Abstract:
The present invention relates to a method, a computer program product and a system for reconfiguring functional capabilities in a data processing system with dormant resources. Dormant resources of a data processing system are used to replace (360) the functional characteristics of a broken hardware unit in order to compensate the lost resources. If sufficient dormant resources are available to replace the functional capabilities of the broken hardware unit, the data processing system can be used without any degradation of its capabilities. Otherwise the degradation is reduced. The functional part of the broken hardware unit is fenced (340) from the system, but its configuration data is read (350) from its non-functional part. The enablement definition data contained in the configuration data is then analysed for missing resources. Available dormant resources are then enabled until all the lost resources are replaced or no more dormant resources are available for the replacement.
Abstract:
Disclosed is a method of controlling a configuration of a computer system 212, having exchangeable components 10. The exchangeable components have identification means 12 that store an identifier 14 and provide the identifier to the computer system when being attached to it. The identifier is provided by generating a private public key pair 16, 18 for each accepted manufacturer of the exchangeable components and a private public key pair 17, 19 for the computer system. Next, an identifier is assigned to each exchangeable component available for attachment to the controlled computer system. Receiving configuration data 22 of a list of encrypted identity records 40 of identifiers of the components together with signatures 24 over the data generated with the private key of the respective component manufacturer for each component expected to be attached to the respective computer system. Receiving a configuration record 28 and comparing the configuration data of the expected components from the received configuration record with the configuration data 30 of the components currently attached to the computer system.
Abstract:
A method for performing a regression test comprises: the creation of a map of at least one source file to a test case by storing a relationship between the files which was used to verify the source file in the past; assembling exactly the test cases mapped with the modified source file into a test case scenario; and regression testing based in the scenario. Preferably, mappings may provide an unambiguous correlation between the test case and source file, where all test cases may have been previously used for testing the source file. The mapping may be updated (such as deletion of defunct relationships) before initiating the test. The maps may be stored in a database, and provided to a source control management system and regression test entity. The test case scenario assembly may require a valid problem number. Also included is a claim to a system for performing the method.