Patents Assigned to INTERNATIONALS BUSINESS MACHINES CORPORATION
  • Publication number: 20140195554
    Abstract: A method, apparatus and article of manufacture for analyzing data recorded in an audit log generated as part of an electronic discovery (e-Discovery) process in litigation is disclosed. In at least one embodiment of the present invention, a computer implemented method of analyzing data recorded in an audit log generated as part of an electronic discovery (e-Discovery) process in litigation is provided. The method comprises retrieving, on one or more computers, an audit log from a storage system accessible from the computer, the audit log comprising data regarding a chronological sequence of actions taken to produce case documents relevant in litigation. The data in the audit log is analyzed and a comprehensive overview of the electronic discovery process is compiled based on the analyzed data for presentation to a user.
    Type: Application
    Filed: January 8, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rajesh M. Desai, Magesh Jayapandian, Aidon P. Jennery, Terry L. Kemp
  • Publication number: 20140195534
    Abstract: A term graph for a group (G), where G is defined by a given set of values d for a set of dimensions (D) relative to a topic (X) may be created by retrieving a graph (H) comprising terms related to an entity and associated with topic X; identifying a node (N) that represents topic X in graph H; identifying resources (R) associated with topic X in group G (used or accessed by, or otherwise associated with values d in group (G); compiling a list (L) of terms used in the identified resources (R); and creating, starting from node N, a connected subgraph S representing the term graph, wherein each node in subgraph S represents one of the terms from list L and has a path to node N.
    Type: Application
    Filed: January 8, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20140195768
    Abstract: A system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.
    Type: Application
    Filed: January 8, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randall Craig Swanberg
  • Publication number: 20140192632
    Abstract: Embodiments of the invention relate to virtual link aggregation. One embodiment includes forming one or more virtual links using physical links connecting a first networking element, a second networking element and a third networking element. A first trigger status indication is used for blocking network traffic for avoiding traffic loops occurring over the one or more virtual links.
    Type: Application
    Filed: November 25, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamanna Z. Sait, Venkatesan Selvaraj, Shoou J. Yiu, Yi Xia
  • Publication number: 20140195495
    Abstract: Deduplicated data is packed in a self-contained deduplicated repository having unique data blocks with each being referenced by a globally unique identifier (GUID). The self-contained deduplicated repository has information regarding both deduplicated data files and the unique data blocks of each of the deduplicated data files and a master GUID list containing a location of each of the unique data blocks.
    Type: Application
    Filed: November 7, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shay H. AKIRAV, Michael HIRSCH, Ofer LENEMAN
  • Publication number: 20140195967
    Abstract: A graphical processor, method, and/or computer program product controls a display of user controls on a graphical user interface. A display tool displays a screen view of a data image on a display, wherein the screen view includes one or more graphical objects. A magnifier tool displays a zoomed-in view of a portion of the screen view, wherein the zoomed-in view is superimposed on the screen view, and wherein the zoomed-in view remains turned on until turned off by the user. A crosshair tool targets a graphical object in the zoomed-in portion of the view. A decoration tool displays a user control for a targeted graphical object.
    Type: Application
    Filed: January 6, 2014
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: EDUARDO ABE, JULIEN CARNEC, YVES LE BRAS, DAVID M. ZELEZNIK
  • Publication number: 20140192964
    Abstract: A computer system manages emergency calls. The computer system receives an emergency call from a computing device along with a location of the computing device. The computer system determines that the location of the computing device is within a geographic area surrounding a location of a previously reported incident and sends a notification of the previously reported incident to the computer device. The computer system receives an indication from the computing device that the emergency call is related to the previously reported incident. Responsive to receiving the indication that the emergency call is related to the previously reported incident, the computer system handles the emergency call as a duplicative report of a known emergency.
    Type: Application
    Filed: January 4, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kulvir S. Bhogal, Gregory J. Boss, Rick A. Hamilton, II, Anne R. Sand
  • Publication number: 20140190681
    Abstract: A method for controlling a cooling system based on a heat dissipation of an electronic module and an ambient air temperature includes determining a combination of individual controls on components of the cooling system that achieve a specific amount of cooling based on a cooling power relationship for the plurality of components, the heat dissipation of the electronic module and the ambient air temperature, and applying the individual controls to the plurality of components.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Timothy J. Chainer, Pritish R. Parida, Mark D. Schultz
  • Publication number: 20140195680
    Abstract: A method and apparatus for managing electronic communications is disclosed. One or more processors detect a reference in an electronic communication. The reference points to a resource stored in storage of a data processing system. The one or more processors identify a set of permissions required to access the resource pointed to by the reference in the electronic communication. The one or more processors then perform a set of access-oriented actions associated with the set of permissions.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20140195060
    Abstract: Mandatory and optional consumption points are identified to support management of power allocation. A mandatory consumption point is a consumption point required to function at a given time and an optional consumption point is a discretionary consumption point. The energy required for mandatory consumption points to complete their designated functions is calculated. An energy quota is designated for power allocation to the optional consumption points in response to the mandatory consumption point calculation, and the identification of available energy. Energy required for optional consumption points to complete their designated functions is calculated. The optional consumption points are dynamically prioritized and power is allocated to the optional consumption points responsive to this prioritization and with respect to the designated energy quota.
    Type: Application
    Filed: January 9, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barry A. Kritt, Sarbajit K. Rakshit
  • Publication number: 20140195677
    Abstract: Event data pattern identification, storage, and sharing in a peer-to-peer network is disclosed. This includes peer-to-peer devices that store data events, review previously stored data events and identify patterns between the stored events and newly received events. Improvements can serve to reduce duplicative traffic and enhance network performance.
    Type: Application
    Filed: March 13, 2014
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kazuhito Akiyama, Yasutaka Nishimura, Tadashi Tsumura
  • Publication number: 20140195759
    Abstract: A mechanism is provided for increasing the efficiency of block-level processes. Responsive to detecting an I/O write to a storage volume, a determination is made as to whether the I/O write matches one or more suspicious I/O reads in a plurality of suspicious I/O reads previously recorded in a memory. Responsive to the I/O write matching one or more suspicious I/O reads in the plurality of suspicious I/O reads, an identification is made that there is a data relocation associated with the sector associated with the I/O write. A data relocation application is informed of the data relocation of the sector associated with the one or more suspicious I/O reads associated with the sector indicated by the I/O write. Each sector associated with the one or more suspicious I/O reads is then released in a file system for reuse.
    Type: Application
    Filed: January 7, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Alex Gantman, Eli Shahaf, Eran Raichstein, Asaf Yeger
  • Publication number: 20140192476
    Abstract: A cooling structure including a thermally conducting central element having a channel formed therein, the channel being configured for flow of cooling fluid there through, a first pressure plate, and a first thermally conductive resilient member disposed between the thermally conducting central element and the first pressure plate, wherein the first pressure plate, the first thermally conductive resilient member, and the thermally conducting central element form a first heat transfer path.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20140193063
    Abstract: A system and method for comparing digital images, such as checks images used by banks, includes receiving and processing the images to be compared, including scaling the images to a common resolution, as well as filtering them to remove spot noise, background pels, and other non-information carrying elements. One or more regions of each image are selected for comparison. The selected regions are compared to one another by subtracting the pels of one image from the other's pels. A determination is made of whether the two or more images are duplicates of one another, or depict a substantially identical subject, based on the results of the subtractions. Furthermore, the amount of filtering and scaling may be adjusted to enhance the effects of the system to take advantage of common characteristics that may be known or detected in a particular set of images to be compared.
    Type: Application
    Filed: January 4, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rodney G. Moon, Gerald C. Rector, Philip Ridgway
  • Publication number: 20140196148
    Abstract: A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls to system resources from the binary executable file via export address redirection back to the security payload. Upon execution of the binary executable file, the security payload replaces system library export addresses within a process address space for the binary executable file with security monitoring stub addresses to the security payload. Upon the binary executable computer file issuing a call to a given API, the process address space directs the call to the given API back to the security payload via one of the security monitoring stub addresses that is associated with the given API. The security payload then can assess whether the call to the given API is a security breach.
    Type: Application
    Filed: March 13, 2014
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventor: Vishal Chahal
  • Publication number: 20140195798
    Abstract: A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a data file from at least a portion of stream data during transmission. If the destination of the data file is the storage, the gateway device selects a set of analysis algorithms to determine whether the data file comprises sensitive data.
    Type: Application
    Filed: January 9, 2014
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dominik W. Brugger, Matthias Seul
  • Publication number: 20140196030
    Abstract: In response to a performance parameter of a virtual machine (VM) exceeding a threshold, an operation to be performed relative to the VM is identified. A resource requirement of performing the operation is determined using a resource requirement thresholds hierarchy. The resource requirement thresholds hierarchy is usable for computing the resource requirement of the operation when the operation is performed at a specified level in a hierarchy within a virtualized environment where the VM is executing. A violation value resulting from performing the operation is determined using a violation value thresholds hierarchy. If the resource requirement and the violation value do not exceed a resource requirement threshold and a violation value threshold respectively, a first configuration of the VM is revised to a second configuration of the VM. The second configuration includes a result of performing the operation relative to the VM at the specified level in the hierarchy.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Deepak Arun Deshpande, Anindya Neogi, Priti P. Patil
  • Publication number: 20140195214
    Abstract: Automatic driver modeling is used to integrate human-controlled vehicles into an autonomous vehicle network. A driver of a human-controlled vehicle is identified based on behavior patterns of the driver measured by one or more sensors of an autonomous vehicle. A model of the driver is generated based on the behavior patterns of the driver measured by the one or more sensors of the autonomous vehicle. Previously stored behavior patterns of the driver are then retrieved from a database to augment the model of the driver. The model of the driver is then transmitted from the autonomous vehicle to nearby vehicles with autonomous interfaces.
    Type: Application
    Filed: August 8, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: James R. Kozloski, Timothy M. Lynar, Cristian Vecchiola
  • Publication number: 20140195373
    Abstract: A system includes a first device for allowing a consumer to input a shopping list, and multiple second devices associated with a plurality of aisles in a shopping store. Each second device is configured to detect the shopping list on the first device when the consumer is within a predefined range of distance from the second device, and to transmit the detected list. The system also includes one or more image-capturing device for transmitting captured images; and a server configured to do the following: (i) receive the list from the second device, (ii) receive the images from the image-capturing device, (iii) check whether an item on the list is present in an aisle based upon an identified location of the consumer, (iv) scan the images to identify one or more images including the at least one item, (v) dynamically sort the list, (vi) display the sorted list and links on the first device, and (vi) determine whether one or more items must be restocked on shelves.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Richard T. Bassemir, Eric Forestier, Alfredo V. Mendoza, Didier Petitprez, Andrew G. Tonkin
  • Publication number: 20140192662
    Abstract: A method for mobile data transmission are provided in the illustrative embodiments. A request for data is received from a mobile device. A determination is made whether a data transmission over a mobile data communication network in response to the request can be delayed, forming a time-shifting determination. A determination is made, responsive to the time-shifting determination being affirmative, a delayed schedule for the data transmission in response to the request such that the data transmission is completed by a deadline. The data is transmitted over the mobile data communication network according to the delayed schedule.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Malolan Chetlur, Shivkumar Kalyanaraman, Hemant Jagdish Kowshik