Patent application number | Description | Published |
20080310635 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING LICENSE KEYS - An apparatus, system, and method are disclosed for managing license keys. A license key service module creates a license key service object of a license key service class. The license key service class extends a SMI-S CIM CIM_Service class. The license key service object comprises a plurality of management operations. A hosted license key service module creates a hosted license key service object of a hosted license key service class. A license key module creates a license key object of a license key class. The license key class extends a SMI-S CIM CIM_ManagedElement class. The license key object comprises a license key and employs the plurality of management operations. A management module manages the license key using the license key object, license key service object, and hosted license key service object. | 12-18-2008 |
20080313657 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING TRAY DEVICES - An apparatus, system, and method are disclosed for managing tray devices. A tray slot module creates a tray slot object of a tray slot class that extends a SMI-S CIM CIM_Slot class. The tray slot object describes a tray slot. A tray physical package module creates a tray physical package object of a tray physical package class that extends a SIM-S CIM CIM_PhysicalPackage class. The tray physical package object describes a tray device, references the tray slot object, and comprises a universal unique identifier. A tray object module creates a tray object of a tray class that extends SMI-S CIM CIM_LogicalDevice class. The tray object describes a tray, is referenced by a SMI-S CIM CIM_ComputerSystem object, references the tray physical package object, and comprises a device identifier. A management module manages the tray device using the tray slot object, tray physical package object, and tray object. | 12-18-2008 |
20100223667 | APPARATUS, SYSTEM, AND METHOD FOR START-UP AUTHENTICATION - An apparatus, system, and method are disclosed for start-up authentication. A prompt module prompts for a hardware password and authentication data on a single display screen. The authentication data comprises a user password. The user password is distinct from the hardware password. A store module stores the authentication data in a target storage space. In addition, the store module stores a pointer to the target storage space in a system register. A retrieve module retrieves the authentication data from the target storage space using the pointer. An authentication module automatically authenticates a user with the authentication data. | 09-02-2010 |
20120089725 | METHODS AND SYSTEMS FOR VERIFYING SERVER-STORAGE DEVICE CONNECTIVITY - Methods and systems for verifying server-storage device connectivity in a storage area network (SAN) environment are provided. One system includes determining which of a plurality of storage devices a server is physically connected and determining which of the plurality of storage devices a zoning configuration in the SAN environment enables the server to access. The method further includes returning to a user an indication of each storage device in the plurality of storage devices that the server is both physically connected and includes zoning access. One system includes a server, a plurality of storage devices, a switch fabric coupling the server to the plurality of storage devices, and a processor coupled to the server, the plurality of storage devices, and each device in the switch fabric. In this system, the processor is configured to perform the method discussed above. | 04-12-2012 |
20120197943 | METHOD, COMPUTER SYSTEM, AND PHYSICAL COMPUTER STORAGE MEDIUM FOR ORGANIZING DATA INTO DATA STRUCTURES - Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage. | 08-02-2012 |
20120323861 | DEDUPLICATED CACHING OF QUERIES FOR GREEN IT MANAGEMENT - Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated. | 12-20-2012 |
20130174269 | MANAGING LICENSE KEYS - For managing license keys, a license key service module creates a license key service object of a license key service class. The license key service object includes a plurality of management operations including a get all license keys operation that acquires a license key for licensing services. A hosted license key service module creates a hosted license key service object of a hosted license key service class that includes the license key service object. A license key module creates a license key object of a license key class. The license key object includes the license key and employs the plurality of management operations. A management module manages the license key using the license key object, license key service object, and hosted license key service object. | 07-04-2013 |
20130179460 | PREDICTING A COMMAND IN A COMMAND LINE INTERFACE - An apparatus for predicting a command in a command line interface includes a template command module, a parameter derivation module, and a parameter substitution module. The template command module is configured to determine a template command based on a command line history. The template command includes a command name and a parameter and the command line history includes two or more previously entered commands. The parameter derivation module is configured to determine a parameter derivation rule for deriving the parameter in the template command based on the command line history. The parameter substitution module is configured to substitute a substitute parameter for the parameter of the template command according to the parameter derivation rule. | 07-11-2013 |
20140089482 | DEVICE MANAGEMENT FOR DETERMINING THE AFFECTS OF MANAGEMENT ACTIONS - Aspects of the present invention disclose a system, method and program product for determining the affects of management actions. In an example, a computer determines a connectivity between one or more devices within a management inventory that are connected via a network. The computer determines a connectivity between the one or more devices within the management inventory after a proposed management action. The computer determines the one or more devices affected by the proposed management action. The computer sends a query to the one or more devices affected by the proposed management action for specific impacts of the proposed management action. The computer receives data related to the specific impacts of the proposed management action from the one or more devices affected by the proposed management action. | 03-27-2014 |
20140222869 | METHOD, COMPUTER SYSTEM, AND PHYSICAL COMPUTER STORAGE MEDIUM FOR ORGANIZING DATA INTO DATA STRUCTURES - Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage. | 08-07-2014 |