Patent application number | Description | Published |
20090164513 | Method and Apparatus For Mapping Encrypted and Decrypted Data Via Key Management System - A data processing system having a host computer including a key manager, a control unit connected to the host computer, a data storage unit (such as a tape drive) controlled by the control unit, and data storage medium for storing data thereon to be written to or read from by the data storage unit. The key manager stores a data structure having at least one record having a volume serial number, as start location, a length entry, and a key for encrypting and decrypting data on the data storage medium. A data storage medium (such as data tape) is mounted on the data storage unit, and a volume recorded on the tape is retrieved. The control unit retrieves the data structure from the key manager and matches the volume serial number recorded in the retrieved data structure with the volume serial number retrieved from the data storage medium. It they match, the control unit passes to the data storage unit, commands to turn on or turn off encryption dependent upon the location where data is written by the data storage unit onto the data storage medium, or to turn on or turn off decryption dependent upon the location where data is read by the data storage unit from the data storage medium. | 06-25-2009 |
20090164715 | Protecting Against Stale Page Overlays - A method, data processing system and program product for protecting against stale page overlays which includes executing a process in memory of the data processing system. A storage controller pages data from the memory to a disk in pages when the memory is constrained by other processes being executed by the data processing system. Data is then paged from the disk into memory in a one or more paged-in pages. The paged-in page is updated with updated data by the process, and the version on the disk is marked as stale. The storage controller commands the disk to make the stale disk version of the updated paged-in page as write-only, thereby providing that the disk version may be overwritten with new data while providing that the disk version cannot be read. | 06-25-2009 |
20090164842 | METHOD AND SYSTEM FOR ENTERPRISE MEMORY MANAGEMENT OF MEMORY MODULES - A method and system for enterprise memory management of memory modules of a computer system. The method includes scanning memory chips of a memory module for errors, analyzing a scrub error map corresponding to a scrubbing operation of the memory module, generating a scrub map summary based upon the scrub error map analyzed, creating an error history map by adding the scrub map summary generated, analyzing the error history map created and tracking a chip location for each memory chip of the memory module including errors, and determining a scrubbing algorithm of the memory module based on the analyzed error history map. The enterprise memory management system includes a plurality of computers each including memory modules, and an enterprise memory manager which collects and analyzes error history maps corresponding to each computer and determines a scrubbing algorithm of the memory modules of each computer. | 06-25-2009 |
20090164855 | METHOD FOR SCRUBBING STORAGE IN A COMPUTER MEMORY - A method for scrubbing storage in a computer memory which includes a plurality of memory modules each having plurality of memory chips. The method includes selecting a pattern that correlates with physical structures for scanning the memory chips of the memory modules for errors, scanning a memory chip of a memory module for errors based upon the selected pattern. The method further includes successively scanning remaining memory chips of the respective memory module for errors when an error is found in the scanned memory chip, and scanning a memory chip of another memory module when an error is not found in the scanned memory chip of the respective memory module. | 06-25-2009 |
20090187962 | METHODS, DEVICES, AND COMPUTER PROGRAM PRODUCTS FOR POLICY-DRIVEN ADAPTIVE MULTI-FACTOR AUTHENTICATION - Embodiments of the invention include methods for providing policy-driven, adaptive, multi-factor authentication procedures. A pool of potential authentication challenges is defined. Each of the potential authentication challenges is assigned a category and a weighted difficulty level. One or more authentication challenges are selected from the pool of potential authentication challenges using one or more security policies that are based upon the assigned category and the assigned weighted difficulty level, wherein a quantity of authentication challenges is determined using the one or more security policies. One or more historical access patterns are utilized in conjunction with the selected one or more authentication challenges to authenticate a user, wherein the historical access patterns include at least one of an access time or an access location. One or more dummy challenges are used to authenticate the user. | 07-23-2009 |
20090193508 | METHODS, DEVICES, AND COMPUTER PROGRAM PRODUCTS FOR DISCOVERING AUTHENTICATION SERVERS AND ESTABLISHING TRUST RELATIONSHIPS THEREWITH - Using an authentication server to discover one or more additional authentication servers and to dynamically establish a trust relationship with the one or more additional authentication servers. The authentication server searches for the one or more additional authentication servers to discover one or more sources of authentication tokens, and inspects an incoming authentication request from the one or more additional authentication servers to determine if the request is carrying one or more authentication tokens from a newly discovered realm. Once the authentication server determines a newly discovered realm to be trustworthy, the authentication server receives a directory schema from the newly discovered realm and compares the received directory schema with a known directory schema retrieved by the authentication server to identify an intersection of the received directory schema and the known directory schema. The authentication server uses the intersection to identify a primary key, and to identify any unique information that is specific to either the authentication server or the newly discovered realm. | 07-30-2009 |
20090220089 | METHOD AND APPARATUS FOR MAPPING ENCRYPTED AND DECRYPTED DATA VIA A MULTIPLE KEY MANAGEMENT SYSTEM - A method, apparatus and program product for encryption/decryption of data on a volume of data storage media including dividing the volume into a plurality of locations, assigning a unique key to each location for encryption/decryption of data in the respective location of the volume, mapping the locations and keys in the key manager, and encrypting/decrypting data on the volume based on the data's physical location on the volume. The owning entity owning each location on the volume may also be mapped, and the keys for each location owned by the same owning entity may be the same. | 09-03-2009 |
20100023944 | Suspend Profiles and Hinted Suspending - Methods, systems and computer program products for suspend profiles and hinted suspending. Exemplary embodiments include a suspend mode management method, including determining a task to perform in the computer system during a suspend period of the computer system, detecting a suspend event in the computer system, the suspend event initiating the suspend period and performing the task during the suspend period. | 01-28-2010 |
20100179931 | DEVELOPING SYSTEM THINKERS - The system thinker application receives a first issue, a first resolution to the first issue, and a first plurality of skills. The system thinker application searches a system environment electronic profile for a second issue, a second resolution to the second issue, and a second plurality of skills, wherein the system environment electronic profile contains a plurality of component profiles, and wherein the plurality of component profiles contain a second issue, a second resolution to the second issue, and a second plurality of skills. The system thinker application determines if the first issue, the first resolution to the first issue, and any one of the first plurality of skills are similar to any one of the second issue, the second resolution to the second issue, and any one of the second plurality of skills. The system thinker application adds skills to the system environment electronic profile and the component profile. | 07-15-2010 |
20110099344 | FACILITATING DATA COMPRESSION DURING REPLICATION USING A COMPRESSIBLE CONFIGURATION BIT - Computer program product, system and method are provided for facilitating data replication in a storage system. A logical volume of a first storage array of a replicated pair is preconfigured with one or more logical volume attributes, which include a compressible configuration bit that indicates whether data blocks to be stored to that logical volume are compressible during replication. Subsequently, with receipt of a data block at the first storage array to be stored to the logical volume, a check of the compressible configuration bit is made to determine whether the data block is compressible during replication, and if so, the data block is compressed for replication. The compressible configuration bit is placed into the payload region of the data packet being replicated to the second storage array. At the second storage array, the compressible configuration bit is used to determine whether to uncompress the replicated data block. | 04-28-2011 |
20110153964 | PRIORITIZING SUBGROUPS IN A CONSISTENCY GROUP - A method which prioritizes the subgroups in a consistency group by usage and/or business process. Thereafter, in case of abnormal operation of the process for copying the consistency group from primary storage to secondary storage, only a portion of the subgroups of the consistency group are copied from primary storage to secondary storage. | 06-23-2011 |
20120203987 | FACILITATING DATA COMPRESSION DURING REPLICATION USING A COMPRESSIBLE CONFIGURATION BIT - A method is provided for facilitating data replication in a storage system. A logical volume of a first storage array of a replicated pair is preconfigured with one or more logical volume attributes, which include a compressible configuration bit that indicates whether data blocks to be stored to that logical volume are compressible during replication. Subsequently, with receipt of a data block at the first storage array to be stored to the logical volume, a check of the compressible configuration bit is made to determine whether the data block is compressible during replication, and if so, the data block is compressed for replication. The compressible configuration bit is placed into the payload region of the data packet being replicated to the second storage array. At the second storage array, the compressible configuration bit is used to determine whether to uncompress the replicated data block. | 08-09-2012 |
20130007010 | REQUIREMENTS EXTRACTION FROM EXTERNAL SOURCES FOR SOFTWARE LIFECYCLE MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for software requirements extraction from external sources for software development. In an embodiment of the invention, a method for software requirements extraction from external sources for software development includes retrieving content from over a computer communications network pertaining to a product. The content can include by way of example, a Web page, e-mail message, instant message, blog posting or social network posting, to name only a few. Within the content, a modal verb can be identified and text extracted that is proximate to the modal verb. Thereafter, a requirement can be generated for a revision of the product based upon the extracted text. Optionally, the requirement can be ranked according to the modal verb, for example, an imperative modal verb can correspond to a higher ranking than a suggestive modal verb. | 01-03-2013 |
20130019063 | STORAGE CONTROLLER CACHE PAGE MANAGEMENTAANM Astigarraga; TaraAACI TucsonAAST AZAACO USAAGP Astigarraga; Tara Tucson AZ USAANM Browne; Michael E.AACI StaatsburgAAST NYAACO USAAGP Browne; Michael E. Staatsburg NY USAANM Demczar; JosephAACI Salt PointAAST NYAACO USAAGP Demczar; Joseph Salt Point NY USAANM Wieder; Eric C.AACI New PaltzAAST NYAACO USAAGP Wieder; Eric C. New Paltz NY US - A cache page management method can include paging out a memory page to an input/output controller, paging the memory page from the input/output controller into a real memory, modifying the memory page in the real memory to an updated memory page and purging the memory page paged to the input/output controller. | 01-17-2013 |
20130024842 | SOFTWARE TEST AUTOMATION SYSTEMS AND METHODS - Described are a system and method for performing an automated quality assessment on a software program under test. A test automation system executes a test on a software program Data related to the test is automatically collected. The data includes first information determined by the test automation system in response to executing the test. The data further includes second information related to the test and received from a source other than the test automation system. The first information is analyzed. A quality assessment of the software program is generated from the analyzed first information and from the second information. | 01-24-2013 |
20130024847 | SOFTWARE TEST AUTOMATION SYSTEMS AND METHODS - Described are a system and method for performing an automated quality assessment on a software program under test. A test automation system executes a test on a software program Data related to the test is automatically collected. The data includes first information determined by the test automation system in response to executing the test. The data further includes second information related to the test and received from a source other than the test automation system. The first information is analyzed. A quality assessment of the software program is generated from the analyzed first information and from the second information. | 01-24-2013 |
20130191105 | VIRTUAL SYSTEMS TESTING - According to exemplary embodiments, a computer program product for testing virtual systems includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method comprises randomly selecting commands from a pool of commands, generating by a computer a test sequence from the randomly selected commands and simulating performance of the test sequence for a simulated virtual system that is a model of a virtual system. The method also includes recording simulated results of the simulated performance, performing the test sequence on the virtual system, recording actual results of the test sequence being performed on the virtual system, and determining by a computer if the virtual system is operating properly based on a comparison of the simulated results to the actual results. | 07-25-2013 |
20140081615 | VIRTUAL SYSTEMS TESTING - According to exemplary embodiments, a computer program product for testing virtual systems includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method comprises randomly selecting commands from a pool of commands, generating by a computer a test sequence from the randomly selected commands and simulating performance of the test sequence for a simulated virtual system that is a model of a virtual system. The method also includes recording simulated results of the simulated performance, performing the test sequence on the virtual system, recording actual results of the test sequence being performed on the virtual system, and determining by a computer if the virtual system is operating properly based on a comparison of the simulated results to the actual results. | 03-20-2014 |
20140160952 | DETECTING AND ISOLATING DROPPED OR OUT-OF-ORDER PACKETS IN COMMUNICATION NETWORKS - A processor-implemented method for analyzing dropped or out of order data packets that are sent from an initiating device over a communications network is provided. The processor-implemented method may include receiving, by a processor, a predetermined plurality of test data packets from the initiating device over the communications network. At least one of the predetermined plurality of test data packets that are dropped or received out of order may be determined by the processor. A header portion corresponding to the at least one of the predetermined plurality of test data packets that are dropped or received out of order may then be accessed. The accessed header portion is sent, by the processor, to the initiating device, whereby the accessed header portion may include information associated with a device location at which the one or more of the predetermined plurality of test data packets are dropped or received out of order. | 06-12-2014 |
20140177455 | METHOD AND APPARATUS TO MONITOR AND ANALYZE END TO END FLOW CONTROL IN AN ETHERNET/ENHANCED ETHERNET ENVIRONMENT - A method and system for monitoring and analyzing flow control of packets in a communications network which includes multiple data transmission paths. The communications network has a first data path including an initiating node and a target node. A test frame is generated by an initiator module of a program executed by a computer for transmission over the first data path. The initiator module transmits the test frame over the first data path from the initiating node to the target node, wherein the test frame records a starting timestamp recorded by the initiating node upon transmitting the test frame. The test frame records a half trip timestamp recorded by the target node upon the test frame being received by the target node. The test frame records an end timestamp recorded by the initiating node, upon the test frame being received at the initiating node from the target node. | 06-26-2014 |