Patents Assigned to IBM
-
Publication number: 20060150030Abstract: An error handling method is provided for processing adapter errors. Rather than executing a disruptive controller hardware reset, an error handling routine provides instructions for a reset operation to be loaded and executed from cache while the SDRAM is in self-refresh mode and therefore unusable.Type: ApplicationFiled: January 6, 2005Publication date: July 6, 2006Applicant: International Business Machines (IBM) CorporationInventors: Lucien Mirabeau, Charles Cardinell, Man Ma, Ricardo Padilla
-
Publication number: 20060132313Abstract: An arrangement for providing protection to wireless portable transponders (including resonant tags such as RFID tags) from unauthorized interrogation by employing a mechanical means for disabling reception by or from the antenna of the transponder. The tags can be protected from receiving or providing unauthorized or unwanted information. Contemplated are mechanical means that permit the owner to decide when reception/interrogation of personal or other information is not desired by employing the provided mechanical disable control means. Also broadly contemplated herein is the altering interrogation characteristics of RFID tags to such an extent that they may still be read at a close range instead of the original range, and this result of this altering is visible to the user.Type: ApplicationFiled: January 13, 2006Publication date: June 22, 2006Applicant: IBM CorporationInventor: Paul Moskowitz
-
Publication number: 20060129785Abstract: When data is stored in many storage subsystems, metadata, such as a sequence number, is also generated and stored with the data. When the data is accessed, the metadata is checked to ensure that the desired data element has been accessed. In conventional storage subsystems, data elements, such as logical blocks, are stored sequentially in logical pages of each logical volume. Consequently, sequence numbers closely correlate with block positions within the physical pages and sequence number/position patterns tend to repeat frequently and access errors may not be detected. Algorithms are provided to calculate new, offset, physical block positions which reduce the close association of sequence numbers and physical positions, thereby reducing such aliasing. The algorithms incorporate the logical volume number, the logical page number, or both, in addition to the logical block number. As a result, detection of access errors becomes more likely.Type: ApplicationFiled: December 15, 2004Publication date: June 15, 2006Applicant: International Business Machines (IBM) CorporationInventor: Richard Ripberger
-
Publication number: 20060122945Abstract: A feature key is provided to enable a specific feature in a target system, such as an IBM® Enterprise Storage Server®. The key includes fields identifying at least a portion of a serial number of the target system, identifying the feature on the target system to be enabled, and identifying a quantity associated with the feature to be enabled. Including the serial number ensures that the feature key will enable the feature on only the designated system and including the quantity ensures that only the quantity (of storage space, for example) paid for by the customer will be enabled. Additional fields may also be included identifying a storage architecture on which the feature is to be enabled, identifying a machine on which the feature is to be enabled, and identifying a sequence of prior feature keys generated for the feature on the target system.Type: ApplicationFiled: December 3, 2004Publication date: June 8, 2006Applicant: International Business Machines (IBM) CorporationInventors: Richard Ripberger, Helena Burton
-
Publication number: 20060117213Abstract: Data management systems, such as used in disk control units, employ memory entry lists to help keep track of user data. Improved performance of entry list maintenance is provided by the present invention. Much of the protocol employed to conduct such maintenance is preferably performed by hardware-based logic, thereby freeing other system resources to execute other processes. New entries to the memory list are only allowed at predetermined addresses and entries are updated by writing a predetermined data pattern to a previously allocated address. Optionally, improved error detection, such as a longitudinal redundancy check, may also be performed in an efficient manner during entry list maintenance to assure the integrity of the list.Type: ApplicationFiled: November 17, 2004Publication date: June 1, 2006Applicant: International Business Machines (IBM) CorporationInventors: Ronald Chapman, Gary Batchelor, Michael Benhase, Kenneth Todd
-
Publication number: 20060114930Abstract: Systems, methods and a computer program product are provided to permit the identification of all of the devices of a specified domain in a multi-domain environment. All communication among the domain devices is in-band having the advantage that no additional cabling is required. A control center between host devices and the domains receives an in-band command from an initiating device in a specified domain, the command being transmitted in response to the activation of a triggering device on the initiating device. Upon receipt of the command, the control center broadcasts an in-band command to each of the other devices in the domain directing the other devices to activate an indicator on each of the other devices. With the indicators on the devices in the specified domain activated, an administrator is able to identify those devices and thus focus his search for the faulty device only on those devices within the domain.Type: ApplicationFiled: November 17, 2004Publication date: June 1, 2006Applicant: International Business Machines (IBM) CorporationInventors: Gregg Lucas, Robert Kubo, Michael Curnalia, Aaron Cox, Matthew Bomhoff
-
Patent number: 7054887Abstract: A system and method in accordance with the present invention provides for replication in a content management system. Replication is provided by utilizing the library server to track the objects to be replicated within the system. The replication is accomplished by adding two tables to the library server, a copies table and replicate table. The copies tables includes three new parts flags. A first flag identifies an ending as a copied part. A second flag identifies that other copies of this part exist. Finally a third flag identifies that a part is not yet available.Type: GrantFiled: November 9, 2001Date of Patent: May 30, 2006Assignee: IBM CorporationInventor: Gerald Edward Kozina
-
Publication number: 20060112393Abstract: A hardware device for processing the tasks of an algorithm of the type having a number of processes the execution of some of which depend on binary decisions has a plurality of task units (10, 12, 14), each of which are associated with a task defined as being either one process or one decision or one process together with a following decision. A task interconnection logic block (16) is connected to each task unit for communicating actions from a source task unit to a destination task unit. Each task unit includes a processor (18) for processing the steps of the associated task when a received action requests such a processing.Type: ApplicationFiled: January 3, 2006Publication date: May 25, 2006Applicant: IBM CorporationInventors: Alain Benayoun, Jean-Francois Le Pennec, Patrick Michel, Claude Pin
-
Publication number: 20060109346Abstract: A communication system for multiple users whereby an automatic indication of away status is prompted immediately upon a user's departure from the vicinity of a computer or other medium. In a preferred embodiment, this is accomplished, in an instant messaging environment, via a video camera arrangement whereby, upon there being a detection of a user's absence from the immediate vicinity, an automatic prompt is made to indicate away status for the user.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Applicant: IBM CorporationInventors: John Robinson, Michael Wazlowski
-
Publication number: 20060112233Abstract: Arrangements and method for enabling and disabling cache bypass in a computer system with a cache hierarchy. Cache bypass status is identified with respect to at least one cache line. A cache line identified as cache bypass enabled is transferred to one or more higher level caches of the cache hierarchy, whereby a next higher level cache in the cache hierarchy is bypassed, while a cache line identified as cache bypass disabled is transferred to one or more higher level caches of the cache hierarchy, whereby a next higher level cache in the cache hierarchy is not bypassed. Included is an arrangement for selectively enabling or disabling cache bypass with respect to at least one cache line based on historical cache access information.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Applicant: IBM CorporationInventors: Zhigang Hu, John Robinson, Xiaowei Shen, Balaram Sinharoy
-
Publication number: 20060106971Abstract: Methods, systems, computer program products and methods for deploying computing infrastructure for managing metadata in a storage subsystem are provided. A call is received from a client to update a portion of a metadata track. Data is also received from the client identifying at least one field of the metadata track to be updated, associated update values for the at least one field to be updated and an update type for the at least one field. A data structure field of a client interface is then populated with the identity of the at least one field and the associated update values and an opcode field of the client interface is populated with the update type. A task control block (TCB) is then allocated to the client call and, at the direction of the TCB, various operations are performed without further activity by the client. The metadata track may also be validated before being updated to ensure that the client has access only to valid updates.Type: ApplicationFiled: November 18, 2004Publication date: May 18, 2006Applicant: International Business Machines (IBM) CorporationInventors: Aaron Mahar, Angelique Budaya, James Springer
-
Publication number: 20060106957Abstract: A method of verifying the passage of a data write across a bus is provided including sending the data write from an originator across the bus to a target, counting the number of data entries received at the target with a counter, and transmitting a return echo write from the target across the bus to a return address. The method further includes attaching the counter value to other data associated with the return echo write and polling the return address. The method allows determination of the completion of a data write by comparing the number of data entries included in the data write with the counter value polled from the return address. Alternatively, in a data streaming environment the progress of a data write may be determined by comparing the number of data entries included in the data write at a select point in time with the counter value polled from the return address. Typical data entries which are counted may include, but are not limited to, bytes, words, double words, or similar data quantities.Type: ApplicationFiled: November 17, 2004Publication date: May 18, 2006Applicant: International Business Machines (IBM) CorporationInventors: Ronald Chapman, Michael Benhase, Gary Batchelor, Cheng-Chung Song
-
Publication number: 20060106873Abstract: Method for selectively clearing persistent data such as metadata in a storage subsystem. The method includes identifying one or more metadata tracks to clear, receiving a request from a client to clear the identified metadata tracks, passing the request to a storage device driver, and clearing the identified metadata tracks. The metadata tracks to be cleared may be identified by a specific storage function associated with the metadata to be cleared or by a specific storage target associated with metadata. Alternatively, both a storage function and a storage target may be specified. Preferably, the request to clear one or more identified metadata tracks may be executed without affecting unrelated storage functions. In addition, the request may be executed while preserving metadata tracks unrelated to the identified metadata tracks.Type: ApplicationFiled: November 18, 2004Publication date: May 18, 2006Applicant: International Business Machines (IBM) CorporationInventors: James Springer, Yu-Cheng Hsu, Lloyd Wiebe, Kurt Lovrien, David Mannenbach, Angelique Budaya
-
Publication number: 20060106891Abstract: Methods, systems, computer program products and methods for deploying computing infrastructure for managing metadata in a storage subsystem are provided. A first metadata track is staged from disk storage to a cache storage after which a journal entry is stored in a nonvolatile storage (NVS). The journal entry includes an opcode and update data for the track. The opcode identifies the type of update to be performed and the number of tracks to be updated in the operation. Each of the other metadata tracks is staged and a corresponding journal entry stored. The journaled updates are then applied to the respective metadata track in the cache storage and the tracks destaged from cache to the disk storage.Type: ApplicationFiled: November 18, 2004Publication date: May 18, 2006Applicant: International Business Machines (IBM) CorporationInventors: Aaron Mahar, Angelique Budaya, James Springer
-
Publication number: 20060101833Abstract: A data processing unit including a first active cooling device configured to respond to a first control signal and a second active cooling device configured to respond to a second control signal. The control signals may be any type of control signal suitable to control the operation of the first and second active cooling devices. The data processing unit also includes a first control function selectively capable of providing the first control signal and/or the second control signal, and a second control function selectively capable of providing the first control signal and/or the second control signal. Logic associated with the first and second control functions is included to determine which of the control functions will provide which control signal at a specific time. Logic and/or switching or isolation apparatus is also included to prevent both the first and second control functions from attempting to provide one of the control signals simultaneously.Type: ApplicationFiled: November 12, 2004Publication date: May 18, 2006Applicant: International Business Machines (IBM) CorporationInventors: Gregg Lucas, Robert Kubo, Brian Cagno, Matthew Bomhoff
-
Publication number: 20060106829Abstract: Methods, systems, computer program products and methods for deploying computing infrastructure for clearing metadata in a storage subsystem. The method includes identifying one or more metadata tracks to clear, receiving a request from a client to clear the identified tracks, quiescing any active processes, clearing the identified tracks and resuming the quiesced processes. The request may be a single request operable to clear all metadata tracks. Alternatively, target volumes having metadata tracks to be cleared are identified and a request is received from a client for each target volume. A dynamic function list may also be created for each target volume, the list including list of functions in which the target volume is associated. After active processes are quiesced, each function in the dynamic function list of each target volume is invoked whereby the metadata tracks are cleared. The quiesced processes are then resumed.Type: ApplicationFiled: November 18, 2004Publication date: May 18, 2006Applicant: International Business Machines (IBM) CorporationInventors: Angelique Budaya, Aaron Mahar, James Springer, Warren Stanley, Gail Spear
-
Publication number: 20060101469Abstract: A method, controller, program product and service are provided for more efficiently managing a resource queue. Two or more queues are configured to handle workloads of various sizes. Resource elements are allocated from the top of each queue and returned to the bottom. The size of each queue may be selected to provide sufficient resource elements to handle a system's various levels of workload. As the workload increases and all of the resource elements in the one queue are allocated, new resource elements are allocated from the top of the next queue and returned to the bottom. When the workload decreases, resource elements are no longer allocated from the queues used for higher workloads. Thus, retention of historical data in the queues is enhanced while efficient cache utilization is maintained.Type: ApplicationFiled: November 10, 2004Publication date: May 11, 2006Applicant: International Business Machines (IBM) CorporationInventor: Roger Hathorn
-
Publication number: 20060098818Abstract: A method of transmitting information from a primary storage control unit to a secondary storage control unit in an asynchronous data copying system. The method includes building multiple descriptor blocks for transmission from the primary storage control unit, and encrypting multiple payloads according to one of n encryption methods. In addition, the n encryption methods are associated with the primary storage control unit and n decryption keys relating to the n encryption methods are associated with the secondary storage control unit. An index to the n encryption keys is associated with the multiple descriptor blocks. The method further includes encrypting each of the payloads according to one of the n encryption methods and indicating, in the index associated with a selected descriptor block, which decryption key relates to the encryption method used for any payload associated with a select descriptor block.Type: ApplicationFiled: November 10, 2004Publication date: May 11, 2006Applicant: International Business Machines (IBM) CorporationInventors: Nicholas Fifer, Robert Bartfai, William Micka, Warren Stanley, Kenneth Day, Kenneth Boyd
-
Publication number: 20060101249Abstract: A response to the continuing trend of ever-increasing processor speeds and attendant increases in memory latencies. Broadly contemplated herein are braids and fibers, high-level programming constructs which facilitate the creation of programs that are partially ordered. These partial orders can be used to respond adaptively to memory latencies. It is shown how these constructs can be effectively supported with simple and inexpensive instruction set and micro-architectural extensions.Type: ApplicationFiled: October 5, 2004Publication date: May 11, 2006Applicant: IBM CorporationInventors: David Bacon, Xiaowei Shen
-
Publication number: 20060095261Abstract: Mechanisms, and associated methods, for conducting voice analysis (e.g., speaker ID verification) directly from a compressed domain of a voice signal. Preferably, the feature vector is directly segmented, based on its corresponding physical meaning, from the compressed bit stream.Type: ApplicationFiled: October 30, 2004Publication date: May 4, 2006Applicant: IBM CorporationInventors: Debanjan Saha, Zon-Yin Shae