The method of claim 1 wherein one of the identified defective memory portions comprises a newly-defective memory portion that has become defective after the memory module has been used in a computer system including the memory requester and the memory controller.