Patents Assigned to International Business Machines Corp.
  • Publication number: 20090271549
    Abstract: Disclosed are a method, information processing system, and computer readable medium for managing interrupts. The method includes placing at least one physical processor of an information processing system in a simultaneous multi-threading mode. At least a first logical processor and a second logical processor associated with the at least one physical processor are partitioned. The first logical processor is assigned to manage interrupts and the second logical processor is assigned to dispatch runnable user threads.
    Type: Application
    Filed: February 16, 2009
    Publication date: October 29, 2009
    Applicant: International Business Machines Corp.
    Inventors: ROBERT S. BLACKMORE, Rama K. Govindaraju, Peter H. Hochschild
  • Publication number: 20090217206
    Abstract: A user displayed interactive GUI widget (icon) provides two or more regions. A first region provides widget manipulation function for editing the widget, editing including moving or sizing functions. A second region provides widget interaction function for user interaction with the widget including interaction lists or interaction graphics. The regions may comprise one or more icon border regions and one or more icon internal regions.
    Type: Application
    Filed: April 20, 2009
    Publication date: August 27, 2009
    Applicant: International Business Machines Corp.
    Inventors: SIJIA LIU, Louis M. Weitzman
  • Publication number: 20090216789
    Abstract: A system, method, and computer readable medium for preserving information in time variant data schemas are disclosed. The method includes determining if at least one modification request associated with a database schema has been received. In response to the modification request being received, a metadata table associated with the database schema is updated to include at least one entry associated with the modification request. The entry identifies an instance in time when an action associated with the modification request was performed.
    Type: Application
    Filed: March 30, 2009
    Publication date: August 27, 2009
    Applicant: International Business Machines Corp.
    Inventors: PAWAN R. CHOWDHARY, Gaorge Andrei Mihaila
  • Publication number: 20090209228
    Abstract: A method and system for providing personal and emergency service hailing. A profile database stores profiles with individualized distance thresholds for each of a number of wireless devices. A wireless message proximity request is received from a requesting wireless device. Distances between a location of the requesting wireless device and locations of each of other wireless communications devices is computed and compared to individualized distance thresholds stored for the requesting wireless communications device. A set of wireless devices consisting of wireless devices that satisfy the individualized distance thresholds for the requesting wireless communications device is identified and a wireless message proximity response is sent to the requesting wireless communications device. The wireless message proximity response identifies the set of wireless communications devices that satisfy the at least one individualized distance threshold.
    Type: Application
    Filed: April 1, 2009
    Publication date: August 20, 2009
    Applicant: International Business Machines Corp.
    Inventors: Daniel A. Ford, Reiner Kraft, Jussi P. Myllymaki
  • Publication number: 20090184803
    Abstract: Data associated with supply chain events for a manufactured assembly is automatically stored. In preferred embodiments the supply chain events for the manufactured assembly are stored on an RFID tag attached to the assembly as it travels through the supply chain to insure the data concerning the assembly is readily available and not separated from the assembly. In other embodiments, the supply chain events or characteristic data is stored on the RFID tag in a hierarchical structure beginning with the original state of the assembly and with additional entries for each step in the assembly process. In other embodiments, as the product undergoes rework, conversion to a different assembly, or personalizations, the new state of the assembly is stored in the RFID tag. In other preferred embodiments, other information is also stored on the RFID tag such as country of origin, failure data, cycle times and a quality status indicator.
    Type: Application
    Filed: July 15, 2008
    Publication date: July 23, 2009
    Applicant: International Business Machines Corp.
    Inventors: Steven C. Erickson, Ivory Wellman Knipfer, Jeffrey George Komatsu, Fraser Allan Syme
  • Publication number: 20090182877
    Abstract: A computing system group member, signal bearing medium, and method. A configuration of a computing system group member is determined to be able to assume a role of a primary member of the computing system group and, in response thereto, a first status is assigned in the member. All members of the computing system group receive, in order, all messages directed to group members. A second status is assigned in response to determining that the configuration of the member is not able to support performance as a primary member. The member then processes, within the member, all messages that are transmitted to all members of the group when the member is assigned the first status and when the member is assigned the second status. The configuration of the member, while assigned either the first status or the second status, is adjusted based upon contents of the messages.
    Type: Application
    Filed: March 17, 2009
    Publication date: July 16, 2009
    Applicant: International Business Machines Corp.
    Inventors: Michael James McDermott, Robert Miller, Michael John Snyder, Kiswanto Thayib
  • Publication number: 20090182968
    Abstract: A system, method, and a computer readable for protecting content of a memory page are disclosed. The method includes determining a start of a semi-synchronous memory copy operation. A range of addresses is determined where the semi-synchronous memory copy operation is being performed. An issued instruction that removes a page table entry is detected. The method further includes determining whether the issued instruction is destined to remove a page table entry associated with at least one address in the range of addresses. In response to the issued instruction being destined to remove the page table entry, the execution of the issued instruction is stalled until the semi-synchronous memory copy operation is completed.
    Type: Application
    Filed: March 12, 2009
    Publication date: July 16, 2009
    Applicant: International Business Machines Corp.
    Inventors: RAVI K. ARIMILLI, Rama K. Govindaraju, Peter H. Hochschild, Bruce G. Mealey, Satya P. Sharma, Balaram Sinharoy
  • Publication number: 20090138664
    Abstract: A system, method, and a computer readable for inserting data into a cache memory based on information in a semi-synchronous memory copy instruction are disclosed. The method comprises determining a start of a semi-synchronous memory copy operation. The semi-synchronous memory copy operation is checked for a given value in at least one cache injection bit. In response to the given value in the cache injection bit, a predefined number of lines of destination data is copied into at least one level of cache memory.
    Type: Application
    Filed: January 26, 2009
    Publication date: May 28, 2009
    Applicant: International Business Machines Corp.
    Inventors: Ravi K. Arimilli, Rama K. Govindaraju, Peter H. Hochschild, Bruce G. Mealey, Satya P. Sharma, Balaram Sinharoy
  • Publication number: 20090126021
    Abstract: Secure initialization for detecting intrusions is disclosed. The secure initialization includes storing a behavior profile associated with an application, and reading the stored behavior profile that is cryptographically protected. The method further includes monitoring execution of the application during a bootstrapping phase of an intrusion detection system, according to the stored behavior profile. If the behavior of the application does not conform to the behavior profile, a message is issued indicating that the application is not conforming to the behavior profile. The behavior profile can be generated by a developer of the intrusion detection system, a developer of the application, and/or a third party developer. Additionally, the behavior profile is generated by executing the system on a reference computer system or by heuristic determination.
    Type: Application
    Filed: December 8, 2008
    Publication date: May 14, 2009
    Applicant: International Business Machines Corp.
    Inventor: Jordi A. Albornoz
  • Publication number: 20090125991
    Abstract: A system, method and computer program product are provided for managing authentication information for a user. According to the method, a master digital key is received from the user, and authentication of the user is obtained based on the master digital key. There is received from the user a selection of one identity from among a plurality of identities that are stored for the user. Authentication information for the user is provided into an application or web page based on the one identity selected by the user. In one embodiment, the authentication information is provided by recognizing a web page for which authentication information is stored, and automatically filling the authentication information for the user into appropriate elements of the web page.
    Type: Application
    Filed: January 7, 2009
    Publication date: May 14, 2009
    Applicant: International Business Machines Corp.
    Inventors: ELIAS D. TORRES, Christopher R. Vincent
  • Publication number: 20090113012
    Abstract: A system, method and computer program product are provided for identifying spoofed emails. According to the method, an email addressed to a recipient in a first network is received, with the email including a plurality of headers, and at least one of the plurality of headers including a sender address. It is determined whether the sender address indicates a mailbox from within the first network, and the sender address is modified if it indicates a mailbox within the first network. The email with the modified sender address is sent to the recipient. In one embodiment, a second email is received that is from the recipient and that is addressed to the modified sender address, the modified sender address is modified so as to return it to its original form, and the second email is sent.
    Type: Application
    Filed: December 19, 2008
    Publication date: April 30, 2009
    Applicant: International Business Machines Corp.
    Inventor: DAVID S. SINGER
  • Publication number: 20090102538
    Abstract: An electronically scannable multiplexing device is capable of addressing multiple bits within a volatile or non-volatile memory cell. The multiplexing device generates an electronically scannable conducting channel with two oppositely formed depletion regions. The depletion width of each depletion region is controlled by a voltage applied to a respective control gate at each end of the multiplexing device. The present multi-bit addressing technique allows, for example, 10 to 100 bits of data to be accessed or addressed at a single node. The present invention can also be used to build a programmable nanoscale logic array or for randomly accessing a nanoscale sensor array.
    Type: Application
    Filed: December 18, 2008
    Publication date: April 23, 2009
    Applicant: International Business Machines Corp.
    Inventors: Hemantha Kumar Wickramasinghe, Kailash Gopalakrishnan
  • Publication number: 20090037450
    Abstract: A method, system, and computer program product to transfer data between two application data structures by copying a data gather scatter program (DGSP) from an exporting process address space where a first data structure is located, to a location in shared memory visible to an importing process address space; assembling a parameter set identifying the data structure; starting a data gather scatter-redistribution machine (DGS-RM) in an importing process space where a second application data structure is located; passing the first parameter set, the DGSP copy, and a second parameter set identifying a second application data structure and a second DGSP to the DGS-RM; and creating master and worker stack machines. The master stack machine identifies a contiguous chunk of the first data structure.
    Type: Application
    Filed: May 28, 2008
    Publication date: February 5, 2009
    Applicant: International Business Machines Corp.
    Inventors: BIN JIA, RICHARD R. TREUMANN
  • Publication number: 20090024358
    Abstract: A system, method, and computer program product for benchmarking a stream processing system are disclosed. The method comprises generating a plurality of correlated test streams. A semantically related data set is embedded within each of the test streams in the plurality of correlated test streams. The plurality of correlated test streams is provided to at least one stream processing system. A summary is generated for each of the semantically related embedded data sets. A common identifier, which is transparent to the system being tested, is embedded within each stream in the plurality of correlated test streams. The common identifier is extracted from the output data set generated by the stream processing system. At least one of the stored copies of the summaries and the common identifier are compared to an output data set including a set of zero or more correlation results generated by the stream processing system.
    Type: Application
    Filed: June 17, 2008
    Publication date: January 22, 2009
    Applicant: International Business Machines Corp.
    Inventors: KAY S. ANDERSON, Joseph P. Bigus, Eric Bouillet, Parijat Dube, Zhen Liu, Dimitrios Pendarakis
  • Publication number: 20090008057
    Abstract: A system and method for injection molding conductive bonding material into a plurality of cavities in a non-rectangular mold is disclosed. The method comprises aligning a fill head with a non-rectangular mold. The non-rectangular mold includes a plurality of cavities. The fill head is placed in substantial contact with the non-rectangular mold. Rotational motion is provided to at least one of the non-rectangular mold and the fill head while the fill head is in substantial contact with the non-rectangular mold. Conductive bonding material is forced out of the fill head toward the non-rectangular mold. The conductive bonding material is provided into at least one cavity of the plurality of cavities contemporaneous with the at least one cavity being in proximity to the fill head.
    Type: Application
    Filed: August 11, 2008
    Publication date: January 8, 2009
    Applicant: International Business Machines Corp.
    Inventors: Steven A. CORDES, Peter A. GRUBER, John U. Knickerbocker, James L. SPEIDELL
  • Publication number: 20090006576
    Abstract: A method for providing location dependent information to a user for selective colleague assistance. The method on a Client Wireless Component includes the steps of receiving location data from a plurality of Global Positioning System GPS satellites and transmitting the location data to an Active Calendar Component. The method further includes on an Active Calendar Component the steps of receiving Client Wireless Component location data and determining if within a threshold distance a Colleague item list exists for user completion.
    Type: Application
    Filed: June 13, 2008
    Publication date: January 1, 2009
    Applicant: International Business Machines Corp.
    Inventors: JAMES H. KAUFMAN, Reiner Kraft, Joann Ruvolo
  • Publication number: 20080307095
    Abstract: A distributed system has a multiplicity of nodes. A group of the nodes subscribe to a group services process. The group is subject to dissolving. A list of persistent subscribers to the group is maintained. Subscriptions to members and states of the group that are persistent subscribers do not terminate in response to the group being dissolved. The persistent subscribers automatically receive a notice in response to the group being reestablished and do not need to re-subscribe to the group.
    Type: Application
    Filed: June 13, 2008
    Publication date: December 11, 2008
    Applicant: International Business Machines Corp.
    Inventors: MYUNG M. BAE, Jifang Zhang
  • Publication number: 20080302502
    Abstract: A system, method, and apparatus for injection molding conductive bonding material into a plurality of cavities in a surface are disclosed. The method comprises aligning a fill head with a surface. The mold includes a plurality of cavities. The method further includes placing the fill head in substantial contact with the surface. At least a first gas is channeled about a first region of the fill head. The at least first gas has a temperature above a melting point of conductive bonding material residing in a reservoir thereby maintaining the conductive bonding material in a molten state. The conductive bonding material is forced out of the fill head toward the surface. The conductive bonding material is provided into at least one cavity of the plurality of cavities contemporaneous with the at least one cavity being in proximity to the fill head.
    Type: Application
    Filed: August 12, 2008
    Publication date: December 11, 2008
    Applicant: International Business Machines Corp.
    Inventors: STEVEN A. CORDES, Peter A. Gruber, John U. Knickerbrocker, James L. Speidell
  • Publication number: 20080294413
    Abstract: According to a method of simulation processing, an instrumented simulation executable model of a design is built by compiling one or more hardware description language (HDL) files specifying one or more design entities within the design and one or more instrumentation entities and instantiating instances of the one or more instrumentation entities within instances of the one or more design entities. Operation of the design is then simulated utilizing the instrumented simulation executable model. Simulating operation includes each of multiple instantiations of the one or more instrumentation entities generating a respective external phase signal representing an occurrence of a particular phase of operation and instrumentation combining logic generating from external phase signals of the multiple instantiations of the one or more instrumentation entities an aggregate phase signal representing an occurrence of the particular phase.
    Type: Application
    Filed: May 30, 2008
    Publication date: November 27, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORP.
    Inventors: GABOR BOBOK, Wolfgang Roesner, Derek E. Williams
  • Publication number: 20080281551
    Abstract: An apparatus and method for measuring the physical quantities of a data center during operation and method for servicing large-scale computing systems is disclosed. The apparatus includes a cart that supports a plurality of sensors. The cart is moveable within the data center. The sensors capture temperature or other physical parameters within the room. The sensor readings, along with position and orientation information pertaining to the cart are transmitted to a computer system where the data is analyzed to select the optimum temperature or other system environmental parameters for the data center.
    Type: Application
    Filed: April 28, 2008
    Publication date: November 13, 2008
    Applicant: International Business Machines Corp.
    Inventors: Hendrik F. Hamann, Madhusudan K. Iyengar, James A. Lacey, Martin P. O'Boyle, Roger R. Schmidt