-
公开(公告)号:JPH10254786A
公开(公告)日:1998-09-25
申请号:JP31352797
申请日:1997-11-14
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: PROBLEM TO BE SOLVED: To prevent data saved in a memory from being destroyed owing to an error of an application program by providing a visible part and a hidden part for a memory in a computer system and using the hidden part to save data to be transmitted. SOLUTION: An operating system(OS) 4 can be addressed to the visual part 30 of the memory. The addressing possibility of the process or OS 4 is excluded from the hidden part 60 of the memory. The hidden part 60 is used to save data to be transmitted by the processor or OS 4. A communication area arranged at the visible part 30 receives a data access request from the processor or OS 4. A hide server 70 which addresses both the visible part 30 and hidden part 60 receives the data access request from the communication area and starts data access to the hidden part 60.
-
公开(公告)号:CA2508047A1
公开(公告)日:2004-06-24
申请号:CA2508047
申请日:2003-11-14
Applicant: IBM
Inventor: KING RICHARD PERVIN , YU SHUNG-ZHENG , XIA HONGHUI , LIU ZHEN , DIAS DANIEL MANUEL , ZHANG LI , SQUILLANTE MARK STEVEN
Abstract: Apparatus and methods for identifying traffic patterns to web sites based on templates that characterize the arrival of traffic to the web sites are provided. Based on these templates, determinations are made as to which web sites should be co-located so as to optimize resource allocation. Specifically, web sites whose templates are complimentary, i.e. a first web site having a peak in arrival traffic at time t1 and a second web site that has a trough in arrival traffic at time tl, are designated as being candidat es for co-location. In addition, the present invention uses the templates identified for the traffic patterns of web sites to determine thresholds for offloading traffic to other servers. These thresholds include a first threshold at which offloading should be performed, a second threshold that takes into consideration the lead time needed to begin offloading, and a thi rd threshold that takes into consideration a lag time needed to stop all offloading of traffic to the other servers.
-
公开(公告)号:CZ9904221A3
公开(公告)日:2000-10-11
申请号:CZ422199
申请日:1998-05-27
Applicant: IBM
Inventor: DIAS DANIEL MANUEL , JHINGRAN ANANT DEEP , KING RICHARD PERVIN , POLYZOIS CHRISTOS
IPC: G06F11/14
-
公开(公告)号:DE68924393T2
公开(公告)日:1996-05-02
申请号:DE68924393
申请日:1989-06-30
Applicant: IBM
Inventor: KING RICHARD PERVIN
IPC: G06F15/16 , G06F9/46 , G06F12/00 , G06F12/02 , G06F15/177
Abstract: A message storage system and method having a plurality of message storage facilities (110, 120, 130) with storage locations and a storage facility manager (140). The message storage system assigns individual names to messages as they are input into a message storage facility and stores the messages in free storage locations, while returning the name of the messages to the host devices which sent them.
-
公开(公告)号:RU2208834C2
公开(公告)日:2003-07-20
申请号:RU99127432
申请日:1998-05-27
Applicant: IBM
Inventor: DAJAS DAN EL MANUEHL , DZHINGRAN ANANT DIP , KING RICHARD PERVIN , POLIZOIS KRISTOS
IPC: G06F11/14
Abstract: FIELD: computer database access systems. SUBSTANCE: system provides for reduction of nonproductive costs of processing for recovery of database integrity, data corruption as result of failure of database access provision system which has plurality of database access units. First copy of database is started at first database access unit, first and second access units being to them through both memory devices that store first data for first copy of database; malfunction is detected in first access unit; then access is rendered to first data stored in one memory device and to third access unit through second one; first copy of database is started at third database access unit rendering access to first data through second unit thereby recovering database integrity disturbed as result of failure of first access unit. EFFECT: reduced nonproductive costs of processing. 31 cl, 6 dwg
-
公开(公告)号:DE69710034T2
公开(公告)日:2002-09-26
申请号:DE69710034
申请日:1997-11-06
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: A memory (20) in a computer system includes a visible portion (30) and a hidden portion (60). The visible portion (30) of the memory (20) is addressable by a processor (15a-15n) and the operating system (40) operating within the computer system. Addressability by either the processor or the operating system is excluded to the hidden portion of the memory. The hidden portion of the memory is used for storing data transmitted by either the processor or the operating system. A communications area (80), located in the visible portion of memory receives requests for data access from either the processor or the operating system. A hidden server (70) which addresses both the visible portion of memory and the hidden portion of memory receives requests for data access from the communications area and initiates data access from the hidden memory.
-
公开(公告)号:DE69710034D1
公开(公告)日:2002-03-14
申请号:DE69710034
申请日:1997-11-06
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: A memory (20) in a computer system includes a visible portion (30) and a hidden portion (60). The visible portion (30) of the memory (20) is addressable by a processor (15a-15n) and the operating system (40) operating within the computer system. Addressability by either the processor or the operating system is excluded to the hidden portion of the memory. The hidden portion of the memory is used for storing data transmitted by either the processor or the operating system. A communications area (80), located in the visible portion of memory receives requests for data access from either the processor or the operating system. A hidden server (70) which addresses both the visible portion of memory and the hidden portion of memory receives requests for data access from the communications area and initiates data access from the hidden memory.
-
公开(公告)号:SG73478A1
公开(公告)日:2000-06-20
申请号:SG1997003909
申请日:1997-10-29
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: A memory (20) in a computer system includes a visible portion (30) and a hidden portion (60). The visible portion (30) of the memory (20) is addressable by a processor (15a-15n) and the operating system (40) operating within the computer system. Addressability by either the processor or the operating system is excluded to the hidden portion of the memory. The hidden portion of the memory is used for storing data transmitted by either the processor or the operating system. A communications area (80), located in the visible portion of memory receives requests for data access from either the processor or the operating system. A hidden server (70) which addresses both the visible portion of memory and the hidden portion of memory receives requests for data access from the communications area and initiates data access from the hidden memory.
-
公开(公告)号:DE68924393D1
公开(公告)日:1995-11-02
申请号:DE68924393
申请日:1989-06-30
Applicant: IBM
Inventor: KING RICHARD PERVIN
IPC: G06F15/16 , G06F9/46 , G06F12/00 , G06F12/02 , G06F15/177
Abstract: A message storage system and method having a plurality of message storage facilities (110, 120, 130) with storage locations and a storage facility manager (140). The message storage system assigns individual names to messages as they are input into a message storage facility and stores the messages in free storage locations, while returning the name of the messages to the host devices which sent them.
-
10.
公开(公告)号:CA2288016C
公开(公告)日:2004-11-16
申请号:CA2288016
申请日:1998-05-27
Applicant: IBM
Inventor: JHINGRAN ANANT DEEP , KING RICHARD PERVIN , DIAS DANIEL MANUEL , POLYZOIS CHRISTOS
IPC: G06F11/14
Abstract: A method and system for recovering from a failure of a processing node in a partitioned shared nothing database processing system are provided. The processing system may include a pair of processing nodes having twin-tailed-connected thereto a storage device. A first processing node of the pair of processing nodes has a first database instanc e running thereon which accesses a first data partition on the storage device prior to the failure. Upon detection of the failure, access t o the first data partition on the storage device is provided to a third, spare processing node through the second processing node of the pair of processing nodes. The third processing node runs a replacement database instance for the first database instance which was running on the first processing node prior to the failure thereof. The replacement database instance accesses the first data partition on the storage device through the second processing node, thereby recovering from the failure of the first processing node. Access to the first data partition may include using a virtual shared disk utility having a server portion on the second processing node and a client portion on the third processing node.
-
-
-
-
-
-
-
-
-