Abstract:
According to one embodiment, a method for preemptively migrating a failing extent includes receiving information of one or more failure conditions associated with an extent stored in a first storage portion of a first storage tier; predicting a failure of the extent based on the information; selecting a second storage portion located in the first storage tier, a higher storage tier, and/or a lower storage tier; and migrating the extent to the selected second storage portion.
Abstract:
An information processing system includes a first information processing apparatus including a first processor, a first detector configured to detect vibration, a first communication device, and a second processor coupled to the first detector and configured to cause the first processor to stop first data processing executed by the first processor when the vibration is detected by the first detector, and a second information processing apparatus including a third processor, a second communication device configured to communicate with the first communication device, and a fourth processor configured to cause the third processor to stop second data processing executed by the third processor when the fourth processor receives, from the second processor through the first communication device and the second communication device, a first notification that indicates that the vibration has been detected.
Abstract:
An object of the present invention is to reduce a prediction error even if a monitoring target system has a plurality of patterns of use. A monitoring data analyzing apparatus includes a log data file 21 configured to accumulate log data including monitoring data in a monitoring target system set as a target of performance management, a data classifying section 11 configured to classify the log data into a plurality of groups on the basis of characteristics of use status data included in the log data and indicating statuses of use of components of the monitoring target system, and a regression-model generating section 12 configured to execute a regression analysis of the log data and generate a regression model for each of the groups.
Abstract:
Aspects of the disclosure provide a method for profiling. The method includes collecting symbol information to map traces of codes in a program to memory addresses storing corresponding native codes that are dynamically compiled from the traces of codes during an execution of the program, and making the symbol information available after the dynamic compilation to analyze profiling data sampled during the execution of the program.
Abstract:
There is provided an information processing apparatus including a calculation part configured to calculate a first score based on an operation log with respect to content using a weighting of an operation log that is different for each user attribute, and a linking part configured to link the calculated first score to the content.
Abstract:
A reminding apparatus includes: a reminding module, configured to determine reminding time of the reminding apparatus and a reminding event corresponding to the reminding time, and trigger the reminding event when the reminding time is up; a background miming module, configured to indicate an operation system of the data processing device to trigger the reminding apparatus to enter a background running state after detecting a switch instruction; a battery level checking module, configured to check battery level of the data processing device when the reminding apparatus runs in the background; and a battery level protecting module, configured to write a local notification into the operation system when the battery level is lower than a predefined threshold, set triggering time of the local notification as the reminding time, and trigger the reminding apparatus to enter a pending state. The local notification can be triggered automatically by the operation system.
Abstract:
A method of managing peripherals is performed in a device coupled to a processor in a computer system. In the method, information associated with I/O activity for one or more peripherals is recorded in a first segment of a log. A second segment of the log is identified based on a next-segment pointer associated with the first segment of the log. In response to detecting a lack of available capacity in the first segment of the log, information associated with further I/O activity for the one or more peripherals is recorded in the second segment of the log.
Abstract:
A method, processor, and computer system for handling interrupts within a hierarchical register structure. The method includes receiving at a root-level register an indication of an interrupt occurring at a lower level register in the register structure, using a system interrupt handler to invoke an error handler assigned to a set of registers of the structure that includes the lower level register, and using the invoked error handler to handle the interrupt and return to the system interrupt handler.
Abstract:
Methods and apparatus for monitoring workfiles are disclosed. An authorized user or system programmer may input workfile threshold values and other monitoring information into a configuration file. A server reads the configuration file and starts traces to monitor workfile usage in a system. The server may continuously monitor the system to determine whether workfile usage in the system reaches workfile threshold values set in the configuration file. The server may list SQL queries using workfiles and then alert the system programmer when the threshold values are reached and is capable of reclaiming disk space by dropping and recreating overgrown workfiles with their original definitions.
Abstract:
A mirroring device that can improve, even when two storage devices to which an upper limit is set for the number of rewrites of data are used, the fault tolerance of the mirroring device while preventing one of the storage devices from reaching the lifetime thereof early. A mirroring device comprises two storage devices to which an upper limit is set for the number of rewrites of data. Remaining writable amounts of the data in the storage devices are acquired respectively from total amounts of the data written in the respective storage devices. When it is determined that a difference between the respective acquired remaining writable amounts is less than a predetermined value, the respective storage devices are controlled such that the difference becomes equal to or more than the predetermined value.