Patents Assigned to IBM
  • Publication number: 20090326971
    Abstract: A method for managing package delivery may include receiving a plurality of packages. Each package may include a bar code or RFID tag associating the package with personal profile information. A delivery route plan may be generated based on the personal profile information. The estimated delivery time may be transmitted to the recipient in advance of the delivery. An electronic reply communication including a location of the recipient may be received from a notified recipient either confirming the delivery or proposing an alternate delivery time or location. The delivery route plan may be recalculated based on the retrieved personal profile information, the alternate delivery time or location if proposed by the recipient, and/or the current location of the recipient to identify alternate delivery time and location options. A confirmation selecting one of the alternate delivery time and location options or reconfirming the delivery may be received from the recipient.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Applicant: IBM Corporation
    Inventors: Sandro Piccinini, Marco Secchi, Luigi Pichetti
  • Publication number: 20090327651
    Abstract: A symmetric multi-processing (SMP) processor includes a primary interconnect trunk for communication of information between multiple compute elements situated along the primary interconnect trunk. The processor also includes a secondary interconnected trunk that may be oriented perpendicular with respect to the primary interconnect trunk. The processor distributes data on-ramps and data off-ramps across the data lanes of a data trunk of the primary interconnect trunk to enable communication with compute elements and other structures both on-chip and off-chip.
    Type: Application
    Filed: April 30, 2008
    Publication date: December 31, 2009
    Applicants: INTERNATIONAL BUSINESS MACHINES CORPORATION, IBM Corporation
    Inventors: Robert Alan Cargnoni, Gary Alan Gorman, Charles Francis Marino, Julie Ann Rosser
  • Publication number: 20090313607
    Abstract: A code coverage tool tests a program under test that executes on a processor of an information handling system (IHS). The code coverage tool may apportion the program under test into code portions of interest that exhibit a user-specified granularity level. A user may request that the code coverage tool change the granularity level of the code portions of interest in real time. The code coverage tool conducts testing of the code portions of interest according to test criteria that the user may specify in real time. The code coverage tool may provide test results for each of the code portions of interest in real time. The code coverage tool may also provide a summary report after providing real time test results for the code portions of interest. The user may specify that the code coverage tool generate real time test results in the form of sensory output, for example auditory output or visual output, for each of the code portions of interest.
    Type: Application
    Filed: June 16, 2008
    Publication date: December 17, 2009
    Applicants: INTERNATIONAL BUSINESS MACHINES CORPORATION, IBM Corporation
    Inventors: Matthew John Harding, Mitchell Perry Harding, Joshua Delcambre Miers
  • Publication number: 20090309219
    Abstract: Methods for making solder balls, which can be used to bump semiconductor wafers are disclosed. Methods for bumping semiconductor wafers with the solder balls are also disclosed. The solder balls can be made using an injection molded soldering (IMS) process.
    Type: Application
    Filed: August 19, 2009
    Publication date: December 17, 2009
    Applicant: IBM Corporation
    Inventors: Peter A. Gruber, Barry A. Hochlowski, David T. Naugle
  • Publication number: 20090307601
    Abstract: A system for preventing unauthorized viewing of content displayed on a computer display is presented. Once the system is activated, a computer user's eyes are tracked. If some source of interruption enters the vicinity of the user, the computer user will reflexively glance or look at the distraction, which accordingly results in the user removing his focus from the content on the computer display. As the user's focus is diverted from the display due to the interruption, the eye tracking detects this. In response to the detected removal of focus, the computer display is locked out extremely rapidly such that the content is no longer displayed.
    Type: Application
    Filed: June 5, 2008
    Publication date: December 10, 2009
    Applicant: IBM Corporation
    Inventors: David Bruce Kumhyr, Lydia Mai Do, Pamela Ann Nesbitt
  • Publication number: 20090307563
    Abstract: A method of a method of replacing bad sectors in a Hard Disk Drive comprises detecting bad sectors on the Hard Disk Drive; remapping the bad sectors to an auxiliary data storage device comprising an Magnetoresistive Random Access Memory connected to the Hard Disk Drive; and storing data on the auxiliary storage device.
    Type: Application
    Filed: June 5, 2008
    Publication date: December 10, 2009
    Applicant: IBM Corporation (Almaden Research Center)
    Inventors: Mary A. Marquez, Gregg S. Lucas, Craig A. Klein, Michael L. Harper, Robert E. Medlin
  • Publication number: 20090302460
    Abstract: A release film for soft composite materials is provided. The release film contains a film with a closely packed self-assembled monolayer. A method of applying soft composite materials to a substrate without loss of the soft composite material to the release film is also provided. The method is useful in applications such as applying thermal pastes to semiconductor packaging.
    Type: Application
    Filed: August 19, 2009
    Publication date: December 10, 2009
    Applicant: IBM Corporation
    Inventor: Ijeoma M. Nnebe
  • Publication number: 20090300514
    Abstract: A system for visually representing an event as part of a larger schedule (e.g., calendar). The representation of the particular event may include an indicator configured to display invitee status. Functionality may also be configured to provide additional information, for example, by user interaction. In at least one instance, a user may move a mouse over the invitee status indicator to trigger a pop-up box with the additional information. Additional functionality, that may be implemented alone or in conjunction with the above exemplary embodiments of the present invention, may include the automatic execution of an activity in view of a threshold condition related to the event. For example, when an event is created, a threshold condition pertaining to one or more characteristics of the event and/or an activity may be configured. When the threshold condition is met and/or exceeded, the configured activity may be triggered.
    Type: Application
    Filed: May 27, 2008
    Publication date: December 3, 2009
    Applicant: IBM CORPORATION
    Inventors: Frank Lawrence Jania, John Morgan Lance
  • Publication number: 20090300092
    Abstract: A method, system, and computer-readable medium with executable code for enhancing real-time performance of a client device connected to a java virtual machine by incorporating a java proxy server. Java routing logic of a java proxy server is used to receive a request from a client device to access a java virtual machine. The java proxy server may use the java routing logic to select a java virtual machine from among multiple accessible java virtual machines. The java proxy server selects the java virtual machine that has the greatest amount of free memory, and is not performing a garbage collection operation. Once a java virtual machine is chosen, incoming client device connections are routed to a chosen java virtual machine. Additionally, the java routing logic may instruct one or more of the multiple java virtual machines to only perform garbage collection operations when idle, and when no other java virtual machines are performing garbage collection operations.
    Type: Application
    Filed: June 2, 2008
    Publication date: December 3, 2009
    Applicant: IBM CORPORATION
    Inventors: Kevin M. Corry, Mark A. Peloquin, Steven L. Pratt, Karl M. Rister, Andrew M. Theurer
  • Publication number: 20090292461
    Abstract: Capabilities are added to a travel reservation system by delivering a traveler's destination information to a car reservation company computer for subsequent downloading as waypoint data into a global positioning system (GPS) device in the car being rented by the traveler. The traveler creates a travel itinerary, including a request for a rental car at a first destination and a second destination to which the traveler will drive the car. Information about the destinations is transmitted to the rental car company for downloading into a GPS receiver in the rental car for use by the traveler.
    Type: Application
    Filed: May 20, 2008
    Publication date: November 26, 2009
    Applicant: IBM CORPORATION
    Inventors: Scott D. Mastie, John S. Anderson
  • Publication number: 20090287776
    Abstract: A system and method for transmitting an electronic mail message to one or more intended recipients, which allows the user to designate that an electronic mail message contains a request for information which requires a reply from the one or more intended recipients, monitors electronic mail messages incoming to the sender to detect whether a reply has been received within the response period, and upon receiving a reply from any of the one or more intended recipients, presents the reply to the sender with one or more user-selectable icons which allow the sender to accept the reply as sufficient or request more information from the one or more intended recipients in response to selection of a user-selectable icon.
    Type: Application
    Filed: May 14, 2008
    Publication date: November 19, 2009
    Applicant: IBM CORPORATION
    Inventors: Kevin M. Corry, Mark A. Peloquin, Steven Pratt, Santhosh Rao, Karl M. Rister
  • Publication number: 20090285376
    Abstract: A method of telecom software and service development that allows a user to model and create telecom services independent of telecommunications protocols and network layer details. The method of the invention operates by creating an abstract model of a desired telecom service or services that is converted, using a set of extensible transformations, into executable code.
    Type: Application
    Filed: May 13, 2008
    Publication date: November 19, 2009
    Applicant: IBM
    Inventors: Shiri Kremer-Davidson, Alan Hartman, Mila Keren, Dmitri Pikus
  • Publication number: 20090285375
    Abstract: A method of telephone call management in process of service development that allows a user to model and create telephone call management schemes independent of telecommunications protocols and network layer details. The method of the invention operates by creating an abstract model of a telephone call life-cycle that is converted, using a set of communication threads, into executable code. Models in accordance with the method of the invention are constructed using an Integrated Development Environment (IDE) for creating and developing telecom services that embodies the Telecom Service Domain Specific Language (TS-DSL) which is implemented as a Unified Modeling Language (UML) extension for the telecom domain. By this method, individuals without specialized knowledge of telecom related software programming and protocols can successfully design and implement telecom services that manages calls.
    Type: Application
    Filed: May 13, 2008
    Publication date: November 19, 2009
    Applicant: IBM
    Inventors: Shiri Kremer-Davidson, Alan Hartman, Mila Keren, Dmitri Pikus
  • Publication number: 20090287836
    Abstract: An Ajax proxy indirection technique enables a local, front-end proxy server to handle Ajax requests from an Ajax client that must be serviced by an external Ajax server in an external domain, instead of a local Ajax back-end server exposing itself to the external domain. The front-end proxy server accepts the Ajax client's request and forwards it to the local Ajax back-end server. The proxy server asks the local AJAX server for the credentials to be used in the “external” AJAX request. The local Ajax back-end server then responds to the proxy server with meta-data for the external domain request that the proxy will make to the external domain. The proxy server uses the credentials of the “external” AJAX request to make the external request to the external Ajax server in the external domain. The proxy server performs any authentication and necessary domain mapping with the external Ajax server before sending a response from the external Ajax server back to the client.
    Type: Application
    Filed: January 5, 2009
    Publication date: November 19, 2009
    Applicant: IBM CORPORATION
    Inventors: John Paul CAMMARATA, Erik John BURCKART, Andrew IVORY, Aaron Kyle SHOOK
  • Publication number: 20090282273
    Abstract: A method and system for migrating source data from one or more databases to a destination database, wherein the destination database is selected based on power consumption of the destination database. A data migration server determines which destination database should be selected by selecting a number of candidates and comparing the power consumed, the available space and the maximum monthly power consumption limit. A user intervention policy is created to evaluate which data should be moved to a destination database. A “payback period” is calculated to determine the amount of time that will elapse before savings are realized.
    Type: Application
    Filed: May 8, 2008
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation (IBM)
    Inventors: Rick A. Hamilton, II, Jenny S. Li, Vivek Salve, Anne R. Sand, Elisabeth R. Stahl
  • Publication number: 20090281847
    Abstract: A method and system for migrating source data from a source database to a destination database based on energy efficiency and conservation. A migration server evaluates the source data for usage and requirements and defines data usage and requirement tags for the source data. The source data is disaggregated into one or more source data sets based on the data usage and requirement tags. The migration server then identifies candidate destinations for the source data, wherein each candidate destination has stored data identified with usage and requirement tags. The data migration server compares the first usage and requirement tags of the source data with the second usage and requirement tags of the stored data and identifies an optimal destination database based on the comparing step. The data migration server migrates the source data to the optimal destination database.
    Type: Application
    Filed: May 8, 2008
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation (IBM)
    Inventors: Rick A. Hamilton, II, Jenny S. Li, Vivek Salve, Anne R. Sand, Elisabeth R. Stahl
  • Publication number: 20090282090
    Abstract: A method and system for migrating source data from one or more databases to a destination database, wherein the destination database is selected based on power consumption of the destination database. A data migration server determines which destination database should be selected by selecting a number of candidates and comparing the power consumed, the available space and the maximum monthly power consumption limit. A user intervention policy is created to evaluate which data should be moved to a destination database. A “payback period” is calculated to determine the amount of time that will elapse before savings are realized.
    Type: Application
    Filed: May 8, 2008
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation (IBM)
    Inventors: Rick A. Hamilton, II, Jenny S. Li, Vivek Salve, Anne R. Sand, Elisabeth R. Stahl
  • Publication number: 20090282044
    Abstract: A method and system for provisioning data that has been collected and stored in a source database. The source database is a database that consumes a large amount of power and drains the company's database resources. The method and system determine which data should be provisioned and sent to a target server, the target server being more energy efficient than the source database and less exhausting of company resources. Various factors, such as the amount of data being requested and the frequency of change of the requested data, determine whether a transfer of data from the source database to the more energy efficient target database should be performed.
    Type: Application
    Filed: May 8, 2008
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation (IBM)
    Inventors: Rick A. Hamilton, II, Jenny S. Li, Vivek Salve, Anne R. Sand, Elisabeth R. Stahl
  • Patent number: 7615433
    Abstract: A method for forming a device with both PFET and NFET transistors using a PFET compressive etch stop liner and a NFET tensile etch stop liner and two anneals in a deuterium containing atmosphere. The method comprises: providing a NFET transistor in a NFET region and a PFET transistor in a PFET region. We form a NFET tensile contact etch-stop liner over the NFET region. Then we perform a first deuterium anneal. We form a PFET compressive etch stop liner over the PFET region. We form a (ILD) dielectric layer with contact openings over the substrate. We perform a second deuterium anneal. The temperature of the second deuterium anneal is less than the temperature of the first deuterium anneal.
    Type: Grant
    Filed: December 15, 2005
    Date of Patent: November 10, 2009
    Assignees: Chartered Semiconductor Manufacturing, Ltd., International Business Machines (IBM)
    Inventors: Khee Yong Lim, Victor Chan, Eng Hua Lim, Wenhe Lin, Jamin F. Fen
  • Publication number: 20090271602
    Abstract: A method for recovering from software and/or hardware failures occurred in a data processing system is disclosed. A current version of boot code and an updated version of boot code are stored in a first memory region and a second memory region, respectively, of a non-volatile memory of the data processing system. The updated version of boot code is periodically replaced by a latest version of boot code downloaded from a support center. After an occurrence of a system crash, a determination is made if the system crash was caused by a known problem that can be remedied by the updated version of boot code. If so, the data processing system is rebooted using the updated version of boot code. Otherwise, data related to the system crash is collected, and the data processing system is rebooted using the current version of boot code.
    Type: Application
    Filed: April 29, 2008
    Publication date: October 29, 2009
    Applicant: IBM CORPORATION
    Inventors: Thomas V. Burks, III, Mike C. Duron, Mark D. McLaughlin, Meghna Paruthi