storage are visible to the application layer, and access privileges less than the root access privileges are assigned to the at least one application program to access the plurality of volumes of storage.
摘要:
Method and apparatus for managing access to one of a plurality of raw storage devices in a computer system including a host computer and a storage system that is coupled to the host computer and that stores data accessed by the host computer. The computer system includes a plurality of logical volumes of data that are visible to the host computer and the storage system and are perceived by the host computer as comprising the plurality of raw storage devices. In accordance with one aspect of the invention, a request to perform an action on the one of the plurality of raw storage devices can be granted, even when the requester has less than system administrator access privileges. In accordance with another aspect of the invention, the one of the plurality of raw storage devices may have associated access privileges information. The access privileges information associated with the one of the plurality of raw storage devices may be compared with information descriptive of the requester, and the request may be granted when the access privileges information associated with the one of the plurality of raw storage devices indicates that the requester is privileged to perform the action on the one of the plurality of raw storage devices.
摘要:
Method and apparatus for representing data for components of a system in respective model components, generating model sub components from model components for at least some of the system components, and accumulating information from the model components and model sub components to determine a world view of the system. In one embodiment, model components can be updated during system operation.
摘要:
Currently, administrators configure replication manually according to a data protection policy. Typically, such data protection policies are provided via a script or a similar input to provision storage devices. However, such manual configuration is subject to administrator error. For example, an administrator may not provision storage devices accurately according to a desired data protection policy. Further, this process is subject not only to human mistake, but also the administrative overhead required to manually provision the storage devices. Example embodiments of the present invention eliminate administration and reliability issues arising out of manual replication service configuration, thereby minimizing administrative costs and improving the user experience of handling data protection. Example embodiments of the present invention provide a method, an apparatus and a computer-program product for creating a policy-based replication service. The method includes receiving a policy and creating a replication service according to the policy.
摘要:
IT organizations are challenged with maintaining data application and availability while satisfying service level agreements and compliance requirements. Unprecedented data growth is straining IT resources requiring greater investments, while capital and operational expenses are under scrutiny. Given this tension, IT organizations are seeking efficiency and optimization to regain control and meet business SLAs. Example embodiments of the present invention provide a method, an apparatus, and a computer program product for performing automated data protection with information technology (IT) infrastructure visibility. The method comprises receiving input regarding a desired state of a data protection environment for an IT infrastructure and creating a data protection environment according to the desired state of the data protection environment.
摘要:
Methods and apparatus for receiving a request from a user of a system, the request having a format defined by a template, expanding the request to combine user supplied data and data from a model component containing data for a component of the system to form an expanded request, wherein the expanded request has a predetermined format, acquiring information to determine how to process the expanded request, communicating with a host computer to extract information needed to satisfy the expanded request, generating an internal response to the expanded request containing the acquired information, inserting result data from the internal response into the model component, generating a user response to the user request, and sending the user response to the user to satisfy the user request.
摘要:
An adjustable support assembly for a digitizer device, such as a track ball or mouse, mounts between a computer keyboard support tray and an articulating arm normally attached to the tray for supporting and adjusting the tray. The support assembly includes a right-hand support pad and a left-hand support pad that are slidable underneath the keyboard support tray in a stored position. One of the pads can be selectively exposed for use, while the other pad is stored underneath the keyboard support tray. The upper surface of the support pads are textured to enhance the tracking movement of a mouse ball. The exposed mouse pad is rotatably adjustable about an axis parallel to a longitudinal axis of the keyboard support tray to provide a horizontal surface for the mouse to ride on, even if the keyboard support tray is tilted away from horizontal. The support pads additionally include a slot extending inwardly from an outer edge thereof. The slot has opposing inner faces and a cord of resilient material with a high coefficient of friction material projecting from the faces toward each other to create a gap. The gap resiliently and frictionally holds a data cord associated with the digitizer device. The yieldable nature of the resilient material prevents damage to the data cord while securely retaining the data cord in the slot.