Intra-disk backup
    11.
    发明专利

    公开(公告)号:GB2336921B

    公开(公告)日:2002-07-10

    申请号:GB9821445

    申请日:1998-10-05

    Applicant: IBM

    Abstract: A method, system and computer program product in which half of the storage space on a non-volatile storage device is used to maintain a copy of the last "known-good" copy of the operating system and on invocation by a user, restoring from this backup copy when, for example, the operating system has become corrupted due to changes made to settings or device drivers.

    Recovery of data on computer non-volatile storage

    公开(公告)号:GB2336921A

    公开(公告)日:1999-11-03

    申请号:GB9821445

    申请日:1998-10-05

    Applicant: IBM

    Abstract: Recovery from corruption of data stored on a computer non-volatile storage device, in particular when the operating system has become corrupted due to changes made to settings or device drivers, and the computer is incapable of booting up. The computer non-volatile memory is partitioned into at least two partitions, which may occupy the same hard disk or different disks. The first partition stores the data, a "last known good" copy of which is backed up to the second partition, for example immediately after the system is first installed or immediately after a successful bootup. The backup application program copies the data sector by sector, fig. 3. The POST/BIOS code held in ROM provides a restoration function which, when invoked via a special user key input combination, copies each sector of the second partition back to the corresponding sector of the first partition, fig. 4. Thus the computer is able to boot from this "known good" configuration.

    Automatic error recovery in data processing systems

    公开(公告)号:GB2329266A

    公开(公告)日:1999-03-17

    申请号:GB9719112

    申请日:1997-09-10

    Applicant: IBM

    Abstract: An error recovery technique is disclosed, suitable for use for the automatic installation of software to a client data processing system from a connected server data processing system. The installation process is made up of a plurality of operations executing on the client, for example format client disk drive, 318, load DOS, 324, and so on. Monitoring the successful completion of each of these operations on the client is watchdog timer code which preferably takes the form of device driver software received, 308, from the server system early in the installation process. At the beginning of each operation, a preselected time value is written, 316, to a counter in the watchdog timer, this time value representing a time period which is greater than the time normally taken for the respective operation to complete. If the counter expires before the operation is complete (if for example the server system or network fails), the client invokes an error recovery procedure which may for example involve rebooting, 342, the client.

    BOOT REQUEST SCHEDULING IN DATA PROCESSING IN DATA PROCESSING NETWORK

    公开(公告)号:GB2328046A

    公开(公告)日:1999-02-10

    申请号:GB9716796

    申请日:1997-08-08

    Applicant: IBM

    Abstract: A data processing network comprises a plurality of client systems (30,32,34,36) and a controlling server system (20) operable to issue wake-up requests to the client systems to cause them to issue boot requests onto the network for servicing by a connected server system. The controlling system, which may be embodied in the server system or in a separate system issues the wake-up requests in accordance with a wake-up schedule calculated, for each client, to complete the boot process for that client before a target start-up time when that client user normally uses the client system.

    Cooling-off period for destructive software

    公开(公告)号:GB2343026B

    公开(公告)日:2003-02-26

    申请号:GB9823240

    申请日:1998-10-24

    Applicant: IBM

    Abstract: In a computer system, a user action can cause a computer program to perform actions which may destroy data stored on the computer or on an associated computer. User actions are managed to reduce this possibility by testing the consequences of the user action and if the consequences of the user action are benign, the user action is completed. If the consequences are not benign, a delay period prior to completing the user action is initiated. During this delay period, the user is able to cancel the user action.

    Data processing network
    19.
    发明专利

    公开(公告)号:GB2318434B

    公开(公告)日:2001-08-15

    申请号:GB9621556

    申请日:1996-10-16

    Applicant: IBM

    Abstract: A data processing network has a client connected to first and second servers in which the first and second servers are operable to communicate with the network according to first and second incompatible data communication protocols. The client is operable to issue, onto the network, a first initial boot request (e.g. RPL) according to the first data communication protocol (IEEE 802.2) and the first server is operable, in response to the client request to send BOOTP bootstrap code to the client system. The BOOTP bootstrap code is loaded into client memory and when executed causes the client to issue a BOOTP request for servicing by the second server system.

    Initial program load in data processing network

    公开(公告)号:GB2311390B

    公开(公告)日:2000-03-22

    申请号:GB9605670

    申请日:1996-03-18

    Applicant: IBM

    Abstract: A client is arranged so that at power up it makes a request to a server for first boot code which allows the client to boot from its own mass storage. Since the OS is not sent from the server over the network, traffic flow is eased whilst strict control of client software type is maintained. The configuration of a client may be checked prior to software, particularly OS, installation by a server. The server, detecting a new client on the network, down-loads scan code onto the client. The client then runs the scan code and returns hardware configuration data to the server. If the OS of the client is to be modified then the server sends different, second boot code to the client which instructs the client to boot (a new OS) directly from the server. The OS from the server is then installed on the client mass storage device, and subsequent IPLs take place using the first boot code.

Patent Agency Ranking