Patents Assigned to International Business Machine
  • Publication number: 20130208726
    Abstract: Techniques are provided for packet routing in a distributed network switch. The distributed network switch includes multiple switch modules operatively connected to one another, and each switch module includes multiple bridge elements and a management controller. In one embodiment, a shared interface routing (SIR) framework is provided that includes an analysis and bifurcation layer and at least one packet interface. A packet is received over a first logical network and via a physical port, the packet being destined for at least a first application executing on the management controller. The analysis and bifurcation layer analyzes the packet and sends the packet to the packet interface, which then routes the packet to the first application.
    Type: Application
    Filed: February 14, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William J. Armstrong, Josep Cors, David R. Engebretsen, Paul E. Movall, Eric G. Thiemann
  • Publication number: 20130207702
    Abstract: Circuits and methods are provided for generating clock signals and correcting duty cycle distortion in clock signals. A circuit for generating a clock signal includes a multiplexer circuit and an edge-triggered flip-flop circuit. The multiplexer circuit selectively outputs one of a plurality of input clock signals. The edge-triggered flip-flop detects a transitioning edge of the input clock signal that is selectively output from the multiplexer circuit, and in response to the detection, samples a logic level of a received data signal, and generates a transition of an output clock signal at an output port of the edge-triggered flip-flop. The multiplexer circuit selectively outputs one of the plurality of input clock signals to a clock signal port of the edge-triggered flip-flop, based on a logic level of the output clock signal at the output port of the edge-triggered flip-flop, which is input to a select control port of the multiplexer circuit.
    Type: Application
    Filed: June 27, 2012
    Publication date: August 15, 2013
    Applicant: International Business Machines Corporation
    Inventors: John F. Bulzacchelli, Ankur Agrawal
  • Publication number: 20130212472
    Abstract: One or more artifact drafts may be associated with each of a plurality of artifacts, each of the artifact drafts representing a state of the associated artifact at a point in time and one or more commands in a command stack that transformed the artifact draft's parent into the artifact draft. Multiple traceability links and traceability vertices represent connections between the artifact drafts of the artifacts. A traceability link includes an edge between an artifact draft of an artifact and an artifact draft of another artifact. A module is operable to navigate through said one or more artifacts of the plurality of artifacts from a reference temporal point via the plurality of traceability links.
    Type: Application
    Filed: February 9, 2012
    Publication date: August 15, 2013
    Applicant: International Business Machines Corporation
    Inventors: Judah M. Diament, Jacquelyn A. Martino, John C. Thomas, JR.
  • Publication number: 20130208674
    Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data.
    Type: Application
    Filed: March 8, 2013
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20130212582
    Abstract: Discovering work-item relations, in one aspect, may include identifying mappings of work-item elements to standardized specification elements, for instance, by analyzing a plurality of work-item elements and their relationships generated from a description of a collection of work-items, and a plurality of standardized specification elements and their relationships generated from a description of practice guidelines for completing the project. One or more missing relations may be discovered among the plurality of work-item elements based on the mappings.
    Type: Application
    Filed: February 10, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pietro Mazzoleni, Debdoot Mukherjee
  • Publication number: 20130206463
    Abstract: A non-halogenated flame retardant filler having phosphorous-modified inorganic particles imparts flame retardancy to manufactured articles such as printed circuit boards (PCBs), connectors, and other articles of manufacture that employ thermosetting plastics or thermoplastics. Phosphorous-modified silica particles, for example, may serve both as a filler for rheology control (viscosity, flow, etc.) and a flame retardant. In an exemplary application, a PCB laminate stack-up includes conductive planes separated from each other by a dielectric material that includes a non-halogenated flame retardant filler comprised of phosphorous-modified silica particles. In an exemplary method of synthesizing phosphorous-modified silica particles, a vinyl-terminated phosphorous-based monomer (e.g., a phosphorous based flame retardant functionalized to contain a vinyl functional group) is reacted with vinyl functionalized silica particles (i.e.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dylan J. Boday, Joseph Kuczynski, Robert E. Meyer, III
  • Publication number: 20130212668
    Abstract: A method for suspension of processes in an industrial control system includes detecting at least one anomaly in an industrial control system; notifying a controller of the at least one anomaly; accessing a database comprising emergency suspend procedures; sending a stream comprising at least one emergency suspend command through at least one firewall/gateway to at least one downstream zone; and terminating or suspending a process in the at least one zone.
    Type: Application
    Filed: February 13, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, John Wilson
  • Publication number: 20130212276
    Abstract: Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource.
    Type: Application
    Filed: February 13, 2012
    Publication date: August 15, 2013
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20130212651
    Abstract: A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.
    Type: Application
    Filed: March 15, 2013
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20130212554
    Abstract: A method, system, and article of manufacture for solving ordinary differential equations described in a graphical model with nodes as blocks and dependencies as links using the processing of a computer with a plurality of processors. The method includes: generating segments of block with or without duplication for each block with an internal state and for each block without any output by traversing the graphical model from each block with an internal state to each block without any output; merging the segment to reduce duplication; compiling and converting each segment from the merged results in an executable code; and individually allocating the executable code for each segment to a plurality of processors for parallel execution.
    Type: Application
    Filed: February 7, 2013
    Publication date: August 15, 2013
    Applicant: International Business Machines Corporation
    Inventor: International Business Machines Corporation
  • Publication number: 20130212669
    Abstract: A method for detecting and combating an attack in an industrial control system includes sending a command stream from a protection network of an industrial control system to at least one zone, the command stream comprising at least one command; concatenating the at least one command into at least one sequential command package comprising units or work; passing the at least one sequential command package to a crypto hash generator; generating at least one of unit of work hash codes or sequence hash codes; comparing the generated hash codes against a database of existing valid unit of work hash codes and sequence hash codes; and if a command stream fault is detected, generating an alert and accessing a database comprising emergency procedures.
    Type: Application
    Filed: September 10, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: JOHN WILSON
  • Publication number: 20130212376
    Abstract: Once or more embodiments manage access to data by accelerator systems in an out-of-core processing environment. In one embodiment, a request from an accelerator system is received for access to a given data set. An access context associated with the given data set is determined. The accelerator system is dynamically configured, based on the access context that has been determined, based on the access context that has been determined, to one of access the given data set directly from the server system; locally store a portion of the given data set in a memory; and locally store all of the given data set in the memory.
    Type: Application
    Filed: March 15, 2013
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20130208580
    Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data.
    Type: Application
    Filed: March 8, 2013
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20130212267
    Abstract: Dynamically balancing resources in a server farm, where the server farm includes servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, and the balancing of resources includes: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group.
    Type: Application
    Filed: March 27, 2013
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20130212542
    Abstract: A method for automatic detection of user preferences for alternate user interface model includes operating a digital device with an active user interface model and receiving one or more input signals from a user of the digital device. The method includes comparing the one or more input signals with one or more latent user interface models and determining if one of the latent user interface models has a higher likelihood given the one or more input signals than the active user interface models. The method also includes responsively substituting the latent user interface with the highest likelihood given the one or more input signals for the active user interface model.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Aaron K. Baughman, David W. Buchanan, Robert G. Farrell, Aditya A. Kalyanpur
  • Publication number: 20130212572
    Abstract: Methods, apparatuses, and computer program products for implementing updates to source code executing on a plurality of compute nodes are provided. Embodiments include receiving, by a compute node, a broadcast update-notification message indicating there is an update to the source code executing on the plurality of compute nodes; in response to receiving the update-notification message, implementing a distributed barrier; based on the distributed barrier, halting execution of the source code at a particular location within the source code; based on the distributed barrier, updating in-place the source code including retaining workpiece data in memory of the compute node, the workpiece data corresponding to the execution of the source code; and based on completion of the updating of the source code, resuming with the retained workpiece data execution of the source code at the particular location within the source code where execution was halted.
    Type: Application
    Filed: February 9, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHARLES J. ARCHER, JAMES E. CAREY, MATTHEW R. WEAVER
  • Publication number: 20130212145
    Abstract: Initiating a collective operation in a parallel computer that includes compute nodes coupled for data communications and organized in an operational group for collective operations with one compute node assigned as a root node, including: identifying, by a non-root compute node, a collective operation to execute in the operational group of compute nodes; initiating, by the non-root compute node, execution of the collective operation amongst the compute nodes of the operational group including: sending, by the non-root compute node to one or more of the other compute nodes in the operational group, an active message, the active message including information configured to initiate execution of the collective operation amongst the compute nodes of the operational group; and executing, by the compute nodes of the operational group, the collective operation.
    Type: Application
    Filed: February 9, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles J. Archer, James E. Carey, Philip J. Sanders, Brian E. Smith
  • Publication number: 20130212561
    Abstract: Developing collective operations for a parallel computer that includes compute nodes includes: presenting, by a collective development tool, a graphical user interface (‘GUI’) to a collective developer; receiving, by the collective development tool from the collective developer through the GUI, a selection of one or more collective primitives; receiving, by the collective development tool from the collective developer through the GUI, a specification of a serial order of the collective primitives and a specification of input and output buffers for each collective primitive; and generating, by the collective development tool in dependence upon the selection of collective primitives, the serial order of the collective primitives, and the input and output buffers for each collective primitive, executable code that carries out the collective operation specified by the collective primitives.
    Type: Application
    Filed: December 11, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20130207786
    Abstract: Biometric authorization is provided for a passive secure data card. An additional layer of security may be provided in the form of a biometric password. Session timing may be enforced to limit opportunities of third parties to snoop transmitted information while providing ample time to complete the card transaction. Biometric retries may be enforced to limit opportunities of third parties to hack the biometric security.
    Type: Application
    Filed: February 14, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Hutzler, Steve N. Nguyen, Nelson J. Smith, IV, Thomas G. Zimmerman
  • Publication number: 20130212573
    Abstract: Methods, apparatuses, and computer program products for implementing updates to source code executing on a plurality of compute nodes are provided. Embodiments include receiving, by a compute node, a broadcast update-notification message indicating there is an update to the source code executing on the plurality of compute nodes; in response to receiving the update-notification message, implementing a distributed barrier; based on the distributed barrier, halting execution of the source code at a particular location within the source code; based on the distributed barrier, updating in-place the source code including retaining workpiece data in memory of the compute node, the workpiece data corresponding to the execution of the source code; and based on completion of the updating of the source code, resuming with the retained workpiece data execution of the source code at the particular location within the source code where execution was halted.
    Type: Application
    Filed: January 14, 2013
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: International Business Machines Corporation