Patent application number | Description | Published |
20090055738 | Techniques for Providing Dynamic Help Content for a Command Line Interface - A technique for providing assistance to a user of a system includes receiving a current command entered into a command line interface of the system and determining a current state of a system. Command help for the current command is then generated based on the current state of the system. | 02-26-2009 |
20090070455 | APPARATUS, SYSTEM, AND METHOD FOR VISUAL LOG ANALYSIS - An apparatus, system, and method are disclosed for visual log analysis. The apparatus for visual log analysis is provided with a plurality of modules configured to functionally execute the necessary steps of retrieving log entries from a plurality of devices on a network, parsing the log entries to determine an execution flow of commands executed of the network, and displaying a graphical representation of such execution on the network. These modules in the described embodiments include a log consolidation module, a parsing module, and a display module. | 03-12-2009 |
20090172541 | METHOD AND SYSTEM FOR PROVIDING DYNAMIC CONTEXT ASSIST FOR A COMMAND LINE INTERFACE - A method, system, and computer program product for providing dynamic context assistance to a user of a system, such as a storage system. One or more current command line interface (CLI) entries that are entered in a CLI of the system are received and a current state of the system is determined. Dynamic context assistance is then generated for one or more current CLI entries based on entered values of the one or more CLI entries. In this regard, the dynamic context assistance can be generated and displayed in a text or graphical form when one or more dynamic context assist keys are entered in the CLI in conjunction with the current CLI entry. | 07-02-2009 |
20090187650 | Method and system for determining probability for availability in an instant message system - This invention provides a method or a system to track, query, and display an accurate time for the availability of other users in an instant messaging environment. The solution provides an advantage over the known solutions by providing an accurate estimation of the time for the user to be online, thus avoiding waiting for the person to log on during a timeframe where the person typically does not log on. This is a common occurrence where team members are located on the other side of the world. | 07-23-2009 |
20090187888 | METHOD FOR SINGLETON PROCESS CONTROL - A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. The PID is stored by a parent process and subsequently accessed by the background process. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed. | 07-23-2009 |
20090193088 | Dynamic message correction - A system is presented to allow users in an instant messaging environment to edit already-exchanged messages dynamically, and resend the edited version of the message to the target users, as an example. The newly edited message received by the second user is clearly understandable because the corrected parts of the message have been tagged. Depending on the implementation, either a new complete and corrected message is sent, or the sent message indicates the recent editions. The altering user should go over the communication text, change or edit the text, and press ENTER. | 07-30-2009 |
20090198699 | REMOTE SPACE EFFICIENT REPOSITORY - A method for storing data includes establishing a space efficient storage system including a virtual repository, a staging repository and a remote repository. The virtual repository includes a first pointer to the staging repository, and the staging repository includes a second pointer to the remote repository. The method further includes receiving data at the virtual repository, storing the received data in the staging repository based on the first pointer, and determining a data access frequency based on the storage in the staging repository. In addition, the method includes comparing the determined data access frequency to a threshold frequency and transferring the stored data to the remote repository based on the second pointer and comparison and storing the stored data at the staging repository based on the comparison. | 08-06-2009 |
20090198710 | REMOTE SPACE EFFICIENT REPOSITORY - A method for storing data includes establishing a space efficient storage system including a virtual repository, a staging repository and a remote repository. The virtual repository includes a first pointer to the staging repository, and the staging repository includes a second pointer to the remote repository. The method further includes receiving data at the virtual repository, storing the received data in the staging repository based on the first pointer, and transferring the stored data to the remote repository based on the second pointer. | 08-06-2009 |
20090199187 | CONCURRENT EXECUTION OF MULTIPLE PRIMITIVE COMMANDS IN COMMAND LINE INTERFACE - A method to concurrently execute multiple primitive commands in a command line interface (CLI) is provided. Each of a plurality of signal parameters is designated for each of a plurality of primitive commands. The plurality of primitive commands is encapsulated into a header CLI command. The CLI command is executed. | 08-06-2009 |
20090249016 | APPARATUS AND METHOD TO ESTABLISH A LOGICAL CONFIGURATION FOR A DATA STORAGE LIBRARY - A method to configure a storage library, comprising the steps of establishing a logical configuration for said storage library comprising a plurality of physical objects, by configuring a plurality of logical objects using a plurality of logical configuration commands, and adding that plurality of logical objects to the logical configuration. The method further adds the plurality of logical configuration commands to a Configuration Library, and saves that Configuration Library for later use. | 10-01-2009 |
20090254468 | ON-DEMAND VIRTUAL STORAGE CAPACITY - A system, method, and computer program product for providing on-demand storage capacity on a remote storage server to a customer is provided. A virtual array site code is received. The remote storage server is virtually connected to a local storage server of the customer in response to receiving the virtual array site code. A virtual array site object is created on the local storage server corresponding to an array site object on the remote storage server. | 10-08-2009 |
20090254636 | VIRTUAL ARRAY SITE CONFIGURATION - A method, system, and computer program product of configuring a virtual array site on a remote storage server is provided. The virtual array site provides on-demand storage capacity to a local storage server of a customer. The method includes creating a virtual array. The virtual array incorporates an attribute selectable by the customer. A virtual extent pool is created. The virtual extent pool is associated with the virtual array. A volume associated with the virtual extent pool is created. The volume comprises at least a portion of the virtual array site. | 10-08-2009 |
20090254716 | COORDINATED REMOTE AND LOCAL MACHINE CONFIGURATION - A method, system, and computer program product for coordinating the configuration of local and remote storage subsystems for a local client is provided. A command sender is configured on a local storage subsystem to create remote command objects based on commands received from the local client, and deliver the remote command objects to a remote storage subsystem for execution. A command receiver is configured on the remote storage subsystem, the command receiver service having an interface to receive the remote command objects. A remote connection bucket is configured to manage at least one connection between the local storage subsystem and the remote storage subsystem. | 10-08-2009 |
20100100833 | METHOD TO CREATE AND USE AN ASPECT ORIENTED COLOR CODING ALGORITHM FOR A GRAPHICAL USER INTERFACE - A method to create an aspect oriented, color coding algorithm for a graphical user interface, wherein a graphical user interface (“GUI”) is generated when a code base is executed, and wherein the GUI comprises a plurality of interactable graphical objects, wherein the method compiles the code base, identifies in the compiled code base a first object join point, wherein the compiled code base at the first object join point creates and displays a first interactable graphical object, and determines a first address in the code base for the first object join point. The method further creates a mapping table, writes the first interactable graphical object and the first address to that mapping table, and encodes the mapping table in an aspect oriented, color coding algorithm written to a computer readable medium. | 04-22-2010 |
20100175075 | METHOD FOR EXECUTING A SOFTWARE ROUTINE IDENTIFIED IN A TASK OBJECT - A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server. The method further includes generating a task object generation command having at least a first software routine identifier, parameter data, and link task information and generating a second task object in response to the task object generation command. The second task object includes the first software routine identifier, the parameter data, and the link task information. The method further includes adding the second task object to a task execution queue on the computer server and executing the first software routine identified by the first software routine identifier in the second task object on the computer server to obtain at least a first result value, when the first flag value is a first predetermined value and the result parameter associated with the first task object corresponds to a second predetermined value. | 07-08-2010 |
20100175076 | METHOD FOR EXECUTING A SOFTWARE ROUTINE IDENTIFIED IN A TASK OBJECT - A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server, and generating a task object generation command having at least a first software routine identifier, parameter data, and event information. The event information has an event identifier and a first flag value. The method further includes generating a first task object in response to the task object generation command, which includes the first software routine identifier, the parameter data, and the event information. The method further includes adding the first task object to a task execution queue on the computer server, and executing the first software routine identified by the first software routine identifier in the first task object on the computer server to obtain at least a first result value, when an event listener on the computer server determines that the first flag value is a first predetermined value and an event associated with the event identifier is detected. | 07-08-2010 |
20100238041 | APPARATUS, SYSTEM, AND METHOD FOR SCALABLE MEDIA OUTPUT - An apparatus, system, and method are disclosed for scalable media output. The apparatus includes a proximity sensor module to detect the presence and proximity of a user, and to generate presence and proximity data in response to the location of the user with respect to the proximity sensor module. The sensor control module is configured to scale the media output of a media device. The system includes the apparatus and a display module configured to output visual information and an audio module configured to output aural information. The method includes detecting the presence and proximity of a user, generating presence and proximity data in response to the location of the user with respect to a proximity sensor module, communicating the presence and proximity data with a sensor control module, and scaling the media output of a media device in response to the presence and proximity data. | 09-23-2010 |
20100241842 | Method for Command Line Interface Restore Points with Support for an Atomic Sets of Commands - The present invention introduces methods for controlling and configuring systems using a new command line interface (CLI) command. The CLI command allows a user to set a save point or a restore point of the configuration (e.g., setsavepoint). After the CLI command is executed, the user can continue issuing configuration commands. In addition, if at some point the user wants to go back to the restore point, the user can issue an additional command which generates a CLI script containing all of the commands that need to be executed in order to modify the configuration such that it goes back to its state at the point at which the restore point was set. | 09-23-2010 |
20110016082 | APPARATUS AND METHOD TO REPLICATE REMOTE VIRTUAL VOLUMES TO LOCAL PHYSICAL VOLUMES - An automated method to replicate remote virtual files to local physical files is presented, wherein the method provides a replication algorithm comprising computer readable program code that can be used by a programmable computer processor to replicate the (N) remote virtual volumes to (N) local physical volumes, such that a computing device integral with those (N) local physical volumes can read data from, and write data to, each of the locally replicated virtual volumes without modifying volume assignments and without reconfiguring the computing device to communicate with the (N) local physical volumes. | 01-20-2011 |
20110016287 | METHOD FOR IMPLEMENTING ON DEMAND CONFIGURATION CHANGES - A method for implementing on-demand configuration of a logical volume, wherein the method monitors the amount of available storage capacity of the logical storage volume and determines whether the available storage capacity exceeds a predetermined threshold, such as a percentage of available logical storage space. If the method determines that the storage capacity of the logical storage volume is nearing full capacity, the method determines whether configured physical storage space is available. If the method determines that configured physical storage space is available, the method then reconfigures the logical storage volume to include the configured physical storage space. If configured physical storage space is not available, the method locates unconfigured physical storage space, configures the available physical storage space, and reconfigures the logical volume using the configured physical storage space. | 01-20-2011 |
20120005672 | IMAGE MANAGEMENT FOR VIRTUAL MACHINE INSTANCES AND ASSOCIATED VIRTUAL STORAGE - A storage management method and computer program serves as an intermediary between storage subsystems and a virtual machine manager, e.g., a hypervisor. The storage management provides a unified user interface for configuration and unifies handling virtual machine image storage/retrieval, as well as management of virtual disk volumes provided to the operating systems and applications within virtual machine images. The images including the virtualized storage along with the entire state of the virtual machine form snapshots that can be cloned, stored when taking a virtual machine off-line and loaded when the virtual machine is being brought on-line. | 01-05-2012 |
20120005673 | STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host. | 01-05-2012 |
20120089725 | METHODS AND SYSTEMS FOR VERIFYING SERVER-STORAGE DEVICE CONNECTIVITY - Methods and systems for verifying server-storage device connectivity in a storage area network (SAN) environment are provided. One system includes determining which of a plurality of storage devices a server is physically connected and determining which of the plurality of storage devices a zoning configuration in the SAN environment enables the server to access. The method further includes returning to a user an indication of each storage device in the plurality of storage devices that the server is both physically connected and includes zoning access. One system includes a server, a plurality of storage devices, a switch fabric coupling the server to the plurality of storage devices, and a processor coupled to the server, the plurality of storage devices, and each device in the switch fabric. In this system, the processor is configured to perform the method discussed above. | 04-12-2012 |
20120173856 | Determining Logical Configuration Commands to Create a Logical Object - An approach to generating logical configuration commands for logical objects in a system. A method may involve receiving a command requesting the logical configuration commands to configure the specified logical object (subject logical object) and the logical objects that support the logical object (the support logical objects). The method may also involve determining what logical objects in the system support the subject logical object. This may require determining the support logical objects that directly support the subject logical object, and then recursively examining each support logical objects to find the logical objects on which they depend. For each logical object (whether the subject logical object or one of the support logical objects), the method may involve determining the logical configuration commands to appropriately create and modify the logical object. The logical configuration commands may then be presented to the user. | 07-05-2012 |
20120185855 | IMAGE MANAGEMENT FOR VIRTUAL MACHINE INSTANCES AND ASSOCIATED VIRTUAL STORAGE - A storage management method provides an intermediary between storage subsystems and a virtual machine manager, e.g., a hypervisor. The storage management provides a unified user interface for configuration and unifies handling virtual machine image storage/retrieval, as well as management of virtual disk volumes provided to the operating systems and applications within virtual machine images. The images including the virtualized storage along with the entire state of the virtual machine form snapshots that can be cloned, stored when taking a virtual machine off-line and loaded when the virtual machine is being brought on-line. | 07-19-2012 |
20120197943 | METHOD, COMPUTER SYSTEM, AND PHYSICAL COMPUTER STORAGE MEDIUM FOR ORGANIZING DATA INTO DATA STRUCTURES - Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage. | 08-02-2012 |
20120198448 | STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host. | 08-02-2012 |
20120297039 | AUTOMATED DEPLOYMENT OF SOFTWARE FOR MANAGED HARDWARE IN A STORAGE AREA NETWORK - In one aspect of the present description, a systems manager based upon a common model of information protocol or standard includes automated storage area network (SAN) expansion management which permits additional provider modules to be automatically installed if needed in response to devices being added to the SAN. In addition, the automated SAN expansion management permits installed provider modules to be automatically configured in response to devices being added to the SAN. Still further, in another aspect, the automated SAN expansion management can automatically determine if a suitable host processor exists to host installation of a new provider module and if not, the automated SAN expansion management | 11-22-2012 |
20120303755 | ON-DEMAND VIRTUAL STORAGE CAPACITY - A system, method, and computer program product for providing on-demand storage capacity on a remote storage server to a customer is provided. A virtual array site code is received. The remote storage server is virtually connected to a local storage server of the customer in response to receiving the virtual array site code. Subsequent to receiving an activation request from the customer, a command is executed on the remote storage server to provide the virtual array site code to the customer. A virtual array site object is created on the local storage server corresponding to an array site object on the remote storage server. | 11-29-2012 |
20130179460 | PREDICTING A COMMAND IN A COMMAND LINE INTERFACE - An apparatus for predicting a command in a command line interface includes a template command module, a parameter derivation module, and a parameter substitution module. The template command module is configured to determine a template command based on a command line history. The template command includes a command name and a parameter and the command line history includes two or more previously entered commands. The parameter derivation module is configured to determine a parameter derivation rule for deriving the parameter in the template command based on the command line history. The parameter substitution module is configured to substitute a substitute parameter for the parameter of the template command according to the parameter derivation rule. | 07-11-2013 |
20130185529 | AUTOMATED DEPLOYMENT OF SOFTWARE FOR MANAGED HARDWARE IN A STORAGE AREA NETWORK - In one aspect of the present description, a systems manager based upon a common model of information protocol or standard includes automated storage area network (SAN) expansion management which permits additional provider modules to be automatically installed if needed in response to devices being added to the SAN. In addition, the automated SAN expansion management permits installed provider modules to be automatically configured in response to devices being added to the SAN. Still further, in another aspect, the automated SAN expansion management can automatically determine if a suitable host processor exists to host installation of a new provider module and if not, the automated SAN expansion management can automatically deploy a suitable host processor such as a virtual server to host installation of a new provider module. Other features and aspects may be realized, depending upon the particular application. | 07-18-2013 |
20130254770 | METHOD FOR SINGLETON PROCESS CONTROL - A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. The PID is stored by a parent process and subsequently accessed by the background process. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed. | 09-26-2013 |
20140089482 | DEVICE MANAGEMENT FOR DETERMINING THE AFFECTS OF MANAGEMENT ACTIONS - Aspects of the present invention disclose a system, method and program product for determining the affects of management actions. In an example, a computer determines a connectivity between one or more devices within a management inventory that are connected via a network. The computer determines a connectivity between the one or more devices within the management inventory after a proposed management action. The computer determines the one or more devices affected by the proposed management action. The computer sends a query to the one or more devices affected by the proposed management action for specific impacts of the proposed management action. The computer receives data related to the specific impacts of the proposed management action from the one or more devices affected by the proposed management action. | 03-27-2014 |
20140222869 | METHOD, COMPUTER SYSTEM, AND PHYSICAL COMPUTER STORAGE MEDIUM FOR ORGANIZING DATA INTO DATA STRUCTURES - Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage. | 08-07-2014 |