-
公开(公告)号:GB2605057A
公开(公告)日:2022-09-21
申请号:GB202207396
申请日:2020-11-03
Applicant: IBM
Inventor: LOKESH MOHAN GUPTA , MATTHEW BORLICK , KYLER ANDERSON , KEVIN ASH
IPC: G06F12/08
Abstract: A method for demoting data from a cache comprising heterogeneous memory types maintains, for a data element in the cache, a write access count that is incremented each time the data element is updated in the cache. The cache includes a higher performance portion and a lower performance portion. The method removes the data element from the higher performance portion in accordance with a cache demotion algorithm. If the data element also resides in the lower performance portion and the write access count is below a first threshold, the method leaves the data element in the lower performance portion. If the data element also resides in the lower performance portion and the write access count is at or above the first threshold, the method removes the data element from the lower performance portion.
-
公开(公告)号:GB2579992B
公开(公告)日:2022-04-13
申请号:GB202003940
申请日:2018-09-06
Applicant: IBM
Inventor: LOKESH MOHAN GUPTA , MATTHEW BORLICK
IPC: H04L67/1097 , G06F3/06 , H04L41/5022 , H04L61/50
Abstract: A computer-implemented method for utilizing cloud storage as a rank comprises allocating storage space on one or more cloud storage devices via a cloud interface; mapping the allocated storage space to corresponding virtual local addresses; grouping the virtual local addresses to create one or more virtual local ranks from the allocated storage space on the one or more cloud storage devices; converting local data access requests for the one or more virtual local ranks to cloud data access requests configured for the cloud interface; and communicating the cloud data access requests to the one or more cloud storage devices via the cloud interface.
-
公开(公告)号:GB2580263B
公开(公告)日:2021-11-17
申请号:GB202004106
申请日:2018-08-20
Applicant: IBM
Inventor: LOKESH M GUPTA , MATTHEW BORLICK
IPC: G06F3/06
Abstract: An example method for dynamic data relocation using cloud based ranks comprises monitoring accesses to data stored on a plurality of local ranks of an enterprise storage system; identifying data which has not been accessed for a predetermined amount of time based on the monitored accesses; and moving the data which has not been accessed for the predetermined amount of time to one or more cloud based ranks of the enterprise storage system, wherein each cloud based rank comprises storage space on one or more cloud storage devices, the storage space on the one or more cloud storage devices mapped to corresponding virtual local addresses that are grouped as a virtual local rank.
-
公开(公告)号:GB2586409B
公开(公告)日:2021-07-14
申请号:GB202016053
申请日:2019-03-06
Applicant: IBM
Inventor: LOKESH GUPTA , MATTHEW BORLICK , TRUNG N NGUYEN , MICAH ROBISON
Abstract: Provided are a computer program product, system, and method for injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. A specified type of command is processed in application code and, in response, trap code is executed to allocate a trap address range. The specified type of command is executed in the application code. A determination is made as to whether an accessing application accesses the trap address range. At least one of transmitting a notification that the accessing application comprises potentially malicious code, monitoring the execution of the accessing application, and restricting execution of the accessing application is performed in response to determining that the accessing application accessed the trap address range.
-
公开(公告)号:GB2586409A
公开(公告)日:2021-02-17
申请号:GB202016053
申请日:2019-03-06
Applicant: IBM
Inventor: LOKESH GUPTA , MATTHEW BORLICK , TRUNG N NGUYEN , MICAH ROBISON
Abstract: Provided area computer program product, system, and method for injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. A specified type of command is processed in application code and, in response, trap code is executed to allocate a trap address range. The specified type of command is executed in the application code. A determination is made as to whether an accessing application accesses the trap address range. At least one of transmitting a notification that the accessing application comprises potentially malicious code, monitoring the execution of the accessing application, and restricting execution of the accessing application is performed in response to determining that the accessing application accessed the trap address range.
-
公开(公告)号:GB2586398A
公开(公告)日:2021-02-17
申请号:GB202015329
申请日:2019-02-27
Applicant: IBM
Inventor: LOKESH GUPTA , MATTHEW BORLICK , ROGER HATHORN
IPC: G06F17/00
Abstract: In one aspect of the present description, safe data commit scan operations of individual data storage systems of a distributed data storage system may be synchronized to reduce the occurrence of reductions in input/output (I/O) response times. In one embodiment, a set of safe data commit scan operations of the individual data storage systems of a distributed data storage system are synchronously timed to substantially overlap in time within a single synchronized safe data commit scan set interval to reduce or eliminate the occurrences of reductions in input/output response times outside the synchronized safe data commit scan set interval. Other features and aspects may be realized, depending upon the particular application.
-
公开(公告)号:GB2584064A
公开(公告)日:2020-11-18
申请号:GB202014835
申请日:2019-02-15
Applicant: IBM
Inventor: MATTHEW BORLICK , LOKESH GUPTA , KEVIN JOHN ASH , KARL ALLEN NIELSEN
Abstract: In one embodiment, virtual storage drives are allocated to RAID arrays so that no two virtual storage drives of a RAID array are mapped to the same physical storage drive. In another aspect, error handling routines are limited to virtual storage drives impacted by an error in a physical storage drive so that virtual storage drives of the physical storage drive not impacted by the error are bypassed. In yet another aspect, cache operations to a target virtual storage drive may be throttled as a function of both a limit imposed on cache operations directed to the RAID array to which the virtual storage drive is allocated, and a separate limit on cache operations directed to a group of virtual storage drives which are mapped to the same physical storage drive as the target virtual storage drive. Other features and aspects may be realized, depending upon the particular application.
-
-
-
-
-
-