Patents Assigned to IBM Corporation
-
Publication number: 20050114729Abstract: Method, system and computer program product are provided to improve the reliability of data transfers from RAID systems. Although some read errors may be detected by the RAID controller, other errors may not be; undetected errors may affect the integrity of the data. In accordance with the present invention, the host or client issues a first command to the RAID controller to read specified data. After the RAID controller obtains the data from the RAID drives and transmits it to the host, the host verifies the data to detect any errors. If an error is detected by the host, the host issues a second command to the RAID controller to reconstruct the specified data, rather than merely re-read the data. The reconstructed data is then transmitted to the host. Consequently, previously undetected and uncorrected errors may be detected and corrected by the host.Type: ApplicationFiled: November 20, 2003Publication date: May 26, 2005Applicant: International Business Machines (IBM) CorporationInventors: Karl Nielsen, Colleen Stouffer, Matthew Fairhurst, Lee Sanders
-
Publication number: 20050114740Abstract: A method of error management in a data storage system having a target device, with the target device receiving commands from a first initiator and the target device concurrently receiving commands from a second initiator. The target device is typically a storage device operating as a PPRC secondary. A first initiator is a device which communicates with the target device through small computer systems interface (SCSI) protocol. The first initiator is typically a host computer or server. The second initiator communicates with the target device through peer-to-peer remote copy PPRC initiator mode commands. The second initiator is typically a separate storage device in a peer-to-peer remote copy (PPRC) relationship with the target device. The method consists of managing errors associated with a command sent to the target device from the first initiator independently from the management of errors associated with a command sent to the target device from the second initiator.Type: ApplicationFiled: November 20, 2003Publication date: May 26, 2005Applicant: International Business Machines (IBM) CorporationInventors: Frederick Carberry, Rufus Twito, James Chen, Richard Schaeffer, Kaukab Uddin
-
Publication number: 20050114358Abstract: Methods, system and computer program product are provided to improve the efficiency of data transfers in a PPRC environment. Any or all of three features may be implemented, each of which reduces the number of round trips required for the exchange of handshaking, data and control information. A first feature includes disabling the “transfer ready” acknowledgment which normally occurs between a primary storage controller and a secondary storage controller. A second feature includes pre-allocating payload and data buffers in the secondary storage controller. A third feature includes packaging write control information with a write command in an extended command descriptor block (CDB). Such a step eliminated the need for a separate transmission of the write control information. The CDB is transmitted along with a data block from the primary storage controller to the secondary storage controller and placed in the respective, pre-allocated buffers. Data may also be pipelined to the secondary.Type: ApplicationFiled: November 20, 2003Publication date: May 26, 2005Applicant: International Business Machines (IBM) CorporationInventors: James Chen, Minh-Ngoc Huynh, Matthew Kalos, Chung Fung
-
Publication number: 20050114630Abstract: Method, system and computer program product are provided to increase the efficiency of the development of Java Enterprise Edition (J2EE) applications. A project may be divided into modules which may be developed by independent teams. The files within each module are classified as independent of resources in other modules or dependent. Independent files may be packaged into a single, integrated web application archive (WAR) file without further processing. Corresponding dependent files are compared and any conflicts are resolved. The resulting files may then be packaged into the WAR file.Type: ApplicationFiled: November 24, 2003Publication date: May 26, 2005Applicant: International Business Machines (IBM) CorporationInventors: David Brauneis, Christopher Mitchell, Brent Daniel, Richard Backhouse
-
Publication number: 20050114476Abstract: Methods, system and computer program product are provided to configure a path between nodes through a fabric in a fibre channel storage area network (SAN). A node name is provided for a target node on the SAN and a port name is provided for each port in the target node. A relationship is established in a data structure between each port name and a slot in which each port is physically located in the target node. Prior to configuring a path between a source node and a port in the target node, the ports which are physically connected and logged in to the fabric are identified by port address. The port names corresponding to the port addresses are then identified. The port names are used to generate interface_ids of the ports corresponding to the physical slots in which the ports are located. A data structure is created to maintain the relationship between interface_ids and port names.Type: ApplicationFiled: November 20, 2003Publication date: May 26, 2005Applicant: International Business Machines (IBM) CorporationInventors: James Chen, Patricia Lu, Chung Fung, Minh-Ngoc Huynh, Christopher Sansone, Dung Dang, Gail Spear, Richard Ripberger
-
Publication number: 20050114566Abstract: Methods, system and computer program product are provided to improve the efficiency of data transfers in a PPRC environment. A block of data to be transferred is divided into tracks. Each track is allocated to a data mover task control block (TCB) with a master TCB being assigned to supervise the data mover TCBs. The tracks are then transferred from the primary storage controller to the secondary controller in a piped fashion over a link coupling the primary and secondary storage controllers. However, the usage of resources is monitored by a resource management algorithm and, if too many TCBs are being used for a transfer or if the supply of data mover TCBs is exhausted, the transfer is automatically switched to a serial, non-piped transfer with the master TCB serving as the data mover TCB for the remaining tracks. In addition, the various links coupling the primary and secondary storage controllers is monitored to determine which link will provide the fastest transfer.Type: ApplicationFiled: November 20, 2003Publication date: May 26, 2005Applicant: International Business Machines (IBM) CorporationInventors: James Chen, Olympia Gluck, Gabriel Walder, Yelena Zilberstein, Warren Stanley, Edward Lin
-
Publication number: 20050102256Abstract: A method and system for clustering of XML documents is disclosed. The method operates under specified memory-use constraints. The system implements the method and scans an XML document, assigns edge-weights according to the application workload, and maps clusters of XML nodes to disk pages, all in a single parser-controlled pass over the XML data. Application workload information is used to generate XML clustering solutions that lead to substantial reduction in page faults for the workload under consideration. Several approaches for representing workload information are disclosed. For example, the workload may list the XPath operators invoked during the application along with their invocation frequencies. The application workload can be further refined by incorporating additional features such as query importance or query compilation costs. XML access patterns could be also modeled using stochastic approaches.Type: ApplicationFiled: November 7, 2003Publication date: May 12, 2005Applicant: IBM CorporationInventors: Rajesh Bordawekar, Sriram Padmanabhan, Oded Shmueli
-
Publication number: 20050102666Abstract: Methods, systems, data structures and computer program products for deploying software components, including deploying components in an enterprise environment. Components previously installed and components to be installed are identified. Conflicts between such components are then identified. A user may be notified and provided with options. One option is to abort the installation. Another option is to continue the installation. If installation is continued, an entry may be made in a log indicative of the conflict and of the continuation of the installation.Type: ApplicationFiled: November 10, 2003Publication date: May 12, 2005Applicant: International Business Machines (IBM) CorporationInventors: Attila Barta, Kwasi Asare, Richard Huddleston, Daniel Jemiolo
-
Publication number: 20050102273Abstract: A method for extracting desired data from a digital database comprising the steps of specifying desired data elements to be extracted from an operational database, generating executable code from the identified data elements for extracting the identified data elements from the database, and executing the executable code thereby extracting the identified data elements from the database.Type: ApplicationFiled: December 21, 2004Publication date: May 12, 2005Applicant: IBM CorporationInventor: Arun Gupta
-
Publication number: 20050102667Abstract: Methods, systems, data structures and computer program products are provided for deploying software components, including deploying components in an enterprise environment. Installation of components is initiated and a level of detail to be reported is selected. As installation progresses, a report is generated regarding the status of the installation of the components. A portion of the report is displayed identifying the components at the selected level of detail and the corresponding status. Thus, a user may select only that level of detail which is of interest.Type: ApplicationFiled: November 10, 2003Publication date: May 12, 2005Applicant: International Business Machines (IBM) CorporationInventors: Attila Barta, Kwasi Asare, Richard Huddleston, Daniel Jemiolo
-
Publication number: 20050102665Abstract: The methods, systems, data structures and computer program products for deploying software components are provided, including deploying components in an enterprise environment. Dependency relationships among components to be deployed are determined. Those components which are not dependent upon any other component may be installed first and substantially in parallel. Components which are dependent only upon the first installed components are next installed, substantially in parallel. Installation thus progresses until all components have been installed. By installing in parallel those components having a similar level of dependency, rather than installing all components sequentially, the deployment is more efficient and requires less time to complete.Type: ApplicationFiled: November 10, 2003Publication date: May 12, 2005Applicant: International Business Machines (IBM) CorporationInventors: Attila Barta, Kwasi Asare, Richard Huddleston, Daniel Jemiolo
-
Publication number: 20050097311Abstract: A method and system for configuring available resources in real-time to automatically accommodate the needs of the system user in multi-modal distributed computing system is disclosed. Information about the location or environment of a wireless device is used, preferably in combination with user personal preferences and past history to modify the behavior of the wireless device, including the selection of the most appropriate mode of interaction with the device and the activation of applications thereon as appropriate.Type: ApplicationFiled: October 31, 2003Publication date: May 5, 2005Applicant: IBM CorporationInventors: Ponani Gopalakrishnan, Stephane Maes, Ganesh Ramaswamy
-
Publication number: 20050086659Abstract: Regulating the execution of software execution units to manage the performance impact of administrative utilities is disclosed. Administrative utilities (e.g., filesystem and database backups, garbage collection in the Java Virtual Machines, etc.) are an essential part of the operation of production systems. Performance impact is managed through the use of throttling, either external or internal, which forces utilities to slow down their processing by a configurable amount. While a variety of criteria may be used for throttling, a self-induced sleep in preferred for internal throttling.Type: ApplicationFiled: October 19, 2003Publication date: April 21, 2005Applicant: IBM CorporationInventors: Matthew Huras, Sam Lightstone, Sujay Parekh, Kevin Rose
-
Publication number: 20050081091Abstract: A method of recovery from a data storage system failure in a data storage system having a host computer writing data to a first storage unit with a first storage controller synchronously mirroring the data to a second storage unit, and with a second storage controller asynchronously mirroring the data to a third storage unit. The method begins with the detection of a failure associated with the first storage unit. Upon detection of the error or failure associated with the first storage unit, the synchronous data mirroring relationship between the first storage unit and the second storage unit is terminated and the host is directed to write data updates directly to the second storage unit. Upon correction of the failure associated with the first storage unit, the asynchronous mirroring of data updates from the second storage unit to the third storage unit is suspended and synchronous mirroring of the data updates in a reverse direction, from the second storage unit to the first storage unit, is commenced.Type: ApplicationFiled: September 29, 2003Publication date: April 14, 2005Applicant: International Business Machines (IBM) CorporationInventors: Robert Bartfai, Michael Factor, Gail Spear, William Micka
-
Publication number: 20050081082Abstract: The deployment of probing technology for the purpose of problem determination in a server or network element is disclosed. One can actively select which probes to send in order to be able to diagnose problems which one is particularly interested in, allowing for greater flexibility and efficiency. The extra load imposed on a network by the use of probes is small, especially if the algorithms described in this disclosure are used.Type: ApplicationFiled: September 30, 2003Publication date: April 14, 2005Applicant: IBM CorporationInventors: Mark Brodie, Sheng Ma, Irina Rish
-
Publication number: 20050081044Abstract: Methods and apparatus for enabling a Pervasive Authentication Domain. A Pervasive Authentication Domain allows many registered Pervasive Devices to obtain authentication credentials from a single Personal Authentication Gateway and to use these credentials on behalf of users to enable additional capabilities for the devices. It provides an arrangement for a user to store credentials in one device (the Personal Authentication Gateway), and then make use of those credentials from many authorized Pervasive Devices without re-entering the credentials. It provides a convenient way for a user to share credentials among many devices, particularly when it is not convenient to enter credentials as in a smart wristwatch environment. It further provides an arrangement for disabling access to credentials to devices that appear to be far from the Personal Authentication Gateway as measured by metrics such as communications signal strengths.Type: ApplicationFiled: October 14, 2003Publication date: April 14, 2005Applicant: IBM CorporationInventors: James Giles, Reiner Sailer
-
Patent number: 6876557Abstract: A unified SRAM cache system is provided incorporated several SRAM macros of an embedded DRAM (eDRAM) system and their functions. Each incorporated SRAM macro can be independently accessed without interfering with the other incorporated SRAM macros within the unified SRAM cache system. The incorporated SRAM macros share a single set of support circuits, such as row decoders, bank decoders, sense amplifiers, wordline drivers, bank pre-decoders, row pre-decoders, I/O drivers, multiplexer switch circuits, and data buses, without compromising the performance of the eDRAM system.Type: GrantFiled: June 12, 2001Date of Patent: April 5, 2005Assignee: IBM CorporationInventors: Louis L. Hsu, Rajiv V. Joshi
-
Publication number: 20050071708Abstract: A method of recovery from a data storage system failure in a data storage system having a host computer writing data updates to a local storage controller at a local site. The local controller is associated with a local storage device. The local storage controller is also configured to asynchronously copy the updates to a remote storage controller associated with a remote storage device at a remote site. In addition, the remote storage controller is configured to store a consistent point in time copy of the updates on a backup storage device. The consistent point in time copy is known as a consistency group. Upon detection of a failure associated with the local site, a determination is made whether a group of updates pending for storage on the backup storage device form an intact consistency group. If an intact consistency group has not formed, corrective action may be taken to create an intact consistency group.Type: ApplicationFiled: September 29, 2003Publication date: March 31, 2005Applicant: International Business Machines (IBM) CorporationInventors: Robert Bartfai, Gail Spear
-
Publication number: 20050071591Abstract: An automated data storage library accesses data stored on storage media contained in cartridges in response to commands from an external host. The cartridges may include cartridge memory and a component in the library may include a cartridge memory interface for reading data from and/or writing data to the cartridge memory. When a cartridge is to be stored in the library, the library modifies the contents of the cartridge memory, or the contents of the storage media such that the data stored on the cartridge becomes inaccessible, thereby preventing access to the data outside of the library. To perform an authorized access, the library restores the contents of the cartridge memory or the storage media. Alternatively, the library provides a correction or correction algorithm to the drive to allow access to the data stored on the storage media without removing the access protection of the storage media.Type: ApplicationFiled: September 29, 2003Publication date: March 31, 2005Applicant: International Business Machines (IBM) CorporationInventors: Brian Goodman, Leonard Jesionowski, Glen Jaquette
-
Publication number: 20050071334Abstract: Classification of objects using the best boolean expression that represents the most optimal combination of the underlying features is disclosed.Type: ApplicationFiled: September 30, 2003Publication date: March 31, 2005Applicant: IBM CorporationInventors: Laxmi Parida, Ajay Royyuru