Patents Assigned to International Business Machine
  • Patent number: 10091151
    Abstract: Technical solutions are described for a seller to bypass a spam filter. An example method includes sending, by a message preempting apparatus, for receipt by a server corresponding to the seller, a transaction identifier in response to a transaction between a user and the seller. The method also includes sending, by the message preempting apparatus, for receipt by a messaging server, the transaction identifier, where the messaging server, in response, bypasses a spam filter for a message that is associated with the transaction identifier.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: October 2, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Hardee, Steve Joroff, Pamela A. Nesbitt, Scott E. Schneider
  • Patent number: 10089352
    Abstract: A computer-implemented method includes determining that a database query warrants a first projection operation to project a plurality of input rows to a plurality of projected rows, where each of the plurality of input rows has one or more variable-length columns. A first projection control block is constructed, by a computer processor, to describe the first projection operation. The first projection operation is offloaded to a hardware accelerator. The first projection control block is provided to the hardware accelerator, and the first projection control block enables the hardware accelerator to perform the first projection operation at streaming rate.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: October 2, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sameh W. Asaad, Parijat Dube, Hong Min, Bharat Sukhwani, Matthew S. Thoennes
  • Patent number: 10091142
    Abstract: In an embodiment of the present invention, a first message is determined. The first message is associated with two or more users. The two or more users include a sender of the first message and one or more recipients of the first message. In response to determining that a first user of the two or more users is currently generating a second message, which is a response to the first message, it is determined whether a second user of the two or more users of the first message is currently generating a third message, which is a response to the first message. In response to determining that the second user is currently generating the third message, the first user is notified that the second user is currently generating the third message, and the second user is notified that the first user is currently generating the second message.
    Type: Grant
    Filed: April 6, 2018
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Zeev Gal-Tzur, Gili Nachum, Itai Zapler
  • Patent number: 10089085
    Abstract: From a present version of a first artifact which is mutable, an artifact baseline corresponding to the present version of the first artifact can be created. Responsive to creating the artifact baseline, the present version of the first artifact can be made immutable. Present versions of children artifacts of the present version of the first artifact which are mutable also can be made immutable. Responsive to identifying a change to the present version of the first artifact, a new version of the first artifact can be automatically created, wherein the new version of the first artifact is mutable.
    Type: Grant
    Filed: October 25, 2016
    Date of Patent: October 2, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas D. J. Crossley, Troy R. Dugger, David J. Honey, Samuel Sung-Ok Lee, Schuyler B. Matthews, Darcy L. Wiborg Weber
  • Publication number: 20180275870
    Abstract: A method for minimizing head seek movement and improving I/O performance of a hard disk drive is disclosed. In one embodiment, such a method includes logically dividing storage space of a hard disk drive into storage areas of substantially equal size. The method monitors a temperature of each of the storage areas. The temperature indicates how frequently data in a corresponding storage area is accessed. The method swaps data in storage areas of the hard disk drive based on temperature. These swaps involve moving hotter data toward outer tracks of the disk drive and colder data toward inner tracks of the disk drive. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: March 21, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Richard Hutzler, Gregory T. Kishi, Neil Sondhi
  • Publication number: 20180274927
    Abstract: A system and method for cognitive risk mitigation are presented. Embodiments comprise journey prediction, parsing of data sources, risk assessment and mitigation, and natural-language user interaction by a cognitive processor. Data is gathered from a plurality of data sources and analyzed in the context of one or more of the user's intention(s). A dialogue with the user, in natural language, aims to provide and select one or more suggestions relating to the one or more user intention(s) such that the risk(s) relating to the one or more user's intention(s) is reduced. During the dialogue, cognitive reasoning may be performed, wherein the cognitive reasoning includes the ability to justify each suggestion and the ability to infer information from the interaction such as, for example, data obtained in a dialogue may inform subsequent inferences. The embodiments may use speech synthesis and speech recognition in an interactive spoken dialogue.
    Type: Application
    Filed: March 27, 2017
    Publication date: September 27, 2018
    Applicants: INTERNATIONAL BUSINESS MACHINES CORPORATION, UNIVERSITY COLLEGE DUBLIN
    Inventors: Jonathan EPPERLEIN, Claudio GAMBELLA, Wynita M. GRIGGS, Yassine LASSOUED, Jakub MARECEK, Martin MEVISSEN, Julien MONTEIL, Rodrigo H. ORDONEZ-HURTADO, Giovanni RUSSO, Robert SHORTEN
  • Publication number: 20180276087
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include detecting a loss of communication with a given storage node among multiple storage nodes in a distributed computing system. Upon detecting the loss of communication, a log including updates to the data stored in the given storage node is recorded and, the recorded updates can be applied to the given storage node upon communication with the given storage node being reestablished. In some embodiments, the distributed storage system may be configured as a software defined storage system where the storage nodes can be implemented as either virtual machines or software containers. In additional embodiments, upon detecting the loss of communication, a redistribution of the mirrored data among remaining storage nodes is initiated upon detecting the loss of communication, and the redistribution is rolled back upon reestablishing the communication.
    Type: Application
    Filed: June 1, 2018
    Publication date: September 27, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ram ELRON, Michael KELLER, Rivka M. MATOSEVICH, Osnat SHASHA
  • Publication number: 20180275884
    Abstract: A method for utilizing parallel paths of differing performance to improve efficiency is disclosed. In one embodiment, such a method includes transmitting, over a faster path, a first command to perform first actions intended to improve efficiency of second actions associated with a second command. The method transmits, over a slower path in parallel with the faster path, the second command. Alternatively, a method for utilizing parallel paths of differing performance to improve efficiency includes receiving, over a faster path, a first command to perform first actions intended to improve efficiency of second actions associated with a second command. The method executes the first command to perform the first actions. The method receives, over a slower path in parallel with the faster path, the second command and executes the second command to perform the second actions. Corresponding systems and computer program products are also disclosed.
    Type: Application
    Filed: March 21, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Dale F. Riedy, Peter G. Sutton, Harry M. Yudenfriend
  • Publication number: 20180276993
    Abstract: Embodiments for managing drones by one or more processors are described. A first aerial drone having a payload coupled thereto is controlled such that the first aerial drone travels from a first location to a second location. A second aerial drone is controlled such that the second aerial drone travels to the second location. While the first aerial drone and the second aerial drone are in flight at the second location, the payload is detached from the first aerial drone and coupled to the second aerial drone. After the payload is detached from the first aerial drone and while the payload is coupled to the second aerial drone, the second aerial drone is controlled such that the second aerial drone travels from the second location to a third location.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stephen CHOW, Grant D. MILLER, Nader M. NASSAR, Richard J. NEWHOOK, Erich D. WALLS
  • Publication number: 20180278745
    Abstract: A communication device associated with a first party monitors a call between the first party and a second party. The communication device identifies a request for sensitive information from the second party during the call. The communication device determines whether the requested sensitive information matches sensitive information stored in an encrypted data store by determining whether a text representation of the requested sensitive information matches a text representation of the sensitive information stored in the encrypted data store. The communication device sends, responsive to determining that the requested for sensitive information matches the stored sensitive information, the requested sensitive information to the second party.
    Type: Application
    Filed: March 24, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Romelia H. Flores, Christian E. Loza, Olivia G. Loza, Tomyo G. Maeshiro
  • Publication number: 20180276133
    Abstract: Provided are a computer program product, system, and method for locking a cache line for a burst write operations on a bus. A cache line is allocated in a cache for a target address. A lock is set for the cache line, wherein setting the lock prevents the data in the cache line from being cast out. Data is written to the cache line. All the data in the cache line is flushed to the target address over a bus in response to completing writing to the cache line.
    Type: Application
    Filed: May 25, 2018
    Publication date: September 27, 2018
    Applicants: International Business Machines Corporation, International Business Machines Corporation
    Inventors: Stephen L. Blinick, Charles S. Cardinell, Roger G. Hathorn, Benhard Laubli, Miguel A. Montoya, Timothy J. Van Patten
  • Publication number: 20180276156
    Abstract: A method is provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.
    Type: Application
    Filed: October 24, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
  • Publication number: 20180277663
    Abstract: A first layer of a first material is deposited on a first structure and a second structure, a surface of the first structure being disposed substantially parallelly to a surface of the second structure in at least one direction. A selectively removable material is deposited over the first layer and removed up to a height of a first step. The first material is removed from a portion of the first layer that is exposed from removing the selectively removable material up to the height of the first step. A remainder of the selectively removable material is removed to expose a second portion of the first layer, the second portion of the first layer forming the first step. A second layer of a second material is deposited on the first structure, the second structure, and the second portion of the first layer, causing a formation of a stepped structure.
    Type: Application
    Filed: March 24, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Balasubramanian S. Pranatharthiharan, Pietro Montanini, John R. Sporre, Ruilong Xie
  • Publication number: 20180276155
    Abstract: A system and computer program product are provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
  • Patent number: 10082974
    Abstract: Embodiments include providing content requested by a user via an access point capable of wireless communication. Aspects include receiving the content provided by the management server and storing the content provided by the management server into a volatile memory provided in the wireless communication apparatus. Aspects also include storing difference data into a nonvolatile memory if it is requested to change the content stored in the volatile memory and monitoring a state of communication connection with the access point and whether or not a packet giving an instruction to hold the content has been received. Aspects further include deleting the content stored in the volatile memory if communication with the access point is disconnected or if the packet is unreceived.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: September 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yasunao Katayama, Daiju Nakano, Kohji Takano
  • Patent number: 10083070
    Abstract: Embodiments of the invention provide a method, system and computer program product for log file reduction according to problem space topology. A method for log file reduction according to problem space topology can include receiving a fault report for a fault in a solution executing in memory of one or more computers of a computer data processing system. The method further can include extracting references to at least two resources of the computer data processing system from the fault report. The method yet further can include filtering a set of all log files for the computer data processing system to only a subset of log files related to the at least two resources. Finally, the method can include displaying the subset of log files in a log file analyzer.
    Type: Grant
    Filed: October 22, 2013
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Matthew Duggan, Kristian Stewart, Zhenni Yan
  • Patent number: 10083905
    Abstract: A method of forming a skip-via, including, forming a first dielectric layer on a first metallization layer, forming a second metallization layer on the first dielectric layer and a second dielectric layer on the second metallization layer, removing a section of the second dielectric layer to form a via to the second metallization layer, removing a portion of the second metallization layer to form an aperture, and removing an additional portion of the second metallization layer to form an exclusion zone.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Benjamin D. Briggs, Lawrence A. Clevenger, Bartlet H. DeProspo, Huai Huang, Christopher J. Penny, Michael Rizzolo
  • Patent number: 10084844
    Abstract: Techniques are disclosed for automatically deleting files downloaded and designated as temporary use. In response to a request to download a file and open in a second application, a web browser or other client ascertains whether the file should be deleted after use in the second application. If the file is designated for temporary use, then the client monitors the application accessing the file. When the file is closed, the client deletes the file.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: September 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas T. Bartlett, David J. Claborn, Jason C. Garcowski, Yuvaraj T. Patil, Vijay Suswaram, Mirtunjay Sharma
  • Patent number: 10083202
    Abstract: A method for verifying data consistency between update-in-place data structures and append-only data structures containing change histories associated with the update-in-place data structures is provided. The method includes loading data from an update-in-place data structure to a first set of hash buckets in a processing platform, loading data from append-only data structures to a second set of hash buckets in the processing platform, performing a bucket-level comparison between the data in the first set of hash buckets and the data in the second set of has buckets, and generating a report based on the bucket-level comparison.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Serge Bourbonnais, Si Bin Fan, Xiao Li, Jonathan W. Wierenga, Mai Zeng
  • Patent number: 10083203
    Abstract: A first request may be received to update a first set of values. The first set of values may be stored at a first location within a first data page of a database. The first location may be read-only. In response to the receiving of the first request, a first set of records may be inserted into a second data page. The first set of records may include the update of the first set of values. In response to the inserting, a forward pointer may be stored in the first data page that points to the first set of records on the second data page. One or more committed values may be identified on the second data page. In response to the identifying, the one or more committed values may be merged from the second data page to a third data page.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ronald J. Barber, Bishwaranjan Bhattacharjee, Guy M. Lohman, Chandrasekaran Mohan, Vijayshankar Raman, Mohammad Sadoghi Hamedani, Richard S. Sidle, Adam J. Storm, Xun Xue