-
公开(公告)号:US12175304B2
公开(公告)日:2024-12-24
申请号:US17475866
申请日:2021-09-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Gregg L. Liguori , Franklin E. McCune , David C. Reed , Michael R. Scott
Abstract: Provided are a computer program product, system, and method to determine whether a holding of a lock to the resource by a first task satisfies a condition and whether the lock is swappable. The lock is released from the first task and granted to a second task waiting in a queue for the lock in response to determining that the holding of the lock satisfies the condition and that the lock is swappable. The first task is indicated in the queue waiting for the lock in response to granting the lock to the second task.
-
公开(公告)号:US11561863B2
公开(公告)日:2023-01-24
申请号:US14831101
申请日:2015-08-20
Applicant: International Business Machines Corporation
Inventor: Trevor A. Geisler , David C. Reed , Thomas C. Reed , Max D. Smith
Abstract: A method for enabling data set changes to be reverted to a prior point in time or state is disclosed. In one embodiment, such a method includes providing a data set comprising one or more data elements and a specified number of generations of the data elements. In certain embodiments, the data set is a partitioned data set extended (PDSE) data set, and the data elements are “members” within the PDSE data set. The method further includes tracking changes made by a job to data elements of the data set. The method further references, in a data structure (also referred to herein as a “cluster”) associated with the job, previous generations of the data elements changed by the job. In certain embodiments, the data structure is stored in the data set. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US11327849B2
公开(公告)日:2022-05-10
申请号:US16866978
申请日:2020-05-05
Applicant: International Business Machines Corporation
Inventor: Eric Harris , David C. Reed , Franklin E. McCune , Issak Sanchez
Abstract: A method can include obtaining catalog data of a catalog. The catalog can include one or more records. The method can further include detecting one or more damaged records among the one or more records and isolating the one or more damaged records. The method can further include identifying one or more undamaged records among the one or more records. The method can further include transferring the one or more undamaged records to a backup catalog. The method can further include obtaining a transfer status of a first undamaged record of the one or more undamaged records. The method can further include obtaining an access request corresponding to the first undamaged record. The method can further include determining, based on the transfer status, a response to the access request and generating, based at least in part on the backup catalog, a restored catalog.
-
公开(公告)号:US11221781B2
公开(公告)日:2022-01-11
申请号:US16813519
申请日:2020-03-09
Applicant: International Business Machines Corporation
Inventor: Miguel Perez , David C. Reed , Dash D. Miller , George Kozakos
Abstract: A computer-implemented method according to one embodiment includes obtaining, by a first LPAR, first device information about devices that a first LPAR is physically connected to. The first device information is sent by the first LPAR to a storage device for storage therein. Second device information stored on the storage device by a second LPAR is accessed by the first LPAR. The second device information includes information about devices that the second LPAR is physically connected to. The method further includes performing, by the first LPAR, a function using the second device information. A computer program product for device information sharing between a plurality of LPARs according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program are instructions readable and/or executable by a first LPAR to cause the first LPAR to perform the foregoing method.
-
5.
公开(公告)号:US11107044B2
公开(公告)日:2021-08-31
申请号:US14741440
申请日:2015-06-16
Applicant: International Business Machines Corporation
Inventor: Yi Chiao Cheng , David C. Reed , Apoorva Sachdev , Max D. Smith
Abstract: Provided are a computer program product, system, and method to remove selected user identifiers to include in an event message based on a context of an event. A determination is made of multiple user identifiers in a group of selected user identifiers for one event name for an event message for an event to schedule. A determination is made of a context of the event to schedule. At least one of the multiple user identifiers that are not included in at least one message with an event initiator that initiated the event to schedule, having a message context matching the determined context of the event to schedule, are removed from the group of selected user identifiers to produce a modified group of selected user identifiers. An event message is generated to transmit to addresses for the modified group of selected user identifiers with information on the event to schedule.
-
公开(公告)号:US11100056B2
公开(公告)日:2021-08-24
申请号:US15157281
申请日:2016-05-17
Applicant: International Business Machines Corporation
Inventor: Philip R. Chauvet , Andrew E. Deiss , Kenneth J. Owin , David C. Reed
IPC: G06F16/00 , G06F16/185
Abstract: A method for tracking actions performed in association with a data set includes identifying multiple sources of historical information describing actions performed on the data set. The method periodically gathers this historical information from the multiple sources and compiles the historical information in a centralized repository. In certain embodiments, the method stores the historical information in the form of individual records associated with the data set. In the event any actions performed on the data set are the result of policies established for the data set, the method determines the policies associated with the actions where possible. The method includes these policies with the historical information in the centralized repository. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US11093320B2
公开(公告)日:2021-08-17
申请号:US16537857
申请日:2019-08-12
Applicant: International Business Machines Corporation
Inventor: David C. Reed , Becky Enderle , Theresa Mary Brown , Christina Lara , Rubi Roxana Ballesteros
Abstract: Described herein are techniques for diagnostic analysis in computational systems. The techniques including a method comprising receiving error documentation related to a system having a plurality of hardware components and a plurality of software components, where the error documentation is received from a user device associated with a user profile having permissions. The method further comprises generating a diagnostic plan including a diagnostic tool based on the error documentation. The method further comprises implementing the diagnostic tool on at least one component selected from a group consisting of: the plurality of hardware components, and the plurality of software components. The method further comprises receiving censored diagnostic output in response to implementing the diagnostic tool, where the censored diagnostic output is censored according to the defined permissions of the user profile. The method further comprises generating an error resolution plan based on the censored diagnostic output and the error documentation.
-
公开(公告)号:US20210096752A1
公开(公告)日:2021-04-01
申请号:US16587377
申请日:2019-09-30
Applicant: International Business Machines Corporation
Inventor: David C. Reed , Kenneth J. Owin , Philip R. Chauvet , Tabor Powelson
IPC: G06F3/06
Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US10956281B2
公开(公告)日:2021-03-23
申请号:US16265990
申请日:2019-02-01
Applicant: International Business Machines Corporation
Inventor: Theresa M. Brown , Nicolas M. Clayton , Gregory E. McBride , Carol S. Mellgren , David C. Reed
IPC: G06F11/14
Abstract: Provided are a computer program product, system, and method for using a forward log storage and backward log storage to recover a storage to a forward or backward point-in-time. In response to receiving writes to source data after establishing point-in-time copies, point-in-time data of the source data is copied to a backward log storage storing point-in-time data for multiple of the point-in-time copies. The point-in-time data in the backward log storage is applied to a recovery source data to roll-back the source data to a backward point-in-time of one of the point-in-time copies. Before applying the point-in-time data from the backward log storage, point-in-time data in the recovery source data, is copied to a forward log storage. The point-in-time data in the forward log storage is applied to the recovery source data to roll forward the recovery source data to a forward point-in-time subsequent to the backward point-in-time.
-
公开(公告)号:US10922159B2
公开(公告)日:2021-02-16
申请号:US16385758
申请日:2019-04-16
Applicant: International Business Machines Corporation
Inventor: Thomas C. Reed , David C. Reed
IPC: G06F11/07
Abstract: A method for performing a data dump includes detecting an error in a segmented application having an address space and a buffer. In response to detecting the error, the method quiesces the address space and copies content of the address space to another location while the address space is quiesced. The method reactivates the address space after the content of the address space is completely copied. The method suspends write access to the buffer and copies content of the buffer to another location while write access to the buffer is suspended. While write access to the buffer is suspended, the method redirects writes intended for the buffer to a temporary storage area, and directs reads intended for the buffer to one of the buffer and the temporary storage area, depending on where valid data is stored. A corresponding system and computer program product are also disclosed.
-
-
-
-
-
-
-
-
-