Abstract: A fiber optic channel loop provides a transmission path between a computer platform and a multiple number of peripheral devices. When any change occurs in the number of connected peripheral devices or their operation status, then Fiber Channel loop is interrupted so to disable ongoing Input/Output operations to a targeted peripheral device. When this interruption is sensed, the Master Control Program of the platform will institute corrective measures to re-originate any interrupted I/O operations.
Type:
Grant
Filed:
March 24, 2000
Date of Patent:
June 24, 2003
Assignee:
Unisys Corporation
Inventors:
Ralph Ernest Marsh, III, Kathryn Ann McDonald, Willis Lloyd Jacobs
Abstract: A method and an estimator program for estimating the optimum Server Farm size and the availability of the Server Farm for a given Redundancy Factor and a given particular number of clients.
Abstract: A performance measurement tool is developed to measure performance of a terminal server servicing multiple Clients who operate on remote systems in a farm of multiple PC's. Test scripts to simulate actual operating conditions are run on each PC Client-User over a sequence of time which varies the number of concurrently active PC Client-Users from a small number of Users to a vary large number of current Users. During this test period, a record is kept of designated simulated-user-initiated actions such as log-on times, time to open various application programs, and character entries thus to determine acceptable operating configurations.
Type:
Grant
Filed:
September 19, 2000
Date of Patent:
May 20, 2003
Assignee:
Unisys Corporation
Inventors:
Kyle Joseph James Mackey, Lauren Ann Cotugno, Joseph Kuoweng Chan, Matthew James Hengst, Mark Douglas Whitener
Abstract: In a system where a remote backup platform is enabled to automatically duplicate each registry key change in a local platform, a method is provided wherein restoration of original remote registry key data can be accomplished by utilizing a remote disk file which stores original data. When local original registry data on the local platform is lost to due breakdown, then a restoration program can access the backup remote registry key data for conveyance to the local registry key.
Abstract: A computer-implemented method for representing JAVA in UML in a computer system executing a repository program. The method comprises the steps of determining if a file is a JAVA package or project. If it is, then determining if there is a JAVA subpackage not represented in UML, and if so; recursively creating UML subpackages representing each nested JAVA subpackage. If it is determined that the file is not a JAVA package or project, then the method creates UML files representing each JAVA source file.
Type:
Grant
Filed:
September 28, 2000
Date of Patent:
May 6, 2003
Assignee:
Unisys Corporation
Inventors:
Jeffrey Allen Moore, Joseph Peter Stefaniak, Lonnie Dale Sulgrove
Abstract: A computer-implemented method is disclosed for automatically converting text-based screen applications of a legacy computer system into a graphical-based representation thereof. The method includes the steps of transforming a terminal-based screen application into an application specification; converting the application specification into a modeling language-based representation; and, displaying the modeling language-based representation with a graphical user interface. The method of this invention also includes the capability of generating document type definitions of the modeling language-based representation, which enables transmission of the representation among modeling tools.
Abstract: A method is provided by a computer system processing XMI-based XML documents. The method compares two such XMI-based XML documents for identical content. The method begins with the step of parsing each of the documents to create for each a semantic graph of the document's objects. Next, a list of names of properties for each of the objects having significant order is read. For each of the objects, and then for each object's property not listed as having significant order, values of said properties are sorted. Finally, the objects of the semantic graphs are compared.
Abstract: A method and an estimator program for estimating the server farm size and the availability of the server farm for a given redundancy factor and a given particular number of clients.
Abstract: An improved computer-implemented method is disclosed, which maintains a version history of objects in a repository. Modifications to property values and links are tracked with respect to versions of a model. The method includes the steps of maintaining a start version and a list of end versions for each object in the model and maintaining a start version and a list of end versions for each attribute value in the model. Moreover, in response to a request for objects in a class with respect to a current version, only those objects whose start version is in the history of the current version and whose end versions are not in the history of the current version are retrieved. Also, in response to a request for attribute values of an object with respect to a current version, only those values whose start version is in the history of the current version and whose end versions are not in the history of the current version are retrieved.
Abstract: A novel sales system of complex products whose configuration is designed based on the customer requirements provides method steps for generating guarantee offers. A value of the guarantee criterion for the complex product (such as product availability) can be evaluated only after the complex product configuration is determined. For each combination of the customer requirements, a system configuration and a corresponding value of the guarantee criterion is generated. Then, this value is used for the customer remedy calculations.
Type:
Grant
Filed:
January 17, 2001
Date of Patent:
September 17, 2002
Assignee:
Unisys Corporation
Inventors:
Lev Smorodinsky, Leonard Eugene Eismann
Abstract: A method for sensing and regulating the level of synchronization between a file of audit blocks generated in a primary host for transfer to a secondary host. The audit files in a primary host are divided into audit blocks which are each identified with an audit block serial number. The individual audit blocks are transmitted through a network from a primary host to a secondary host wherein a tracker mechanism monitors the difference between the number of received audit blocks and the number of generated audit blocks residing at the primary host waiting to be transferred. When the disparity between the audit blocks received and the generated audit blocks waiting to be transmitted reaches a certain critical level, the tracker mechanism will initiate an advance speed up program to expedite the transfer in order to bring the primary and secondary audit files into greater synchronism.
Abstract: In order to obviate data discrepancy between a primary source database and a secondary remote backup database, a Tracker program is used to sense the lack of synchronism between a primary audit file and secondary audit file. Then, a Catch-up program operates to transfer sectioned audit files from the primary to secondary in a parallel transfer mode until the primary and secondary audit files are accurate duplicates of each other, i.e., they are now in synchronism.
Abstract: A method for processing rules using a model resident within a persistent storage means of a computer system executing a repository program. The method includes the steps of storing in the persistent storage means the model, which comprises a set of rules and a set of facts defining event states. Both of these are stored as objects. The set of rules and set of facts comprise an object-oriented representation of the model. Next, a set of commands representing an extensible inference engine are loaded as meta objects into the persistent storage. The method accepts as inputs events, which represent alterations in the set of facts and determines which of the rules is associated with the alterations in the set of facts. The most salient one of the rules determined in the preceding step is then selected and executed.
Abstract: A specialized data format native to a first platform is wrap-packaged into an industry-standard text file in a protocol suitable for Internet transmittal. A Signature Support Library provides parameters to combine with a User's private key to generate a signature particular to the data file being converted.
Abstract: A computer-implemented method is provided for merging a source version into a target version of a model in an object oriented repository. The method comprises the steps of building a first list as a collection of versions that occur only in a history of the source version; and, building a second list as a collection of versions that occur only in a history of the target version. Next, a dual history is created as a union of the first and second lists. After this, either the first or the second list is identified as the non-preferred history wherein either the source or the target version is preferred. The first list is then added to the history of the target version. Any conflicts occurring in the dual history are next reported; and, such conflicts are resolved by adding the target version to a list of end versions on each conflicting attribute value and link occurring in the non-preferred history.
Abstract: An enhanced method for developing back-up copies of a source database by providing incremental and accumulate dump commands from various multiple-Users which enable a selection of certain files which are identified independently of time-factor for dumping selectively either onto a separate destination medium of disk or tape. A User can determine the block size of words for blocks of data files to be dumped onto the destination medium, thus significantly reducing the number of I/O operations required.
Abstract: A system and method is provided whereby a Client-User may communicate with a specialized client server and a Kerberos server. The client-server provides a specialized Menu-Assisted Resource Control Program (MARC) which enables client requests to use the Menu-Assisted Resource Control Program to access a Kerberos Support Library via a directive interface. The Menu-Assisted Resource Control Program has a Directive Interface which holds a Kerberos Entry Point, which communicates to a Kerberos Support Library which also has a Kerberos Directive Interface having its own Entry Point (KEP) which Entry Point is common to both the MARC and the Kerberos Directive Interface. The Menu-Assisted Resource Control Program can now link to the Kerberos Support Library to find a response to any particular Kerberos command utilized by the Client-User and then can relay back the response to the Menu-Assisted Resource Control Program which enables it to respond back to the Client User.
Abstract: Using the accumulated magnetic tape statistics in a storage medium (Sumlog File) which were retrieved from the unloading of specifically selected magnetic tape media, of a magnetic tape peripheral, a procedure is instituted to take the tape statistics through a Log Analyzer unit to analyze certain pages of data which then is fed to a Jobformatter unit which organizes each page of data into Write errors, Read errors, and other tape statistics returned by the tape peripheral. The Jobformatter sets-up a display of this information onto a display terminal or a printer.
Type:
Grant
Filed:
December 10, 1998
Date of Patent:
June 18, 2002
Assignee:
Unisys Corporation
Inventors:
Kathryn Ann McDonald, Ralph Ernest Marsh, III, Willis Lloyd Jacobs
Abstract: In order to correlate or synchronize the database of a source primary host with the backup database of a remote secondary host, the present method operates to speed up the transfer of audit blocks from primary host to secondary host when an out-of-sync signal indicates the secondary host audit blocks are not on a par with the primary host audit blocks. A Catchup process utilizes multiple buffers of audit blocks at the primary host which can then be asynchronously transferred, by a sequence of Catchup tasks, on a parallel concurrent operation, over to physical files of said secondary host.
Abstract: In a computer system executing a repository program and having a memory, a method is disclosed for identifying UML objects in the repository with objects in an XML file. The method includes the steps of parsing the XML file into XML objects and building an object tree. Next, the object tree is traversed a first time, and for each XML object found that has a name, corresponding UML objects are identified. After this, the object tree is traversed a second time, and for each XML object found that does not have a name, corresponding UML objects are then identified through Compositions and References. The method for traversing said object tree a first time includes the steps of identifying a UML object type for each XML object, and when the XML object name matches the UML object name at the current level, a UML and XML object IDs are saved in a ‘Conversion’ object in the memory.