Abstract: Methods, apparatus, and computer program products are disclosed for debugging a computer program by operating a debugger step function, detecting a governor point by the debugger step function, and, responsive to detecting a governor point, disabling the debugger step function. Debugging a computer program also includes clearing a debugger input buffer of any pending step commands. Debugging a computer program also includes detecting control flow entry into a program control flow structure, recording a return point for each control flow entry into a program control flow structure, and, responsive to a user instruction to do so, continuing program execution to a recorded return point.
Type:
Application
Filed:
November 30, 2005
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: Decompressing a matrix having a plurality of redundant matrix rows by reading selected matrix rows including at least all non-redundant matrix rows of the matrix from a memory and computing remaining matrix rows of the matrix from the read matrix rows, wherein several matrix rows are computed simultaneously. The read and the computed remaining matrix rows are provided as the decompressed matrix to an output matrix register.
Type:
Application
Filed:
December 19, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: A method to reduce leakage within a sequential network comprising at least one latch and a combinatorial logic proximate to said latch, by applying an input vector on said sequential network during idle mode is described, the method comprising the steps of: overriding a static feedback of a latch comprising a static feedback loop with an input vector, and setting said sequential network into idle mode. Furthermore a latch circuit comprising a static feedback loop, to be used to perform said method is described, wherein said latch circuit comprises means to override a static feedback within said static feedback loop with an input vector before falling in idle mode.
Type:
Application
Filed:
December 4, 2006
Publication date:
July 19, 2007
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Harry Barowski, Tobias Gemmeke, Christian Jacobi, Matthias Pflanz
Abstract: Disclosed are embodiments of a method and an associated first system for extending product life of a second system in the presence of phenomena that cause the exhibition of both performance degradation and recovery properties within system devices. The first system includes duplicate devices incorporated into the second system (e.g., on a shared bus). These duplicate devices are adapted to independently perform the same function within that second system. Reference signal generators, a reference signal comparator, a power controller and a state machine, working in combination, can be adapted to seamlessly switch performance of that same function within the second system between the duplicate devices based on a measurement of performance degradation to allow for device recovery. A predetermined policy accessible by the state machine dictates when and whether or not to initiate a switch.
Type:
Application
Filed:
November 30, 2005
Publication date:
July 19, 2007
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Kenneth Goodnow, Oscar Strohacker, Mark Styduhar, Peter Twombly, Andrew Wienick, Paul Zuchowski, Stephen Shuma
Abstract: The present invention is directed to the quantitative measurement of the autonomic capabilities of computing systems. A method in accordance with an embodiment of the present invention includes: subjecting the computing system to a workload; injecting a disturbance into the computing system; providing a notification that the computing system has detected a problem in response to the injected disturbance; determining an amount of time required to initiate a recovery procedure to address the detected problem; and determining an amount of time required to execute the recovery procedure.
Type:
Application
Filed:
November 7, 2005
Publication date:
July 19, 2007
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: A computer implemented method, apparatus, and computer usable program code for updating multiple concurrent versions of shared artifact libraries. Shared artifact libraries are associated with a consuming application for establishing shared artifact libraries upon which the consuming application has a dependency for artifacts. A snapshot of the shared artifact libraries associated with the consuming application in an active session is created in response to starting a session. The shared artifact libraries are updated in response to new versions and updates of the shared artifact libraries becoming available. Artifacts are dispensed from the shared artifact libraries to the consuming application based on the snapshot of the session.
Type:
Application
Filed:
December 1, 2005
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Inventors:
Mandar Bhatkhande, Christopher Claussen, Pranta Das, Stefan Derdak, Paul Griepentrog, Edwin Sapugay, Chendong Zou
Abstract: A method (and structure) of data processing in which data is represented in a lossy data format as a plurality of extensible motifs. Each extensible motif has at least one don't-care character enclosed by at least one non-don't-care character on a left side and at least one non-don't-care character on a right side.
Type:
Application
Filed:
January 18, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Inventors:
Laxmi Parida, Alberto Apostolico, Matteo Comin
Abstract: A method and system for testing a software application. A description of a test suite for testing the software application being tested (ABT) is inserted into a test database. The ABT is invokes multiple external software applications during execution of a test script of the test suite. Each external application invoked by the ABT is replaced by a corresponding simulator during execution of the test script. Output data to be returned to the ABT by each invoked simulator is inserted into the test database, after which each test script of the test suite is executed. The executing includes: sending a request, by the ABT to each simulator invoked in each test script, for requested data; and receiving, by the ABT, the requested data from each simulator invoked in each test script. The received requested data includes the output data that had been inserted into the test database.
Type:
Application
Filed:
November 22, 2005
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: An apparatus, program product and/or method identify relevant shared entities and/or display shared entities in an instant messaging system. In particular, entities such as files, images, videos, e-mails, links, bookmarks, databases, transcripts of other instant messages, etc. that are shared between users participating in an instant message session may be identified and highlighted to indicate that the shared entities are related to the instant message session. Furthermore, a link to an entity may be sent to a user when the entity is referenced in an instant message of the instant message session. Additionally, a display representation of entities that are shared with a user may be displayed in the user's buddy list to indicate that the shared entity is accessible to the user and whom shared the entity with the user. Furthermore, a transcript may be associated with an entity.
Type:
Application
Filed:
January 19, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: A method for use of a physical data storage medium, the method including receiving a first read request for data stored in any of a plurality of storage sub-units on a physical data storage medium, and decrypting the requested data if an indicator associated with the requested data storage sub-unit indicates that data in the requested storage sub-unit is encrypted.
Type:
Application
Filed:
January 10, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Inventors:
Michael Factor, Dalit Naor, Adam Wolman, Aviad Zlotnick
Abstract: A method and apparatus are provided for detection and prevention of bulk complementary metal oxide semiconductor (CMOS) latchup. A separate power distribution is provided for coupling a positive voltage supply rail to the N well and a ground voltage supply rail to the P well of the CMOS circuit. At least one sensor monitors current flow in a bias voltage applied to at least one of an N well and a P well of the CMOS circuitry. A latchup event is detected responsive to a predefined increase in the monitored current flow. A switch temporarily interrupts the connection of at least one of the N well and the P well to the respective voltage supply rail when the latchup event is detected.
Type:
Application
Filed:
January 19, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: A power supply history monitor. The monitor receives a short duration anomalous signal, e.g., from a power supply, and produces a digitized signal representing the anomalous signal as an output. The monitor receives a signal from a signal input, and includes an analog delay element in series with the signal input, a sample and hold element receiving a signal from the analog delay element, an analog signal processor receiving an output of the sample and hold element, and an analog to digital converter receiving an analog output of the analog signal processor. The output of the power supply history monitor is a digital output.
Type:
Application
Filed:
January 18, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: A method, system and program product save state data in a multi-processor system. A problem in the multi-processor system is detected and a statesave thread is spawned for each processor in the system. Each statesave thread directs a processor, in parallel with the other processors to attempt to identify a component in the system having a status of “incomplete”, indicating that state data of the component remains to be offloaded. When a component having a status of “incomplete” is identified, the processor executes statesave code to offload state data from the identified component. Upon completion of the state data offload from the identified component, the processor changes the status of the component to “complete”. The foregoing processes are repeated until no components are identified in the system having a status of “incomplete”.
Type:
Application
Filed:
November 29, 2005
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: A method, system and computer program product for maintaining object referential integrity for abstract objects. In a method of the invention, the method can include extracting a reference to an abstract object hierarchy from an address disposed in markup, locating branches of nodes in the abstract object hierarchy which define a concrete object, and translating each located branch of nodes to an address for the concrete object. Notably, extracting a reference to an abstract object hierarchy from an address disposed in markup, can include extracting a reference to an abstract object hierarchy from a URL disposed in a Web page. Finally, the method can include changing a property of each node in the abstract object hierarchy that matches a specified class identifier.
Type:
Application
Filed:
November 4, 2005
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: The system and method described herein is a dual system directory structure that performs the role of system cache, i.e., data, and system control, i.e., coherency. The system includes two system cache directories. These two cache directories are equal in size and collectively large enough to contain all of the processor cache directory entries, but with only one of these cache directories hosting system-cache data to back the most recent fraction of data accessed by the processors, and the other cache directory retains only addreses, including addresses of lines LRUed out and the processor using the data. By this expedient, only the directory known to be backed by system cached data will be evaluated for system cache data hits.
Type:
Application
Filed:
January 18, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Inventors:
David Hutton, Kathryn Jackson, Keith Langston, Pak-kin Mak, Bruce Wagar
Abstract: A method and system for protection and security of IO devices using credential are provided. The system may include at least one consumer arranged to initiate IO requests from the IO device, and the IO requests may include IO capability allocation and additional parameters. The system may also include an IO resource manager (IORM) arranged to translate the IO capability allocation and additional parameters included in said IO request to a set of capability tokens for the consumer or for a group of consumers, to generate a global key to protect the capability tokens, and further arranged to manage the IO device. The system may further include a channel component arranged to transfer and receive the IO request to and from the IO device.
Type:
Application
Filed:
January 17, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Inventors:
Ton Engbersen, Zorik Machulsky, Julian Satran, Leah Shalev, Ilan Shimony, Thomas Smith
Abstract: A method is presented for fabricating a non-planar field effect device. The method includes the production of a Si based material Fin structure that has a top surface substantially in parallel with a {111} crystallographic plane of the Si Fin structure, and the etching of the Si Fin structure with a solution which contains ammonium hydroxide (NH4OH). In this manner, due to differing etch rates in ammonium hydroxide of various Si based material crystallographic planes, the corners on the Fin structure become clipped, and angles between the horizontal and vertical planes of the Fin structure increase. A FinFET device with clipped, or rounded, corners is then fabricated to completion. In a typical embodiment the FinFET device is selected to be a silicon-on-insulator (SOI) device.
Type:
Application
Filed:
January 17, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: Development of computer programs is facilitated. An interface of a program is created and that program interface encapsulates an existing spreadsheet, such that the spreadsheet itself is the calculation engine of the program. The logic of the spreadsheet is not re-coded, and the spreadsheet is hidden from and unchangeable by the user. The interface provides exclusive input and output access to the spreadsheet.
Type:
Application
Filed:
March 29, 2007
Publication date:
July 19, 2007
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: A code optimizer is used to optimize a computer program that references a database by reading database metadata and making suitable optimizations based on the metadata. By taking into account the metadata of a database referenced in the computer program, the optimizer may make suitable optimizations to the computer program. Such optimizations include, without limitation, removing unnecessary calls to the database, removing unnecessary loops, removing unnecessary database operations, providing compile-time errors, and replacing dynamic calls with static data.
Type:
Application
Filed:
February 15, 2007
Publication date:
July 19, 2007
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Eric Barsness, Richard Dettinger, John Santosuosso
Abstract: A computer-implemented processing tool is provided for facilitating debugging of simulation results obtained for an optimized simulation model of a device having hierarchically-connected components. The tool includes: receiving a component port name of the device to be searched; automatically checking a hardware descriptive language description of the device for a next higher level component of the device that instantiates the component having the component port name to be searched; locating a signal name in the next higher level component that is connected to the port identified by the component port name; and outputting the signal name as a signal that drives the named component port when the signal is other than a port signal of the next higher level component. Otherwise, repeating the automatically checking and the locating when the signal name in the next higher level component is a port signal of a further higher level component.
Type:
Application
Filed:
November 17, 2005
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation