Patents Assigned to IBM Corporation
  • Publication number: 20120150816
    Abstract: In a Virtual Input/Output (I/O) Server (VIOS) partition, a method comprises a cluster aware (CA) operating system (OS) of a VIOS partition performing the functions of: responsive to a restore command: retrieving a configuration backup file from storage; comparing a DRC name from the retrieved file with a DRC name of the current VIOS partition performing the restore operation; in response to an occurrence of a DRC name mismatch: retrieving an initial UUID of the VIOS from the configuration backup file; accessing a UUID table within a management tool; locating a matching UUID to the initial UUID within the UUID table; and in response to locating the matching UUID: verifying that the configuration data file belongs to the current VIOS initiating the restore operation; and performing the restore operation to restore the configurations of the hardware, logical and virtual devices of the first VIOS to an earlier configuration state.
    Type: Application
    Filed: December 9, 2010
    Publication date: June 14, 2012
    Applicant: IBM Corporation
    Inventors: James A. Pafumi, Chintamani P. Siddeshwar, Rupesh Kumar Thota, Vasu Vallabhaneni
  • Publication number: 20120144405
    Abstract: A method of serialization in a data processing system includes serializing a mutable object utilizing a full serialization process, caching primitive data and metadata regarding the mutable object in binary format in cache and then checking whether primitive fields of the mutable object are modified. Thereafter, the mutable object is again serialized utilizing an abbreviated serialization process by reference to the cached primitive data and metadata if the primitive fields of the object are not modified. In the event that primitive fields of the object are modified, the full serialization process is utilized. Thereafter, the serialized mutable object is communicated to a distributed code element.
    Type: Application
    Filed: December 6, 2010
    Publication date: June 7, 2012
    Applicant: IBM Corporation
    Inventors: Aruna A. Kalagananam, Prashanth K. Nageshappa, Sathiskumar Palaniappan
  • Publication number: 20120144105
    Abstract: A method for performing refresh operations is disclosed. In response to a completion of a memory operation, a determination is made whether or not a refresh backlog count is greater than a first predetermined value. In a determination that the refresh backlog count is greater than the first predetermined value, a refresh operation is performed as soon as possible. In a determination that the refresh backlog count is not greater than the first predetermined value, a refresh operation is performed after a delay of an idle count value.
    Type: Application
    Filed: December 3, 2010
    Publication date: June 7, 2012
    Applicant: IBM Corporation
    Inventors: John S. Dodson, Benjiman L. Goodman, Hillery C. Hunter, Stephen Powell, Jeffrey A. Stuecheli
  • Publication number: 20120143823
    Abstract: In some embodiments, a partitioned database is stored in a plurality of logical or physical partitions on at least a logical or physical first data storage node, and a subset of a first partition among the plurality of logical partitions is configured as a virtual partition. An input indicating an allocation of a second physical data storage node to store the partitioned database is received. A second partition is configured on the second data storage node. In response to the input, the partitioned database is redistributed over the first and second data storage nodes by moving data within the virtual partition on the first partition to the second partition.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 7, 2012
    Applicant: IBM Corporation
    Inventors: Saurabh Jain, Neeraj S. Sharma
  • Publication number: 20120137363
    Abstract: The disclosure provides a device and method for preventing CSRF attacks, in which the method comprises: intercepting request sent from a client browser to a server; generating a token; generating a response to the request; inserting the token into the response to the request; and sending the response to the request to the client browser with the token inserted into the response. With the method and device of the disclosure, it is assured that a token is inserted into all the requests made by a user through a client browser for accessing a resource. And it can be assured that the request is issued by the user himself by verifying whether the token in the request is valid, thereby preventing a CSRF attack.
    Type: Application
    Filed: November 29, 2011
    Publication date: May 31, 2012
    Applicant: IBM CORPORATION
    Inventors: Dikran S. Meliksetian, Gang Niu, Qiang Guo Tong
  • Publication number: 20120131273
    Abstract: In a computer system supporting memory compression, wherein memory compressed data is managed in units of memory sectors of size S, wherein data is stored on disk in a different compressed format, and wherein data on said disk is managed in units of disk sectors of size D, a method for storing memory compressed data on a compressed disk includes combining at least one of compressed memory directory information, a system header, compressed data controls, and pads into a data structure having a same size S as a memory sector, grouping the data structure and the data contained in the desired memory sectors into groups of D/S items, and storing each of the groups in a separate disk sector.
    Type: Application
    Filed: January 30, 2012
    Publication date: May 24, 2012
    Applicant: IBM Corporation
    Inventors: Caroline Benveniste, Vittorio Castelli, Peter A. Franaszek
  • Publication number: 20120110274
    Abstract: In a data processing system including multiple logical partitions (LPARs), an application executes on a first logical partition (LPAR) of the multiple LPARs, where the application uses a first operation system stored in a first memory partition of a shared pool memory of the data processing system. A virtualization management component (a) initiates an update process that quiesces operations of the first LPAR, (b) pages in, via a virtual input/output server coupled to a first paging device, a first image of a second operating system from the first paging device to the shared pool memory; (c) changes one or more pointers associated with the application to point to one or more portions of the second operating system, such that the application uses the second operating system, when resumed; and (b) resumes execution the application.
    Type: Application
    Filed: October 27, 2010
    Publication date: May 3, 2012
    Applicant: IBM CORPORATION
    Inventors: Jacob J. Rosales, Morgan J. Rosas, Basu Vaidyanathan, Vasu Vallabhaneni
  • Publication number: 20120110302
    Abstract: A method, a system and a computer program product for effectively accelerating loop iterators using speculative execution of iterators. An Efficient Loop Iterator (ELI) utility detects initiation of a target program and initiates/spawns a speculative iterator thread at the start of the basic code block ahead of the code block that initiates a nested loop. The ELI utility assigns the iterator thread to a dedicated processor in a multi-processor system. The speculative thread runs/executes ahead of the execution of the nested loop and calculates indices in a corresponding multidimensional array. The iterator thread adds all the precomputed indices to a single queue. As a result, the ELI utility effectively enables a multidimensional loop to be replaced by a single dimensional loop. At the beginning of (or during) each iteration of the iterator, the ELI utility “dequeues” an entry from the queue to use the entry to access the array upon which the ELI utility iterates.
    Type: Application
    Filed: November 2, 2010
    Publication date: May 3, 2012
    Applicant: IBM Corporation
    Inventors: Ganesh Bikshandi, Dibyendu Das, Smruti Ranjan Sarangi
  • Publication number: 20120110275
    Abstract: A method, system, and computer program product provide a shared virtual memory space via a cluster-aware virtual input/output (I/O) server (VIOS). The VIOS receives a paging file request from a first LPAR and thin-provisions a logical unit (LU) within the virtual memory space as a shared paging file of the same storage amount as the minimum required capacity. The VIOS also autonomously maintains a logical redundancy LU (redundant LU) as a real-time copy of the provisioned/allocated LU, where the redundant LU is a dynamic copy of the allocated LU that is autonomously updated responsive to any changes within the allocated LU. Responsive to a second VIOS attempting to read a LU currently utilized by a first VIOS, the read request is autonomously redirected to the logical redundancy LU. The redundant LU can be utilized to facilitate migration of a client LPAR to a different computing electronic complex (CEC).
    Type: Application
    Filed: October 27, 2010
    Publication date: May 3, 2012
    Applicant: IBM CORPORATION
    Inventors: Veena Ganti, James A. Pafumi, Jacob Jason Rosales, Morgan Jeffrey Rosas, Vasu Vallabhaneni
  • Publication number: 20120109664
    Abstract: A Customer Relationship Management (CRM) offer template is established in data storage and includes at least one variable field and having at least one offer attribute. For each of a plurality of customer groups, a data processing system calculates an expected benefit to be obtained by sending an instantiated CRM offer to a customer based upon historical responses, offer cost, and legal values of the at least one variable field. The data processing system outputs a CRM offer instance and target list of customers that maximizes the expected benefit.
    Type: Application
    Filed: November 1, 2010
    Publication date: May 3, 2012
    Applicant: IBM CORPORATION
    Inventors: Raghuram Krishnapuram, Sumit Negi, Deepak S. Padmanabhan, Karthik Visweswariah
  • Publication number: 20120102043
    Abstract: A data processing system establishes a mapping between each of a plurality of plurality of internal data sources within a service organization and a respective one of multiple service quality factors. The data processing system determines a mathematical transformation of internal service quality data obtained from the plurality of internal data sources to obtain a customer satisfaction value. The data processing system estimates and reports a service quality delivered by the service organization by applying the mathematical transformation to at least some of the internal service quality data obtained from the plurality of internal data sources.
    Type: Application
    Filed: October 20, 2010
    Publication date: April 26, 2012
    Applicant: IBM Corporation
    Inventor: Ashish Verma
  • Patent number: 8156185
    Abstract: The invention includes methods and software for presenting a user with a set of interfaces that reveal what events are to occur, or are likely to occur, in a transaction, and provide the ability to program the automatic monitoring of these anticipated events with a customizable set of alerts. A merchant encodes events that are possible for the transaction as part of developing an online transaction system such as an online catalog. The data regarding these events is encoded in an electronic communication, such as an email or onsite transaction history item, such that this data can be detected by a receiving system. The method includes presenting and setting monitoring options for event notices that have not yet been received. The chosen options for event notices that have not yet been received are used to program the monitoring and alerting of the user when such event notices have or have not been received.
    Type: Grant
    Filed: May 16, 2002
    Date of Patent: April 10, 2012
    Assignee: IBM Corporation
    Inventor: Paul Moody
  • Publication number: 20120084071
    Abstract: With N_Port ID Virtualization (NPIV), a managed system can be configured so that multiple logical partitions (LPARs) can access independent physical storage through the same physical fibre channel adapter. An NPIV client recovery component of a virtualization management component, such as a Power Hypervisor (pHYP), provides the emulation mapping between server and client virtual fibre channel adapters. The pHYP also provides a mechanism that prevents client partition crashes when the NPIV server (e.g., a VIOS logical partition) goes down. When the NPIV server is rebooted or powers down, the pHYP handles the client LPARs to avoid a crash by removing processing resources from the client logical partition. Thereby, the client logical partition is prevented from attempting to access a root volume group in physical storage via the NPIV server. The pHYP allocates processor resources to the client LPAR when the NPIV server is again available for UO processing.
    Type: Application
    Filed: September 30, 2010
    Publication date: April 5, 2012
    Applicant: IBM CORPORATION
    Inventors: Michael Paul Cyr, James A. Pafumi, Veena Ganti, Vasu Vallabhaneni
  • Publication number: 20120084028
    Abstract: A method, a system and a computer program product for determining power consumption levels for granular segments of program code in a data processing system. A power profiling utility (PPU) utilizes/comprises a power monitoring module, a power profiler module, a performance profiler and a power modeling component which enables PPU to efficiently characterize power consumption of various types of applications. The PPU uses a power measurement device to obtain power consumption measurements corresponding to execution of a first code segment. Additionally, the PPU identifies information about program characteristics of granular code segments within the first code segment. The PPU then determines total power consumption for execution of the first code segment from an aggregation of power consumption measurements corresponding to all iterations of the first code segment.
    Type: Application
    Filed: September 30, 2010
    Publication date: April 5, 2012
    Applicant: IBM CORPORATION
    Inventors: Prathiba Kumar, Satish Kumar Sadasivam, Giri M. Prabhakar
  • Publication number: 20120084538
    Abstract: A post-silicon testing apparatus, method, and computer program product provide for runtime coverage measurement methodology to measure the architectural events in hardware. Measurement of all architectural events discernable from the instructions and architectural state changes are tracked and recorded. A mechanism to ensure capturing of maskable events is also provided. A feedback driven test-generation approach is enabled by the runtime coverage measurement. The runtime coverage measurement system presents a live view of the comprehensive architectural event coverage to the user/tester. The methodology can be implemented on an operating system environment and also as a standalone/bare-metal tool.
    Type: Application
    Filed: September 30, 2010
    Publication date: April 5, 2012
    Applicant: IBM CORPORATION
    Inventors: Sangram Alapati, Jayakumar N. Sankarannair, Varun Mallikarjunan, Prathiba Kumar, Satish Kumar Sadasivam
  • Publication number: 20120066662
    Abstract: Disclosed is a system and method for validating and repairing flow diagrams using a process modeling validation method in conjunction with a process modeling repair method. The process modeling validation method points out structural ambiguities in a flow diagram that can make its automatic interpretation difficult. It also proposes fix to resolve such ambiguities. The method discloses a process semantic annotation scheme that can interpret process semantics in a flow graph implicit in a flow diagram. Further, the validation process compares one or more components of one or more drawings to a set of rules determined by a business process modeling standards and provides a set of semantic errors describing faulty parts of the drawing that do not comply with the business process modeling standards. The process modeling repair method corrects the drawing to ease and enable its automatic interpretation of the flow diagram and make the faulty parts of the drawing comply with the business process modeling standards.
    Type: Application
    Filed: September 10, 2010
    Publication date: March 15, 2012
    Applicant: IBM Corporation
    Inventors: Tian-Jy Chao, Pankaj Dhoolia, David Marston, Debdoot Mukherjee
  • Publication number: 20120036110
    Abstract: A computer-implemented method, system, and program product for automatically reviewing a mapping between information models. The method includes: receiving a mapping between an element in the first information model to an element in the second information model. Each element is associated with an element identifier and an element value, and the mapping signifies a relationship between the element in the first information model and the element in the second information model. The method further includes comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings. If the received mapping is determined to be suspicious, identifying the received mapping as one that requires review.
    Type: Application
    Filed: August 6, 2010
    Publication date: February 9, 2012
    Applicant: IBM Corporation
    Inventors: Brian Patrick Byrne, Achille Belly Fokoue-Nkoutche, Aditya Anand Kalyanpur, Kavitha Srinivas, Min Wang
  • Publication number: 20120030439
    Abstract: A method, system, and computer program product for creating and implementing file clones using reverse ditto references. A clone inode is created as a copy of an original inode. The clone inode and the original inode are indistinguishable to an end user. Each additional file clone created spawns a clone inode. An immutable clone-parent inode is created that contains the disk block addresses, while writable clones inode instead contain dittos linking the clone inode to data blocks referenced in the clone-parent inode. Data block address links in the original inode are moved to the new clone-parent inode and dittos replace the original data block address links in the original inode. When a clone file is updated, the new data is written to a new disk location and a corresponding ditto in the clone inode is replaced with a data block link address, keeping the data of the clone-parent inode intact.
    Type: Application
    Filed: July 30, 2010
    Publication date: February 2, 2012
    Applicant: IBM Corporation
    Inventors: Thomas E. Engelsiepen, Frank B. Schmuck
  • Publication number: 20120023302
    Abstract: A method and data processing system enables scheduling of atomic operations within a Peripheral Component Interconnect Express (PCIe) architecture during page migration. In at least one embodiment, firmware detects the activation of a page migration operation and sets a migration bit in the page table. When the PCIe Host Bridge (PHB) receives an atomic operation, the PHB checks the migration bit associated with the memory page targeted by the atomic operation and if the migration bit is set, the PHB buffers the atomic operation and sets an atomic operation stall (AOS) bit associated with the buffer. The atomic operation is stalled until the migration bit is reset, at which time the PHB resets the AOS bit of the buffer. The atomic operations are permitted to continue when the migration bit of the target memory page is not set, and along with DMA operations, may bypass other stalled atomic operations.
    Type: Application
    Filed: July 20, 2010
    Publication date: January 26, 2012
    Applicant: IBM CORPORATION
    Inventors: Richard L. Arndt, Eric N. Lais, Steve Thurber
  • Publication number: 20120023280
    Abstract: A method and data processing system enables scheduling of atomic operations within a Peripheral Component Interconnect Express (PCIe) architecture during page migration. In at least one embodiment, firmware detects the activation of a page migration operation. The firmware notifies the I/O host bridge, which responds by setting an atomic operation stall (AOS) bit to a pre-established value that indicates that there is an ongoing migration within the memory subsystem of a memory page that is mapped to that I/O host bridge. When the AOS bit is set to the pre-established value, the I/O host bridge prevents/stalls any received atomic operations from completing. The I/O host bridge responds to receipt of receipt of an atomic operation by preventing the atomic operation from being initiated within the memory subsystem, when the AOS bit is set to the pre-established value. The AOS bit is reset when the migration operation has completed.
    Type: Application
    Filed: July 20, 2010
    Publication date: January 26, 2012
    Applicant: IBM CORPORATION
    Inventors: Eric N. Lais, Steve Thurber