1
Private
Theresa M Brown, Nedlaya Y Francisco, Matthew J Kalos, Suguang Li, Beth A Peterson: Data integrity protection in storage volumes. International Business Machines Corporation, Rabindranath Dutta, Konrad Raynes Davda and Victor, October 28, 2014: US08874862 (2 worldwide citation)

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining t ...


2
Private
Theresa M Brown, Nedlaya Y Francisco, Matthew J Kalos, Suguang Li, Beth A Peterson: Data integrity protection in storage volumes. International Business Machines Corporation, Rabindranath Dutta, Konrad Raynes Davda and Victor, October 7, 2014: US08856470 (2 worldwide citation)

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining t ...


3
Private
Michael T Benhase, Susan K Candelaria, Chung M Fung, Lokesh M Gupta, Joseph S Hyde II, Matthew J Kalos, Beth A Peterson, Donald P Terry: Fabricating key fields. International Business Machines Corporation, Griffiths & Seaton PLLC, March 25, 2014: US08683130

Exemplary methods, computer systems, and computer program products for fabricating key fields by a processor device in a computer environment are provided. In one embodiment, the computer environment is configured for, as an alternative to reading Count-Key-Data (CKD) data in order to change the key ...


4
Private
Theresa M Brown, Nedlaya Y Francisco, Matthew J Kalos, Suguang Li, Beth A Peterson: Data integrity protection in storage volumes. International Business Machines Corporation, July 26, 2012: US20120191930-A1

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining t ...


5
Private
Theresa M Brown, Nedlaya Y Francisco, Matthew J Kalos, Suguang Li, Beth A Peterson: Data integrity protection in storage volumes. International Business Machines Corporation, September 13, 2012: US20120233422-A1

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining t ...


6
Private
Susan K Candelaria, Roger G Hathorn, Matthew J Kalos, Beth A Peterson: Apparatus, system, and method for device level enablement of a communications protocol. International Business Machines Corporation, March 24, 2011: US20110072153-A1

An apparatus, system, and method are disclosed for device level enablement of a communications protocol. An adapter compatibility module determines an adapter compatibility status for a plurality of host adapters. A positive adapter compatibility status indicates that each host adapter in the plural ...


7
Theresa M Brown, Nedlaya Y Francisco, Matthew J Kalos, Suguang Li, Beth A Peterson: Data integrity protection in storage volumes. International Business Machines Corporation, Rabindranath Dutta, Konrad Raynes Davda and Victor, August 11, 2015: US09104319 (2 worldwide citation)

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining t ...


8
Theresa M Brown, Nedlaya Y Francisco, Matthew J Kalos, Suguang Li, Beth A Peterson: Data integrity protection in storage volumes. International Business Machines Corporation, Rabindranath Dutta, Konrad Raynes Davda and Victor, August 11, 2015: US09104320 (2 worldwide citation)

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining t ...


9
Juan A Coronado, Veronica S Davila, Jack N Licano Jr, Brian S McCain, Beth A Peterson: Alternate communication path between ESSNI server and CEC. International Business Machines Corporation, Griffiths & Seaton PLLC, August 24, 2010: US07783931 (2 worldwide citation)

An enterprise network interface client application and a local, central electronic complex (CEC) in a dual CEC environment implement an alternative method of communication. Upon a send failure of a command to a first CEC in the environment, the command is sent to a second CEC using a CEC to CEC mess ...


10
Lisa J Gundy, Beth A Peterson, Alfred E Sanchez, David M Shackelford, Warren K Stanley, John G Thompson: Method and system for replicating data. International Business Machines Corporation, Griffiths & Seaton PLLC, June 11, 2013: US08463746 (1 worldwide citation)

Methods, computing environments, and computer program products are provided for replicating data. Point-in-time copy parameters are generated at a primary host site. A side file entry having the point-in-time copy parameters and a track information field (TIF) associated with the point-in-time copy ...