Duplicate-copy cache using heterogeneous memory types

    公开(公告)号:GB2605057A

    公开(公告)日:2022-09-21

    申请号:GB202207396

    申请日:2020-11-03

    Applicant: IBM

    Abstract: A method for demoting data from a cache comprising heterogeneous memory types maintains, for a data element in the cache, a write access count that is incremented each time the data element is updated in the cache. The cache includes a higher performance portion and a lower performance portion. The method removes the data element from the higher performance portion in accordance with a cache demotion algorithm. If the data element also resides in the lower performance portion and the write access count is below a first threshold, the method leaves the data element in the lower performance portion. If the data element also resides in the lower performance portion and the write access count is at or above the first threshold, the method removes the data element from the lower performance portion.

    Storage system using cloud storage as a rank

    公开(公告)号:GB2579992B

    公开(公告)日:2022-04-13

    申请号:GB202003940

    申请日:2018-09-06

    Applicant: IBM

    Abstract: A computer-implemented method for utilizing cloud storage as a rank comprises allocating storage space on one or more cloud storage devices via a cloud interface; mapping the allocated storage space to corresponding virtual local addresses; grouping the virtual local addresses to create one or more virtual local ranks from the allocated storage space on the one or more cloud storage devices; converting local data access requests for the one or more virtual local ranks to cloud data access requests configured for the cloud interface; and communicating the cloud data access requests to the one or more cloud storage devices via the cloud interface.

    Dynamic data relocation using cloud based ranks

    公开(公告)号:GB2580263B

    公开(公告)日:2021-11-17

    申请号:GB202004106

    申请日:2018-08-20

    Applicant: IBM

    Abstract: An example method for dynamic data relocation using cloud based ranks comprises monitoring accesses to data stored on a plurality of local ranks of an enterprise storage system; identifying data which has not been accessed for a predetermined amount of time based on the monitored accesses; and moving the data which has not been accessed for the predetermined amount of time to one or more cloud based ranks of the enterprise storage system, wherein each cloud based rank comprises storage space on one or more cloud storage devices, the storage space on the one or more cloud storage devices mapped to corresponding virtual local addresses that are grouped as a virtual local rank.

    Injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code

    公开(公告)号:GB2586409B

    公开(公告)日:2021-07-14

    申请号:GB202016053

    申请日:2019-03-06

    Applicant: IBM

    Abstract: Provided are a computer program product, system, and method for injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. A specified type of command is processed in application code and, in response, trap code is executed to allocate a trap address range. The specified type of command is executed in the application code. A determination is made as to whether an accessing application accesses the trap address range. At least one of transmitting a notification that the accessing application comprises potentially malicious code, monitoring the execution of the accessing application, and restricting execution of the accessing application is performed in response to determining that the accessing application accessed the trap address range.

    Injecting trap code in an execution path or a process executing a program to generate a trap address range to detect potential malicious code

    公开(公告)号:GB2586409A

    公开(公告)日:2021-02-17

    申请号:GB202016053

    申请日:2019-03-06

    Applicant: IBM

    Abstract: Provided area computer program product, system, and method for injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. A specified type of command is processed in application code and, in response, trap code is executed to allocate a trap address range. The specified type of command is executed in the application code. A determination is made as to whether an accessing application accesses the trap address range. At least one of transmitting a notification that the accessing application comprises potentially malicious code, monitoring the execution of the accessing application, and restricting execution of the accessing application is performed in response to determining that the accessing application accessed the trap address range.

    Synchronized safe data commit scans in multiple data storage systems

    公开(公告)号:GB2586398A

    公开(公告)日:2021-02-17

    申请号:GB202015329

    申请日:2019-02-27

    Applicant: IBM

    Abstract: In one aspect of the present description, safe data commit scan operations of individual data storage systems of a distributed data storage system may be synchronized to reduce the occurrence of reductions in input/output (I/O) response times. In one embodiment, a set of safe data commit scan operations of the individual data storage systems of a distributed data storage system are synchronously timed to substantially overlap in time within a single synchronized safe data commit scan set interval to reduce or eliminate the occurrences of reductions in input/output response times outside the synchronized safe data commit scan set interval. Other features and aspects may be realized, depending upon the particular application.

    Virtual storage drive management in a data storage system

    公开(公告)号:GB2584064A

    公开(公告)日:2020-11-18

    申请号:GB202014835

    申请日:2019-02-15

    Applicant: IBM

    Abstract: In one embodiment, virtual storage drives are allocated to RAID arrays so that no two virtual storage drives of a RAID array are mapped to the same physical storage drive. In another aspect, error handling routines are limited to virtual storage drives impacted by an error in a physical storage drive so that virtual storage drives of the physical storage drive not impacted by the error are bypassed. In yet another aspect, cache operations to a target virtual storage drive may be throttled as a function of both a limit imposed on cache operations directed to the RAID array to which the virtual storage drive is allocated, and a separate limit on cache operations directed to a group of virtual storage drives which are mapped to the same physical storage drive as the target virtual storage drive. Other features and aspects may be realized, depending upon the particular application.

Patent Agency Ranking