Patent application number | Description | Published |
20110030048 | SYSTEM, METHOD AND PROGRAM FOR MANAGING FIREWALLS - Computer system, method and program for managing a firewall. First program instructions identify a first rule of the firewall. The first rule specifies a permitted message flow through the firewall to or from an IP address of a computer. The computer resides on a network. Second program instructions identify a second rule of the firewall. The second rule specifies a permitted message flow through the firewall to or from an IP address corresponding to the network. Message flows through the firewall to all computers on the network are permitted pursuant to the second rule. Third program instructions delete the first rule from the firewall based on the identification of the second rule and the computer residing on the network. Other program instructions identify and delete stale rules which are not needed. Other program instructions automatically identify rules for a new server added to a cluster. | 02-03-2011 |
20120136833 | DISASTER RECOVERY UTILIZING COLLAPSIBLE VIRTUALIZED CAPACITY - Aspects of the present invention provide a solution for implementing disaster recovery for an application. A subscription backup site for the application is selected from among a plurality of sites. The site that is selected will have a virtual space that is able to accommodate the workload requirements for the application. The application is deflated on the site in such as way as to operate in a dormant state. In the dormant state, the application has a small fraction of its required resources allocated to it. Thereafter, when disaster recovery is needed, the application can be inflated on the subscription backup site by allocating resources to enable the application to execute on the subscription backup site. | 05-31-2012 |
20120284770 | SYSTEM, METHOD AND PROGRAM FOR MANAGING FIREWALLS - Computer system, method and program for managing a firewall. First program instructions identify a first rule of the firewall. The first rule specifies a permitted message flow through the firewall to or from an IP address of a computer. The computer resides on a network. Second program instructions identify a second rule of the firewall. The second rule specifies a permitted message flow through the firewall to or from an IP address corresponding to the network. Message flows through the firewall to all computers on the network are permitted pursuant to the second rule. Third program instructions delete the first rule from the firewall based on the identification of the second rule and the computer residing on the network. Other program instructions identify and delete stale rules which are not needed. Other program instructions automatically identify rules for a new server added to a cluster. | 11-08-2012 |
20140096066 | CONSTRUCTION OF COMMAND LINES IN A COMMAND LINE INTERFACE - Embodiments of the present invention provide a computer system, method, and computer program product for constructing a command line. According to one aspect of the present invention, a user can construct a command line based on historical command lines. The user can view and select individual historical and/or available parameters to construct the new command line, without requiring that the user manually type the parameters with a physical or virtual keyboard. | 04-03-2014 |
20150039831 | FILE LOAD TIMES WITH DYNAMIC STORAGE USAGE - Provided is a technique for improving file load times with dynamic storage usage. A file made up of data blocks is received. A list of storage devices is retrieved. In one or more iterations, the data blocks of the file are written by: updating the list of storage devices by removing any storage devices with insufficient space to store additional data blocks; generating a performance score for each of the storage devices in the updated list of storage devices; determining a portion of the data blocks to be written to each of the storage devices based on the generated performance score for each of the storage devices; writing, in parallel, the determined portion of the data blocks to each of the storage devices; and recording placement information indicating the storage devices to which each determined portion of the data blocks was written. | 02-05-2015 |
Patent application number | Description | Published |
20090094592 | System and Method for Replacing an Application on a Server - A system and method for controlling access to first and second applications in a shared storage. A first server requests from a first local storage a copy of an application identified by a first hierarchical directory. The first server request is redirected from the first local storage to the first application in the shared storage. The first application in the shared storage has a second, extended hierarchical directory comprising the first hierarchical directory plus a lower level qualifier. Subsequently, a second server requests from a second local storage a copy of an application identified by the first hierarchical directory. The second server request is redirected from the second local storage to the second application in the shared storage. The second application in the shared storage has a third, extended hierarchical directory comprising the first hierarchical directory plus a lower level qualifier different than the lower level qualifier of the second, extended hierarchical directory. The second application can be a more recent version of the first application. Also, there can be a proxy server which routed the request for the application identified by the first hierarchical directory to the first server, and further comprising the step of reconfiguring the proxy server to route subsequent requests for the application identified by the first hierarchical directory to the second server instead of the first server. | 04-09-2009 |
20130054912 | METHODS AND PHYSICAL COMPUTER STORAGE MEDIA FOR TRANSFERRING DE-DUPLICATED DATA ORGANIZED IN VIRTUAL VOLUMES TO A TARGET SET OF PHYSICAL MEDIA - A method include forming an initial bitmap from the de-duplicated data on virtual volumes, sorting discrete blocks according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks, creating a physical volume map from the revised bitmap, reviewing, from the physical volume map, an initial virtual volume of the virtual volumes contained on a corresponding original physical volume, to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map, deleting the initial virtual volume from its corresponding original physical volume and adding the initial virtual volume to the different original physical volume to create a revised physical volume map including revised physical volumes, and writing the revised physical volumes to the target set of physical media using the revised physical volume map. | 02-28-2013 |
20130054919 | METHODS AND PHYSICAL COMPUTER STORAGE MEDIA FOR TRANSFERRING DE-DUPLICATED DATA ORGANIZED IN VIRTUAL VOLUMES TO A TARGET SET OF PHYSICAL MEDIA - For forming an initial bitmap from deduplicated data on virtual volumes, discrete blocks are sorted according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks. A physical volume map is created from the revised bitmap. An initial virtual volume of the virtual volumes contained on a corresponding original physical volume is reviewed to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map. The initial virtual volume is deleted from its corresponding original physical volume and added to the different original physical volume to create a revised physical volume map including revised physical volumes. The revised physical volume is written to the target set of physical media using the revised physical volume map. | 02-28-2013 |
20140122926 | SIMULATION ENGINE FOR USE IN DISASTER RECOVERY VIRTUALIZATION - An approach is provided for determining disaster recovery capacity. A simulation hypervisor receives streaming metric data, which represents the current production workload of a primary site, from the primary site. The metric data is combined with production data of the backup site by the simulation hypervisor to simulate a recovery event. Using data from the simulating, disaster recovery planning can be performed. | 05-01-2014 |
20140164817 | DISASTER RECOVER INTERNET PROTOCOL ADDRESS FAILOVER - An approach is provided for internet protocol (IP) address failover. An application on a primary site is assigned a private IP address. This private IP address is accessible within a local network. This private IP address is mapped to a public IP address, which is accessible to users outside the local network. The application is then replicated to a backup site with the same private IP address used to access it on the primary site. In case of a disaster recover event on the primary site, the replicated application can be accessed on the backup site by way of the public IP address. | 06-12-2014 |
20140165128 | AUTOMATED SECURITY POLICY ENFORCEMENT AND AUDITING - An approach for managing a connection to or from a device is presented. Connections of the device are identified. Based on the connections, the device is determined and classified based on security zones to which the device is or has been connected, a quality of service requirement for one or more applications within the device, or a level of information technology service management for the device. Whether an existing or proposed connection of the device is consistent with the classification of the device is determined, and if not, an indication is displayed or a notification is sent that the existing or proposed connection is inconsistent with the classification of the device. | 06-12-2014 |