Patents Assigned to International Business Machines Corp.
-
Publication number: 20090271549Abstract: Disclosed are a method, information processing system, and computer readable medium for managing interrupts. The method includes placing at least one physical processor of an information processing system in a simultaneous multi-threading mode. At least a first logical processor and a second logical processor associated with the at least one physical processor are partitioned. The first logical processor is assigned to manage interrupts and the second logical processor is assigned to dispatch runnable user threads.Type: ApplicationFiled: February 16, 2009Publication date: October 29, 2009Applicant: International Business Machines Corp.Inventors: ROBERT S. BLACKMORE, Rama K. Govindaraju, Peter H. Hochschild
-
Publication number: 20090217206Abstract: A user displayed interactive GUI widget (icon) provides two or more regions. A first region provides widget manipulation function for editing the widget, editing including moving or sizing functions. A second region provides widget interaction function for user interaction with the widget including interaction lists or interaction graphics. The regions may comprise one or more icon border regions and one or more icon internal regions.Type: ApplicationFiled: April 20, 2009Publication date: August 27, 2009Applicant: International Business Machines Corp.Inventors: SIJIA LIU, Louis M. Weitzman
-
Publication number: 20090216789Abstract: A system, method, and computer readable medium for preserving information in time variant data schemas are disclosed. The method includes determining if at least one modification request associated with a database schema has been received. In response to the modification request being received, a metadata table associated with the database schema is updated to include at least one entry associated with the modification request. The entry identifies an instance in time when an action associated with the modification request was performed.Type: ApplicationFiled: March 30, 2009Publication date: August 27, 2009Applicant: International Business Machines Corp.Inventors: PAWAN R. CHOWDHARY, Gaorge Andrei Mihaila
-
Publication number: 20090209228Abstract: A method and system for providing personal and emergency service hailing. A profile database stores profiles with individualized distance thresholds for each of a number of wireless devices. A wireless message proximity request is received from a requesting wireless device. Distances between a location of the requesting wireless device and locations of each of other wireless communications devices is computed and compared to individualized distance thresholds stored for the requesting wireless communications device. A set of wireless devices consisting of wireless devices that satisfy the individualized distance thresholds for the requesting wireless communications device is identified and a wireless message proximity response is sent to the requesting wireless communications device. The wireless message proximity response identifies the set of wireless communications devices that satisfy the at least one individualized distance threshold.Type: ApplicationFiled: April 1, 2009Publication date: August 20, 2009Applicant: International Business Machines Corp.Inventors: Daniel A. Ford, Reiner Kraft, Jussi P. Myllymaki
-
Publication number: 20090184803Abstract: Data associated with supply chain events for a manufactured assembly is automatically stored. In preferred embodiments the supply chain events for the manufactured assembly are stored on an RFID tag attached to the assembly as it travels through the supply chain to insure the data concerning the assembly is readily available and not separated from the assembly. In other embodiments, the supply chain events or characteristic data is stored on the RFID tag in a hierarchical structure beginning with the original state of the assembly and with additional entries for each step in the assembly process. In other embodiments, as the product undergoes rework, conversion to a different assembly, or personalizations, the new state of the assembly is stored in the RFID tag. In other preferred embodiments, other information is also stored on the RFID tag such as country of origin, failure data, cycle times and a quality status indicator.Type: ApplicationFiled: July 15, 2008Publication date: July 23, 2009Applicant: International Business Machines Corp.Inventors: Steven C. Erickson, Ivory Wellman Knipfer, Jeffrey George Komatsu, Fraser Allan Syme
-
Publication number: 20090182968Abstract: A system, method, and a computer readable for protecting content of a memory page are disclosed. The method includes determining a start of a semi-synchronous memory copy operation. A range of addresses is determined where the semi-synchronous memory copy operation is being performed. An issued instruction that removes a page table entry is detected. The method further includes determining whether the issued instruction is destined to remove a page table entry associated with at least one address in the range of addresses. In response to the issued instruction being destined to remove the page table entry, the execution of the issued instruction is stalled until the semi-synchronous memory copy operation is completed.Type: ApplicationFiled: March 12, 2009Publication date: July 16, 2009Applicant: International Business Machines Corp.Inventors: RAVI K. ARIMILLI, Rama K. Govindaraju, Peter H. Hochschild, Bruce G. Mealey, Satya P. Sharma, Balaram Sinharoy
-
Publication number: 20090182877Abstract: A computing system group member, signal bearing medium, and method. A configuration of a computing system group member is determined to be able to assume a role of a primary member of the computing system group and, in response thereto, a first status is assigned in the member. All members of the computing system group receive, in order, all messages directed to group members. A second status is assigned in response to determining that the configuration of the member is not able to support performance as a primary member. The member then processes, within the member, all messages that are transmitted to all members of the group when the member is assigned the first status and when the member is assigned the second status. The configuration of the member, while assigned either the first status or the second status, is adjusted based upon contents of the messages.Type: ApplicationFiled: March 17, 2009Publication date: July 16, 2009Applicant: International Business Machines Corp.Inventors: Michael James McDermott, Robert Miller, Michael John Snyder, Kiswanto Thayib
-
Publication number: 20090138664Abstract: A system, method, and a computer readable for inserting data into a cache memory based on information in a semi-synchronous memory copy instruction are disclosed. The method comprises determining a start of a semi-synchronous memory copy operation. The semi-synchronous memory copy operation is checked for a given value in at least one cache injection bit. In response to the given value in the cache injection bit, a predefined number of lines of destination data is copied into at least one level of cache memory.Type: ApplicationFiled: January 26, 2009Publication date: May 28, 2009Applicant: International Business Machines Corp.Inventors: Ravi K. Arimilli, Rama K. Govindaraju, Peter H. Hochschild, Bruce G. Mealey, Satya P. Sharma, Balaram Sinharoy
-
Publication number: 20090126021Abstract: Secure initialization for detecting intrusions is disclosed. The secure initialization includes storing a behavior profile associated with an application, and reading the stored behavior profile that is cryptographically protected. The method further includes monitoring execution of the application during a bootstrapping phase of an intrusion detection system, according to the stored behavior profile. If the behavior of the application does not conform to the behavior profile, a message is issued indicating that the application is not conforming to the behavior profile. The behavior profile can be generated by a developer of the intrusion detection system, a developer of the application, and/or a third party developer. Additionally, the behavior profile is generated by executing the system on a reference computer system or by heuristic determination.Type: ApplicationFiled: December 8, 2008Publication date: May 14, 2009Applicant: International Business Machines Corp.Inventor: Jordi A. Albornoz
-
Publication number: 20090125991Abstract: A system, method and computer program product are provided for managing authentication information for a user. According to the method, a master digital key is received from the user, and authentication of the user is obtained based on the master digital key. There is received from the user a selection of one identity from among a plurality of identities that are stored for the user. Authentication information for the user is provided into an application or web page based on the one identity selected by the user. In one embodiment, the authentication information is provided by recognizing a web page for which authentication information is stored, and automatically filling the authentication information for the user into appropriate elements of the web page.Type: ApplicationFiled: January 7, 2009Publication date: May 14, 2009Applicant: International Business Machines Corp.Inventors: ELIAS D. TORRES, Christopher R. Vincent
-
Publication number: 20090113012Abstract: A system, method and computer program product are provided for identifying spoofed emails. According to the method, an email addressed to a recipient in a first network is received, with the email including a plurality of headers, and at least one of the plurality of headers including a sender address. It is determined whether the sender address indicates a mailbox from within the first network, and the sender address is modified if it indicates a mailbox within the first network. The email with the modified sender address is sent to the recipient. In one embodiment, a second email is received that is from the recipient and that is addressed to the modified sender address, the modified sender address is modified so as to return it to its original form, and the second email is sent.Type: ApplicationFiled: December 19, 2008Publication date: April 30, 2009Applicant: International Business Machines Corp.Inventor: DAVID S. SINGER
-
Publication number: 20090102538Abstract: An electronically scannable multiplexing device is capable of addressing multiple bits within a volatile or non-volatile memory cell. The multiplexing device generates an electronically scannable conducting channel with two oppositely formed depletion regions. The depletion width of each depletion region is controlled by a voltage applied to a respective control gate at each end of the multiplexing device. The present multi-bit addressing technique allows, for example, 10 to 100 bits of data to be accessed or addressed at a single node. The present invention can also be used to build a programmable nanoscale logic array or for randomly accessing a nanoscale sensor array.Type: ApplicationFiled: December 18, 2008Publication date: April 23, 2009Applicant: International Business Machines Corp.Inventors: Hemantha Kumar Wickramasinghe, Kailash Gopalakrishnan
-
Publication number: 20090037450Abstract: A method, system, and computer program product to transfer data between two application data structures by copying a data gather scatter program (DGSP) from an exporting process address space where a first data structure is located, to a location in shared memory visible to an importing process address space; assembling a parameter set identifying the data structure; starting a data gather scatter-redistribution machine (DGS-RM) in an importing process space where a second application data structure is located; passing the first parameter set, the DGSP copy, and a second parameter set identifying a second application data structure and a second DGSP to the DGS-RM; and creating master and worker stack machines. The master stack machine identifies a contiguous chunk of the first data structure.Type: ApplicationFiled: May 28, 2008Publication date: February 5, 2009Applicant: International Business Machines Corp.Inventors: BIN JIA, RICHARD R. TREUMANN
-
Publication number: 20090024358Abstract: A system, method, and computer program product for benchmarking a stream processing system are disclosed. The method comprises generating a plurality of correlated test streams. A semantically related data set is embedded within each of the test streams in the plurality of correlated test streams. The plurality of correlated test streams is provided to at least one stream processing system. A summary is generated for each of the semantically related embedded data sets. A common identifier, which is transparent to the system being tested, is embedded within each stream in the plurality of correlated test streams. The common identifier is extracted from the output data set generated by the stream processing system. At least one of the stored copies of the summaries and the common identifier are compared to an output data set including a set of zero or more correlation results generated by the stream processing system.Type: ApplicationFiled: June 17, 2008Publication date: January 22, 2009Applicant: International Business Machines Corp.Inventors: KAY S. ANDERSON, Joseph P. Bigus, Eric Bouillet, Parijat Dube, Zhen Liu, Dimitrios Pendarakis
-
Publication number: 20090008057Abstract: A system and method for injection molding conductive bonding material into a plurality of cavities in a non-rectangular mold is disclosed. The method comprises aligning a fill head with a non-rectangular mold. The non-rectangular mold includes a plurality of cavities. The fill head is placed in substantial contact with the non-rectangular mold. Rotational motion is provided to at least one of the non-rectangular mold and the fill head while the fill head is in substantial contact with the non-rectangular mold. Conductive bonding material is forced out of the fill head toward the non-rectangular mold. The conductive bonding material is provided into at least one cavity of the plurality of cavities contemporaneous with the at least one cavity being in proximity to the fill head.Type: ApplicationFiled: August 11, 2008Publication date: January 8, 2009Applicant: International Business Machines Corp.Inventors: Steven A. CORDES, Peter A. GRUBER, John U. Knickerbocker, James L. SPEIDELL
-
Publication number: 20090006576Abstract: A method for providing location dependent information to a user for selective colleague assistance. The method on a Client Wireless Component includes the steps of receiving location data from a plurality of Global Positioning System GPS satellites and transmitting the location data to an Active Calendar Component. The method further includes on an Active Calendar Component the steps of receiving Client Wireless Component location data and determining if within a threshold distance a Colleague item list exists for user completion.Type: ApplicationFiled: June 13, 2008Publication date: January 1, 2009Applicant: International Business Machines Corp.Inventors: JAMES H. KAUFMAN, Reiner Kraft, Joann Ruvolo
-
Publication number: 20080302502Abstract: A system, method, and apparatus for injection molding conductive bonding material into a plurality of cavities in a surface are disclosed. The method comprises aligning a fill head with a surface. The mold includes a plurality of cavities. The method further includes placing the fill head in substantial contact with the surface. At least a first gas is channeled about a first region of the fill head. The at least first gas has a temperature above a melting point of conductive bonding material residing in a reservoir thereby maintaining the conductive bonding material in a molten state. The conductive bonding material is forced out of the fill head toward the surface. The conductive bonding material is provided into at least one cavity of the plurality of cavities contemporaneous with the at least one cavity being in proximity to the fill head.Type: ApplicationFiled: August 12, 2008Publication date: December 11, 2008Applicant: International Business Machines Corp.Inventors: STEVEN A. CORDES, Peter A. Gruber, John U. Knickerbrocker, James L. Speidell
-
Publication number: 20080307095Abstract: A distributed system has a multiplicity of nodes. A group of the nodes subscribe to a group services process. The group is subject to dissolving. A list of persistent subscribers to the group is maintained. Subscriptions to members and states of the group that are persistent subscribers do not terminate in response to the group being dissolved. The persistent subscribers automatically receive a notice in response to the group being reestablished and do not need to re-subscribe to the group.Type: ApplicationFiled: June 13, 2008Publication date: December 11, 2008Applicant: International Business Machines Corp.Inventors: MYUNG M. BAE, Jifang Zhang
-
Publication number: 20080294413Abstract: According to a method of simulation processing, an instrumented simulation executable model of a design is built by compiling one or more hardware description language (HDL) files specifying one or more design entities within the design and one or more instrumentation entities and instantiating instances of the one or more instrumentation entities within instances of the one or more design entities. Operation of the design is then simulated utilizing the instrumented simulation executable model. Simulating operation includes each of multiple instantiations of the one or more instrumentation entities generating a respective external phase signal representing an occurrence of a particular phase of operation and instrumentation combining logic generating from external phase signals of the multiple instantiations of the one or more instrumentation entities an aggregate phase signal representing an occurrence of the particular phase.Type: ApplicationFiled: May 30, 2008Publication date: November 27, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORP.Inventors: GABOR BOBOK, Wolfgang Roesner, Derek E. Williams
-
Publication number: 20080281551Abstract: An apparatus and method for measuring the physical quantities of a data center during operation and method for servicing large-scale computing systems is disclosed. The apparatus includes a cart that supports a plurality of sensors. The cart is moveable within the data center. The sensors capture temperature or other physical parameters within the room. The sensor readings, along with position and orientation information pertaining to the cart are transmitted to a computer system where the data is analyzed to select the optimum temperature or other system environmental parameters for the data center.Type: ApplicationFiled: April 28, 2008Publication date: November 13, 2008Applicant: International Business Machines Corp.Inventors: Hendrik F. Hamann, Madhusudan K. Iyengar, James A. Lacey, Martin P. O'Boyle, Roger R. Schmidt