Patents Assigned to IBM
  • Publication number: 20050114729
    Abstract: Method, system and computer program product are provided to improve the reliability of data transfers from RAID systems. Although some read errors may be detected by the RAID controller, other errors may not be; undetected errors may affect the integrity of the data. In accordance with the present invention, the host or client issues a first command to the RAID controller to read specified data. After the RAID controller obtains the data from the RAID drives and transmits it to the host, the host verifies the data to detect any errors. If an error is detected by the host, the host issues a second command to the RAID controller to reconstruct the specified data, rather than merely re-read the data. The reconstructed data is then transmitted to the host. Consequently, previously undetected and uncorrected errors may be detected and corrected by the host.
    Type: Application
    Filed: November 20, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Karl Nielsen, Colleen Stouffer, Matthew Fairhurst, Lee Sanders
  • Publication number: 20050114566
    Abstract: Methods, system and computer program product are provided to improve the efficiency of data transfers in a PPRC environment. A block of data to be transferred is divided into tracks. Each track is allocated to a data mover task control block (TCB) with a master TCB being assigned to supervise the data mover TCBs. The tracks are then transferred from the primary storage controller to the secondary controller in a piped fashion over a link coupling the primary and secondary storage controllers. However, the usage of resources is monitored by a resource management algorithm and, if too many TCBs are being used for a transfer or if the supply of data mover TCBs is exhausted, the transfer is automatically switched to a serial, non-piped transfer with the master TCB serving as the data mover TCB for the remaining tracks. In addition, the various links coupling the primary and secondary storage controllers is monitored to determine which link will provide the fastest transfer.
    Type: Application
    Filed: November 20, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: James Chen, Olympia Gluck, Gabriel Walder, Yelena Zilberstein, Warren Stanley, Edward Lin
  • Publication number: 20050102665
    Abstract: The methods, systems, data structures and computer program products for deploying software components are provided, including deploying components in an enterprise environment. Dependency relationships among components to be deployed are determined. Those components which are not dependent upon any other component may be installed first and substantially in parallel. Components which are dependent only upon the first installed components are next installed, substantially in parallel. Installation thus progresses until all components have been installed. By installing in parallel those components having a similar level of dependency, rather than installing all components sequentially, the deployment is more efficient and requires less time to complete.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Attila Barta, Kwasi Asare, Richard Huddleston, Daniel Jemiolo
  • Publication number: 20050102667
    Abstract: Methods, systems, data structures and computer program products are provided for deploying software components, including deploying components in an enterprise environment. Installation of components is initiated and a level of detail to be reported is selected. As installation progresses, a report is generated regarding the status of the installation of the components. A portion of the report is displayed identifying the components at the selected level of detail and the corresponding status. Thus, a user may select only that level of detail which is of interest.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Attila Barta, Kwasi Asare, Richard Huddleston, Daniel Jemiolo
  • Publication number: 20050102256
    Abstract: A method and system for clustering of XML documents is disclosed. The method operates under specified memory-use constraints. The system implements the method and scans an XML document, assigns edge-weights according to the application workload, and maps clusters of XML nodes to disk pages, all in a single parser-controlled pass over the XML data. Application workload information is used to generate XML clustering solutions that lead to substantial reduction in page faults for the workload under consideration. Several approaches for representing workload information are disclosed. For example, the workload may list the XPath operators invoked during the application along with their invocation frequencies. The application workload can be further refined by incorporating additional features such as query importance or query compilation costs. XML access patterns could be also modeled using stochastic approaches.
    Type: Application
    Filed: November 7, 2003
    Publication date: May 12, 2005
    Applicant: IBM Corporation
    Inventors: Rajesh Bordawekar, Sriram Padmanabhan, Oded Shmueli
  • Publication number: 20050102273
    Abstract: A method for extracting desired data from a digital database comprising the steps of specifying desired data elements to be extracted from an operational database, generating executable code from the identified data elements for extracting the identified data elements from the database, and executing the executable code thereby extracting the identified data elements from the database.
    Type: Application
    Filed: December 21, 2004
    Publication date: May 12, 2005
    Applicant: IBM Corporation
    Inventor: Arun Gupta
  • Publication number: 20050102666
    Abstract: Methods, systems, data structures and computer program products for deploying software components, including deploying components in an enterprise environment. Components previously installed and components to be installed are identified. Conflicts between such components are then identified. A user may be notified and provided with options. One option is to abort the installation. Another option is to continue the installation. If installation is continued, an entry may be made in a log indicative of the conflict and of the continuation of the installation.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Attila Barta, Kwasi Asare, Richard Huddleston, Daniel Jemiolo
  • Publication number: 20050097311
    Abstract: A method and system for configuring available resources in real-time to automatically accommodate the needs of the system user in multi-modal distributed computing system is disclosed. Information about the location or environment of a wireless device is used, preferably in combination with user personal preferences and past history to modify the behavior of the wireless device, including the selection of the most appropriate mode of interaction with the device and the activation of applications thereon as appropriate.
    Type: Application
    Filed: October 31, 2003
    Publication date: May 5, 2005
    Applicant: IBM Corporation
    Inventors: Ponani Gopalakrishnan, Stephane Maes, Ganesh Ramaswamy
  • Publication number: 20050086659
    Abstract: Regulating the execution of software execution units to manage the performance impact of administrative utilities is disclosed. Administrative utilities (e.g., filesystem and database backups, garbage collection in the Java Virtual Machines, etc.) are an essential part of the operation of production systems. Performance impact is managed through the use of throttling, either external or internal, which forces utilities to slow down their processing by a configurable amount. While a variety of criteria may be used for throttling, a self-induced sleep in preferred for internal throttling.
    Type: Application
    Filed: October 19, 2003
    Publication date: April 21, 2005
    Applicant: IBM Corporation
    Inventors: Matthew Huras, Sam Lightstone, Sujay Parekh, Kevin Rose
  • Publication number: 20050081091
    Abstract: A method of recovery from a data storage system failure in a data storage system having a host computer writing data to a first storage unit with a first storage controller synchronously mirroring the data to a second storage unit, and with a second storage controller asynchronously mirroring the data to a third storage unit. The method begins with the detection of a failure associated with the first storage unit. Upon detection of the error or failure associated with the first storage unit, the synchronous data mirroring relationship between the first storage unit and the second storage unit is terminated and the host is directed to write data updates directly to the second storage unit. Upon correction of the failure associated with the first storage unit, the asynchronous mirroring of data updates from the second storage unit to the third storage unit is suspended and synchronous mirroring of the data updates in a reverse direction, from the second storage unit to the first storage unit, is commenced.
    Type: Application
    Filed: September 29, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Robert Bartfai, Michael Factor, Gail Spear, William Micka
  • Publication number: 20050081082
    Abstract: The deployment of probing technology for the purpose of problem determination in a server or network element is disclosed. One can actively select which probes to send in order to be able to diagnose problems which one is particularly interested in, allowing for greater flexibility and efficiency. The extra load imposed on a network by the use of probes is small, especially if the algorithms described in this disclosure are used.
    Type: Application
    Filed: September 30, 2003
    Publication date: April 14, 2005
    Applicant: IBM Corporation
    Inventors: Mark Brodie, Sheng Ma, Irina Rish
  • Publication number: 20050081044
    Abstract: Methods and apparatus for enabling a Pervasive Authentication Domain. A Pervasive Authentication Domain allows many registered Pervasive Devices to obtain authentication credentials from a single Personal Authentication Gateway and to use these credentials on behalf of users to enable additional capabilities for the devices. It provides an arrangement for a user to store credentials in one device (the Personal Authentication Gateway), and then make use of those credentials from many authorized Pervasive Devices without re-entering the credentials. It provides a convenient way for a user to share credentials among many devices, particularly when it is not convenient to enter credentials as in a smart wristwatch environment. It further provides an arrangement for disabling access to credentials to devices that appear to be far from the Personal Authentication Gateway as measured by metrics such as communications signal strengths.
    Type: Application
    Filed: October 14, 2003
    Publication date: April 14, 2005
    Applicant: IBM Corporation
    Inventors: James Giles, Reiner Sailer
  • Patent number: 6876557
    Abstract: A unified SRAM cache system is provided incorporated several SRAM macros of an embedded DRAM (eDRAM) system and their functions. Each incorporated SRAM macro can be independently accessed without interfering with the other incorporated SRAM macros within the unified SRAM cache system. The incorporated SRAM macros share a single set of support circuits, such as row decoders, bank decoders, sense amplifiers, wordline drivers, bank pre-decoders, row pre-decoders, I/O drivers, multiplexer switch circuits, and data buses, without compromising the performance of the eDRAM system.
    Type: Grant
    Filed: June 12, 2001
    Date of Patent: April 5, 2005
    Assignee: IBM Corporation
    Inventors: Louis L. Hsu, Rajiv V. Joshi
  • Publication number: 20050071591
    Abstract: An automated data storage library accesses data stored on storage media contained in cartridges in response to commands from an external host. The cartridges may include cartridge memory and a component in the library may include a cartridge memory interface for reading data from and/or writing data to the cartridge memory. When a cartridge is to be stored in the library, the library modifies the contents of the cartridge memory, or the contents of the storage media such that the data stored on the cartridge becomes inaccessible, thereby preventing access to the data outside of the library. To perform an authorized access, the library restores the contents of the cartridge memory or the storage media. Alternatively, the library provides a correction or correction algorithm to the drive to allow access to the data stored on the storage media without removing the access protection of the storage media.
    Type: Application
    Filed: September 29, 2003
    Publication date: March 31, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Brian Goodman, Leonard Jesionowski, Glen Jaquette
  • Publication number: 20050071462
    Abstract: Exemplary embodiments of the present invention include a method for creating a user metric pattern. Such embodiments typically include receiving, within the network, a plurality of disparate user metrics, saving the plurality of disparate user metrics, identifying a subset of the saved disparate user metrics that comprise a user metric pattern, and storing the subset of the saved disparate user metrics as a user metric pattern. In many examples of the present invention, receiving, within the network, a plurality of disparate user metrics includes receiving a plurality of disparate user metrics from a metric sensor worn by the user.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Applicant: IBM Corporation
    Inventors: William Bodin, Michael Burkhart, Daniel Eisenhauer, Daniel Schumacher, Thomas Watson
  • Publication number: 20050071708
    Abstract: A method of recovery from a data storage system failure in a data storage system having a host computer writing data updates to a local storage controller at a local site. The local controller is associated with a local storage device. The local storage controller is also configured to asynchronously copy the updates to a remote storage controller associated with a remote storage device at a remote site. In addition, the remote storage controller is configured to store a consistent point in time copy of the updates on a backup storage device. The consistent point in time copy is known as a consistency group. Upon detection of a failure associated with the local site, a determination is made whether a group of updates pending for storage on the backup storage device form an intact consistency group. If an intact consistency group has not formed, corrective action may be taken to create an intact consistency group.
    Type: Application
    Filed: September 29, 2003
    Publication date: March 31, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Robert Bartfai, Gail Spear
  • Publication number: 20050071463
    Abstract: Embodiments of the present invention include a method for administering devices within a network. Such embodiments typically include receiving, within the network, at least one user metric for a user, and receiving, from a device within the network, device content metadata. Such embodiments also typically include identifying an action in dependence upon the user metric and the device content metadata, and executing the action within the network.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Applicant: IBM CORPORATION
    Inventors: William Bodin, Michael Burkhart, Daniel Eisenhauer, Daniel Schumacher, Thomas Watson
  • Publication number: 20050071806
    Abstract: The use of extension types as a mechanism for an essentially horizontal extension of types for modeling multiple extensions and variations of a software artifact. In that an extension type is a tuple of unrelated classes, each element class in the tuple corresponds to an extension of the extension type. Using extension types, one can bring two unrelated classes or types together to perform computations. Shown herein are manners via which extension types may elegantly model multiple and dynamic extensions of an artifact. Also shown is how extension types simplify aspect-oriented software development and several design patterns.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Applicant: IBM Corporation
    Inventor: Vugranam Sreedhar
  • Publication number: 20050071334
    Abstract: Classification of objects using the best boolean expression that represents the most optimal combination of the underlying features is disclosed.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Applicant: IBM Corporation
    Inventors: Laxmi Parida, Ajay Royyuru
  • Publication number: 20050071550
    Abstract: A data storage control unit is coupled to one or more host devices and to one or more physical storage units, the physical storage units collectives configured as a plurality of logical storage ranks. The storage control unit receives and processes write requests from the host devices and directs that data updates be stored in a temporary storage. The data updates are subsequently destaged to the logical ranks. Write requests are processed at a predetermined rate relative to the rate at which destages are performed (destage mode or rate). The storage control unit evaluates workload conditions of the temporary storage and modifies the destage mode if the temporary storage is in danger of becoming backlogged or if an actual backlog is created, thereby applying a “throttle” to the host write requests. Thus, method, apparatus and program product are provided to dynamically modify a level of throttling whereby through-put of a host device is substantially maintained.
    Type: Application
    Filed: September 29, 2003
    Publication date: March 31, 2005
    Applicant: International Business Machines Corporation (IBM)
    Inventors: Steven Lowe, Kevin Ash