Patents Assigned to International Business Machines
-
Patent number: 8954428Abstract: Provided is a method for rendering search results. A search request is received having a search criteria to perform with respect to objects having content instances. A determination is made of the objects having qualifying content instances that satisfy the search criteria, an attribute value of the qualifying content instances for a specified attribute, and appearance settings for the qualifying content instances based on the determined attribute values. The appearance settings vary based on the attribute values. Tags are generated indicating the content instances and appearance settings for the content instances. A visualization of the tags in a display group are generated to provide visualization of the qualifying content instances in the objects according to the appearance settings, wherein visualizations of the tags is varied based on the determined appearance settings.Type: GrantFiled: May 3, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Srinivas V. Chitiveli, Barton W. Emanuel
-
Patent number: 8954723Abstract: Streams applications may decrypt encrypted data even though the decrypted data is not used by an operator. Operator properties are defined to permit decryption of data within the operator based on a number of criteria. By limiting the number of operators that decrypt encrypted data, the anonymous nature of the data is further preserved. Operator properties also indicate whether an operator should send encrypted or decrypted data to a downstream operator.Type: GrantFiled: May 9, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Michael J. Branson, Ryan K. Cradick, John M. Santosuosso, Brandon W. Schulz
-
Patent number: 8954306Abstract: A behavior model is provided, which is configured to simulate one aspect of the behavior of a component apart from the component model for the component. The behavior model can be included in a circuit model used to simulate operation of a circuit. The circuit model can include a component model for a component and a corresponding behavior model, which is located in parallel or series with the component model. The component model and behavior model can collectively simulate all of the behavior of the component within the circuit. In an embodiment, the behavior model simulates snapback behavior exhibited by the component.Type: GrantFiled: June 30, 2010Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Junjun Li, Rahul Nayak
-
Patent number: 8954652Abstract: In a method for identifying a unit in a solid state memory device for writing data to a tier structure is maintained the tier structure comprising at least two tiers for assigning units available for writing data to. In response to receiving a request for writing data it is determined if a unit for writing data to is available in a first tier of the at least two tiers. In response to determining that a unit is available for writing data to in the first tier this unit is identified for writing data to, and in response to determining that no unit is available for writing the data to in the first tier it is determined if a unit is available for writing data to in a second tier of the at least two tiers subject to a priority of the write request.Type: GrantFiled: June 11, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Robert Haas, Roman Pletka
-
Patent number: 8951811Abstract: A memory device includes a first nanowire, a second nanowire and a magnetic tunnel junction device coupling the first and second nanowires.Type: GrantFiled: August 20, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Michael C. Gaidis, Alexander J. Gaidis
-
Patent number: 8954982Abstract: System and method and computer program product implemented for a cloud computing infrastructure that allows a hypervisor to optimize resource allocation in a cloud computing environment by exploiting the application-level performance, O/S system performance, and hypervisor performance information through a reliable and efficient channel.Type: GrantFiled: September 14, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Dilma M. Da silva, Michael R. Hines, Kyung D. Ryu, Marcio A. Silva
-
Patent number: 8953850Abstract: A biometric authentication system includes an image database and a user database containing user profiles. Each user profile is associated with a selected image in the image database as an image key and with an ocular biometric data record obtained from an eye of the associated user. A user input terminal receives asserted user credentials, an eye scanning module obtains ocular biometric data, and a position detection module detects an eye position or eyelid position. An access control module communicates with the user database for obtaining a user profile associated with the asserted user credentials, communicates with a display device for displaying the image key associated with the obtained user profile, communicates with the position detection module for verifying the biometric authentication system by detecting whether the user is viewing the image key, and communicates with the eye scanning module for obtaining ocular biometric data and authenticating the user.Type: GrantFiled: August 15, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Kobina K. Inkumsah, Adrian X. Rodriguez, Eric Woods
-
Automatically generating challenge questions inferred from user history data for user authentication
Patent number: 8955058Abstract: User authentication is provided. At least one of a social network and a business network of each user in a plurality of users is accessed. User history data of each user in the plurality of users is monitored in the at least one of the social network and the business network. Challenge questions requiring a user response are generated based on monitoring the user history data of the users. The user response to a generated challenge question is evaluated. A set of events is triggered based on evaluating the user response.Type: GrantFiled: November 15, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Paul C. Castro, Joseph W. Ligman, David M. Lubensky, Marco Pistoia, John J. Ponzo, Umut Topkara -
Patent number: 8954376Abstract: Techniques are disclosed for identifying transcoding tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, records passing through an operator configured to replace values in the records with values from at least one table linked to the operator before being sent to an output table, wherein the operator specifies an operation for extracting, transforming, or loading data stored in one or more source systems into storage by a target system, and evaluating at least a first table linked to the operator to determine whether the first table is a transcoding table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a transcoding table, wherein a transcoding table is used to harmonize values from a plurality of tables in the one or more source systems to a table in the target.Type: GrantFiled: March 8, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Dan J. Mandelstein, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
-
Patent number: 8954912Abstract: A latch placement tool determines a shape for a cluster of latches from a preliminary layout (or based on a netlist), including an aspect ratio of the shape, and generates a template for placement of the latches in conformity with the shape. Latches are placed around a local clock buffer (LCB) based on latch size, from largest latch first to smallest latch last, and based on their ideal locations given the target aspect ratio. The ideal locations may be further based on the clock driver pin configuration of the LCB. The final template preferably has an aspect ratio that is approximately equal to the aspect ratio of the shape of the cluster, but the latch placement may be constrained by clock routing topology. Latch placement within a cluster can be further optimized by swapping one of the latches with another to minimize total wirelength of the design.Type: GrantFiled: November 29, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Charles J. Alpert, Zhuo Li, Gi-Joon Nam, Shyam Ramji, Chin Ngai Sze, Paul G. Villarrubia, Natarajan Viswanathan
-
Patent number: 8954417Abstract: A content management system (CMS) provides a way to include data from an external source as an object in the repository managed by the CMS. The CMS includes an external data mechanism that processes a document with a query to a data source external to the repository. The external data mechanism executes the query, and creates one or more objects in the repository according to the type of data returned. Each object containing data returned from the query is linked to that query via a formal relationship in the CMS. When an object that has a formal relationship with a query is checked out of the repository, the query corresponding to the object may be executed, and the data returned from the query may be stored in the object. Alternatively, the data may be used directly if a corresponding lifecycle policy indicates the corresponding query should not be executed.Type: GrantFiled: January 29, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventor: John E. Petri
-
Patent number: 8952658Abstract: An approach is provided in which a battery cartridge aperture is included in a device. The edges of the battery cartridge aperture form a shape that match a selected battery cartridge and indicate a power configuration. The selected battery cartridge is selected from a variety of different battery cartridges with each of the battery cartridges having a unique external shape with each unique external shape corresponding to a different power configuration. The various battery cartridges each have a different configuration of battery cells within the battery cartridge that provide power to the device through electrical contacts. The contacts are affixed within the device with each of the contacts positioned to correspond with electrical contacts from the battery cartridge. In one embodiment, protective covers are provided that cover the contacts with the covers automatically retracting to expose the contacts when the battery cartridge is inserted in the device.Type: GrantFiled: September 20, 2011Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventor: Michael Paul Clarke
-
Patent number: 8954627Abstract: Disclosed is a computer implemented method, data processing system and computer program product to discover an SCSI target. The method comprises a client adapter transmitting an N_port ID virtualization (NPIV) login to a virtual I/O server (VIOS). The client adapter receives a successful login acknowledgement from the VIOS and issues a discover-targets command to the fabric. Upon determining that the SCSI target information is received, wherein the SCSI target information includes at least one SCSI identifier. Responsive a determination that SCSI target information is received the client adapter issues a port login to a target port, wherein the target port is associated with the at least one SCSI target. The client adapter makes a process login to form an initiator/target nexus between a client and at least one SCSI target. The client adapter queries the SCSI target by using a world wide port name associated with the target port.Type: GrantFiled: December 21, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: James P. Allen, Michael P. Cyr, Robert G. Kovacs, James A. Pafumi, James B. Partridge, Vasu Vallabhaneni
-
Patent number: 8953796Abstract: A technique for accessing features of a hardware adapter includes reading a first key from a hardware adapter and attempting to decrypt the first key with a second key. In response to the second key successfully decrypting the first key: encrypted code from the hardware adapter is read; the encrypted code is decrypted with the decrypted first key to generate unencrypted code; and a default code in an executable flash sector of the hardware adapter is over-written with the unencrypted code. In this case, the unencrypted code facilitates access to at least one feature of the hardware adapter that is customer specific. In response to the second key not successfully decrypting the first key, the default code in the executable flash sector of the hardware adapter is not over-written. In this case, the default code facilitates access to one or more features that are not customer specific.Type: GrantFiled: June 29, 2011Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Jiandi An, Omar Cardona, Matthew R. Ochs, Kent E. Yoder
-
Patent number: 8950661Abstract: A desktop metaphor system. There is included a physical, non-virtual icon card corresponding to a certain computer application and a computer separate from the icon card. The computer includes a computer readable storage medium for storing computer applications, one of which is the certain computer application, and a computer processor. The computer processor includes an icon detection module to detect the approaching of the icon card to the computer and recognize the certain computer application corresponding to the icon card; an application context memory module for storing application context for an application running on the computer processor and for storing application context for the certain application corresponding to the icon card and stored in storage; and an event processing logic module for switching between the application, if any, currently running on the computer processor and the certain application corresponding to the icon card.Type: GrantFiled: October 1, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventor: Tomio Amano
-
Patent number: 8954586Abstract: Disclosed are approaches for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments describe approaches to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests. In typical embodiments, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure.Type: GrantFiled: July 13, 2011Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Jason L. Anderson, Gregory J. Boss, Jeffrey L. Coveyduc, Christopher W. Roach
-
Patent number: 8954433Abstract: A processor-implemented method, system, and/or computer program product generate a recommendation to add a member to a receptivity cohort. A receptivity cohort is made up of members who share a conduct attribute, which is a facial expression, body language, and/or social interaction of a person. The conduct attribute has been predetermined to be an indicator of a level of receptiveness to a proposed future change in a set of circumstances. Biometric sensor data, which describe the facial expression, body language and/or social interaction for a candidate member, are retrieved from a set of biometric sensors. The retrieved biometric sensor data for the candidate member is compared to the conduct attribute of members of the receptivity cohort. In response to the biometric sensor data for the candidate member matching the conduct attribute of members of the receptivity cohort, a recommendation is generated to add the candidate member to the receptivity cohort.Type: GrantFiled: February 22, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Robert Lee Angell, Robert R. Friedlander, James R. Kraemer
-
Patent number: 8955153Abstract: An approach is provided to provide privacy control in a social network. In the approach, a first post is posted from a first user to a second user in the social network with the first post including private data belonging to the first user. Subsequent postings are monitored for the first user's private data. When the monitoring detects a second post of the first user's private data with the second post being from the second user to a third user in the social network, privacy controls are performed. The privacy controls mask the first user's private data from the third user so that the first user's private data inaccessible (not visible) to the third user.Type: GrantFiled: January 21, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Faheem Altaf, Steven Duane Clay, Eduardo N. Spring, Shunguo Yan
-
Patent number: 8954785Abstract: A method for managing communications to add a first Remote Direct Memory Access (RDMA) link between a TCP server and a TCP client, where the first RDMA link references first remote memory buffer (RMB) and a second RMB, and further based on a first remote direct memory access network interface card (RNIC) associated with the TCP server and a second RNIC associated with the TCP client. The system determines whether a third RNIC is enabled. The system adds a second RDMA link, responsive to a determination that the third RNIC is enabled. The system detects a failure in the second RDMA link. The system reconfigures the first RDMA link to carry at least one TCP packet of a session formerly assigned to the second RDMA link, responsive to detecting the failure. The system communicates at least one packet of the at least one session on the first RDMA link.Type: GrantFiled: March 8, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Michael Jon Fox, Jeffrey D Haggar, David Anthony Herr, Hugh E Hockett, Constantinos Kassimis, Benjamin Patrick Segal, Jerry W Stevens
-
Patent number: 8954408Abstract: Provided are a computer program product, system, and method for allowing writes to complete without obtaining a write lock to a file. A lock is provided to a first request, comprising a read or write request, to access the file. A second write request is received while the first request maintains the lock. A temporary file associated with the file for the second write request is created. The second write request is controlled to write to the temporary file while the lock is held by the first request. In response to completing the first request, the lock is granted to the second write request to write the data in the temporary file to the file.Type: GrantFiled: July 28, 2011Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Kyle B. Dudgeon, David C. Reed, Esteban Rios, Max D. Smith