Patents Assigned to International Business Machine Corporation
-
Publication number: 20140217508Abstract: A method of fabricating an electronic device includes the following steps. A SOI wafer is provided having a SOI layer over a BOX. An oxide layer is formed over the SOI layer. At least one first set and at least one second set of fins are patterned in the SOI layer and the oxide layer. A conformal gate dielectric layer is selectively formed on a portion of each of the first set of fins that serves as a channel region of a transistor device. A first metal gate stack is formed on the conformal gate dielectric layer over the portion of each of the first set of fins that serves as the channel region of the transistor device. A second metal gate stack is formed on a portion of each of the second set of fins that serves as a channel region of a diode device.Type: ApplicationFiled: August 15, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Josephine B. Chang, Isaac Lauer, Chung-Hsun Lin, Jeffrey W. Sleight
-
Publication number: 20140222740Abstract: Embodiments of the invention relate to a neural network system comprising a single memory block for multiple neurosynaptic core modules. One embodiment comprises a neural network system including a memory array that maintains information for multiple neurosynaptic core modules. Each neurosynaptic core module comprises multiple neurons. The neural network system further comprises at least one logic circuit. Each logic circuit receives neuronal firing events targeting a neurosynaptic core module of the neural network system, and said logic circuit integrates the firing events received based on information maintained in said memory for said neurosynaptic core module.Type: ApplicationFiled: November 21, 2012Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: International Business Machines Corporation
-
Publication number: 20140217482Abstract: A method of fabricating an integrated circuit includes forming an interlayer dielectric (ILD) layer over a dummy gate stack. The dummy gate stack includes a dummy gate structure, a hardmask layer, and sidewall spacers formed over a semiconductor substrate. The method further includes removing at least an upper portion of the dummy gate stack to form a first opening within the ILD layer, extending the first opening to form a first extended opening by completely removing the dummy gate structure of the dummy gate stack, and depositing at least one workfunction material layer within the first opening and within the first extended opening. Still further, the method includes removing portions of the workfunction material within the first opening and depositing a low-resistance material over remaining portions of the workfunction material thereby forming a replacement metal gate structure that includes the remaining portion of the workfunction material and the low-resistance material.Type: ApplicationFiled: February 5, 2013Publication date: August 7, 2014Applicants: INTERNATIONAL BUSINESS MACHINES CORPORATION, GLOBALFOUNDRIES, INC.Inventors: Ruilong Xie, Xiuyu Cai, Kangguo Cheng, Ali Khakifirooz
-
Publication number: 20140216943Abstract: A laminating structure includes a first magnetic layer, a second magnetic layer, a first spacer disposed between the first and second magnetic layers and a second spacer disposed on the second magnetic layer.Type: ApplicationFiled: August 19, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Robert E. Fontana, JR., William J. Gallagher, Philipp Herget, Eugene J. O'Sullivan, Lubomyr T. Romankiw, Naigang Wang, Bucknell C. Webb
-
Publication number: 20140222839Abstract: A method and system for sorting data of an input file containing multiple records associated with multiple tables of a database. The multiple records include key values. The key values are segmented into ranges of key values for each table. Each range of key values for each table is a segment having a segment value. Multiple key values are selected for the multiple records. A block number, which contains a unique permutation of the segment values of the segments, is generated. The segment values denote the ranges of key values encompassing the multiple key values in each record. A sort key value for each record is ascertained, based on the generated block number for each record, and added to each record. The multiple records are sorted according to the sort key values in the multiple records. The sorted multiple records are stored in an output file.Type: ApplicationFiled: February 25, 2014Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Ritsuko Boh, Noriaki Kohno
-
Publication number: 20140222497Abstract: Historic and current development data associated with the project may be gathered. A catalog of patterns, each pattern associated with a data measure and an analysis routine capable of detecting the pattern according to the data measure in a given data set may be obtained. A pattern describes a particular indication in the historical and development data, which arises one or more of, at a discrete point in time or over a period of time. The analysis routine may be applied to the historic and current development data. A notification may be issued responsive to identifying the pattern in the historic and current development data. The applying and the issuing may be performed for each pattern in the catalog of patterns.Type: ApplicationFiled: February 12, 2014Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Murray R. Cantor, Evelyn Duesterwald, Tamir Klinger, Peter K. Malkin, Paul M. Matchen, Stanley M. Sutton, Peri L. Tarr, Mark N. Wegman
-
Publication number: 20140223121Abstract: A request is received to perform a point in time copy operation from a source volume to a space efficient target volume. A controller copies data stored in a group of data storage units, from the source volume to a non-volatile storage, to preserve the point in time copy operation. A background process asynchronously copies the data from the non-volatile storage to the space efficient target volume to commit a physical point in time copy of the data from the source volume to the target volume.Type: ApplicationFiled: February 5, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Theresa M. Brown, Nedlaya Y. Francisco, Suguang Li, Beth A. Peterson
-
Publication number: 20140217356Abstract: An electronic device includes a spreading layer and a first contact layer formed over and contacting the spreading layer. The first contact layer is formed from a thermally conductive crystalline material having a thermal conductivity greater than or equal to that of an active layer material. An active layer includes one or more III-nitride layers. A second contact layer is formed over the active layer, wherein the active layer is disposed vertically between the first and second contact layers to form a vertical thin film stack.Type: ApplicationFiled: February 5, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CAN BAYRAM, JACK O. CHU, CHRISTOS DIMITRAKOPOULOS, JEEHWAN KIM, HONGSIK PARK, DEVENDRA K. SADANA
-
Publication number: 20140223012Abstract: Embodiments of the present invention provide an approach for providing cluster-aware (storage) resource provisioning in a networked computing environment (e.g., a cloud computing environment) based upon policies, best practices, and/or storage cluster/environment configurations. In a typical embodiment, a set of characteristics (e.g., computing resources/components, etc.) of a storage environment will be determined. A set of requirements for a set of workloads to be processed by the components of the storage environment will then be identified. A set of policies and a set of best practices will then be determined to identify a configuration of the storage environment to optimize the processing of the set of workloads according to the set of requirements. Based on the configuration, a plan will be generated that indicates a data path through the set of computing resources that minimizes a potential for error in processing the set of workloads.Type: ApplicationFiled: February 5, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sandip Agarwala, Kavita Chavda, Michael L. Lamb, Stephen J. Luko, JR., Ramani R. Routray
-
Publication number: 20140223242Abstract: A technique for motivating lazy RCU callbacks under out-of-memory conditions. In response to detecting an actual or potential OOM condition, non-lazy callback processing is performed for all processors whose RCU callback lists are non-empty due to at least one callback permitting lazy callback processing being present.Type: ApplicationFiled: February 4, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Paul E. McKenney
-
Publication number: 20140217506Abstract: A method of fabricating an electronic device includes the following steps. A SOI wafer is provided having a SOI layer over a BOX. An oxide layer is formed over the SOI layer. At least one first set and at least one second set of fins are patterned in the SOI layer and the oxide layer. A conformal gate dielectric layer is selectively formed on a portion of each of the first set of fins that serves as a channel region of a transistor device. A first metal gate stack is formed on the conformal gate dielectric layer over the portion of each of the first set of fins that serves as the channel region of the transistor device. A second metal gate stack is formed on a portion of each of the second set of fins that serves as a channel region of a diode device.Type: ApplicationFiled: February 7, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Josephine B. Chang, Isaac Lauer, Chung-Hsun Lin, Jeffrey W. Sleight
-
Publication number: 20140222484Abstract: In one embodiment, a system for motivating electronically-scheduled event attendance can include a set of attendance listening components, an attendance prompt, and an attendance prompting tool. The attendance listening components can monitor activities performed in a networked environment. The attendance prompt can represent an electronic message and feedback mechanism that is provided on an electronic device. The attendance prompting tool can interject the attendance prompt into an activity identified by an attendance listening component as being performed by a user-selected member of the networked environment. The attendance prompt can be associated with an electronically-scheduled event the user-selected member is to attend.Type: ApplicationFiled: April 9, 2014Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SEAN CALLANAN, RUTHIE D. LYLE, PATRICK J. O'SULLIVAN, FRED RAGUILLAT, CAROL S. ZIMMET
-
Publication number: 20140217507Abstract: A method of fabricating an electronic device includes the following steps. A SOI wafer is provided having a SOI layer over a BOX. At least one first/second set of nanowires and pads are patterned in the SOI layer. A conformal gate dielectric layer is selectively formed surrounding a portion of each of the first set of nanowires that serves as a channel region of a transistor device. A first metal gate stack is formed on the conformal gate dielectric layer surrounding the portion of each of the first set of nanowires that serves as the channel region of the transistor device in a gate all around configuration. A second metal gate stack is formed surrounding a portion of each of the second set of nanowires that serves as a channel region of a diode device in a gate all around configuration.Type: ApplicationFiled: February 7, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Josephine B. Chang, Isaac Lauer, Chung-Hsun Lin, Jeffrey W. Sleight
-
Publication number: 20140223508Abstract: Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A capability is dynamically constructed when the capability is needed. After the capability is used to access an object, a new capability is generated. In the alternative, multiple capabilities for enforcing an access order are generated independently of each other. The new capability is then employed by the same or another subject to access the object according to a prescribed access sequence. In this manner, at any particular time there is one capability valid to access the object by the appropriate subject. In addition, the capability includes information for verifying the authenticity of the capability and for specifying an expiration time associated with the capability. The technology may also be enhanced by providing a linkage between capabilities intended for use in a sequence.Type: ApplicationFiled: April 8, 2014Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: I-Lung Kao
-
Publication number: 20140222970Abstract: A system and method for streaming media and, more particularly, to a system and method for active transcoding of content in a distributed system. The method includes receiving a file having predetermined parameters and sizing the file up to an optimal packet size according to a logarithmic scheme. The optimal packet size is a largest packet size. In further aspects, the method also includes providing a computer infrastructure operable to perform the steps herein. The system includes a media service, rules engine, log based job creator and a stream constructor. A computer infrastructure having computer readable medium to perform the processes described herein is also provided.Type: ApplicationFiled: April 7, 2014Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert W. BOND, Stephen E. JAFFE, Michael P. OUTLAW, Matthew A. TERRY, Matthew B. TREVATHAN
-
Publication number: 20140222490Abstract: A method and associated systems for automatically identifying critical resources in an organization. An organization creates a model of the dependencies between pairs of resource types, wherein that model describes how the organization's projects and services are affected when a resource type becomes unavailable. This model may include a system of directed graphs. This model may be used to automatically identify a resource type as critical if unacceptable cost is incurred by resuming projects and services rendered infeasible when the resource type is disrupted. The model may also be used to automatically identify a first resource type as critical for a second resource type when disruption of the first resource type forces the available capacity of the second resource type to fall below a threshold value.Type: ApplicationFiled: April 11, 2014Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sreyash D. Kenkre, Sameep Mehta, Krishnasuri Narayanam, Vinayaka D. Pandit
-
Publication number: 20140222844Abstract: A method for managing media storage. The method includes determining, by a computer, that storage space is needed on a storage device, wherein the storage device stores one or more media files. The method includes determining a likely viewing device for a media file selected from the one or more media files and converting the media file from a first format to a second format, based on the determined likely viewing device.Type: ApplicationFiled: February 1, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kulvir S. Bhogal, Rick A. Hamilton, II, Brian M. O'Connell, Mark W. Talbot, Keith R. Walker
-
Publication number: 20140222990Abstract: Analyzing communication network data set access of a data set group constituted by multiple data sets. The method includes the following steps: (i) determining, for a first interval, a first low access count value corresponding to an amount of data sets in the data set group that have been accessed, in the first interval, an amount of times that is no greater than a low access threshold value; (ii) determining, for a second interval, a second low access count value corresponding to an amount of data sets in the data set group that have been accessed, in the second interval, an amount of times that is no greater than the low access threshold value; and (iii) determining a delta value based, at least in part, on a difference between the first low access count value and the second low access count value.Type: ApplicationFiled: February 4, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Trudy L. Hewitt, Matthew C. Hillary, Lee A. Jacobson, Michael S. Thomason
-
Publication number: 20140223000Abstract: Systems for enabling an application to track provenance include an application analysis module configured to analyze an application binary to discover injection points for provenance tracking code; and an instruction alteration module configured to overwrite instructions in the application binary at the injection points to create an instrumented application. The overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations.Type: ApplicationFiled: September 17, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Marco Pistoia, John Ponzo
-
Publication number: 20140222779Abstract: Embodiments of the present invention provide a method, system and computer program product for query generation from a previous result set. In an embodiment of the invention, a method for query generation from a previous result set is provided. The method includes identifying commonalities in a selection of records of a result set produced by a previously issued query against a database in a database management system executing in memory by at least one processor of a host server. The method further includes deriving a query from the identified commonalities that when executed against the database management system would produce the selection of records as the result set. Finally, the method includes storing the derived query for subsequent use in querying the database.Type: ApplicationFiled: April 7, 2014Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Matthew G. Marum, Samuel G. Padgett, Nirav S. Sheth, Steven K. Speicher, Michael J. Tabb