Patents Assigned to INTERNATIONALS BUSINESS MACHINES CORPORATION
-
Publication number: 20140195554Abstract: A method, apparatus and article of manufacture for analyzing data recorded in an audit log generated as part of an electronic discovery (e-Discovery) process in litigation is disclosed. In at least one embodiment of the present invention, a computer implemented method of analyzing data recorded in an audit log generated as part of an electronic discovery (e-Discovery) process in litigation is provided. The method comprises retrieving, on one or more computers, an audit log from a storage system accessible from the computer, the audit log comprising data regarding a chronological sequence of actions taken to produce case documents relevant in litigation. The data in the audit log is analyzed and a comprehensive overview of the electronic discovery process is compiled based on the analyzed data for presentation to a user.Type: ApplicationFiled: January 8, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rajesh M. Desai, Magesh Jayapandian, Aidon P. Jennery, Terry L. Kemp
-
Publication number: 20140195534Abstract: A term graph for a group (G), where G is defined by a given set of values d for a set of dimensions (D) relative to a topic (X) may be created by retrieving a graph (H) comprising terms related to an entity and associated with topic X; identifying a node (N) that represents topic X in graph H; identifying resources (R) associated with topic X in group G (used or accessed by, or otherwise associated with values d in group (G); compiling a list (L) of terms used in the identified resources (R); and creating, starting from node N, a connected subgraph S representing the term graph, wherein each node in subgraph S represents one of the terms from list L and has a path to node N.Type: ApplicationFiled: January 8, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140195768Abstract: A system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory.Type: ApplicationFiled: January 8, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: David Alan Hepkin, Satya Prakash Sharma, Saurabh Nath Sharma, Randall Craig Swanberg
-
Publication number: 20140192632Abstract: Embodiments of the invention relate to virtual link aggregation. One embodiment includes forming one or more virtual links using physical links connecting a first networking element, a second networking element and a third networking element. A first trigger status indication is used for blocking network traffic for avoiding traffic loops occurring over the one or more virtual links.Type: ApplicationFiled: November 25, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tamanna Z. Sait, Venkatesan Selvaraj, Shoou J. Yiu, Yi Xia
-
Publication number: 20140195495Abstract: Deduplicated data is packed in a self-contained deduplicated repository having unique data blocks with each being referenced by a globally unique identifier (GUID). The self-contained deduplicated repository has information regarding both deduplicated data files and the unique data blocks of each of the deduplicated data files and a master GUID list containing a location of each of the unique data blocks.Type: ApplicationFiled: November 7, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Shay H. AKIRAV, Michael HIRSCH, Ofer LENEMAN
-
Publication number: 20140195967Abstract: A graphical processor, method, and/or computer program product controls a display of user controls on a graphical user interface. A display tool displays a screen view of a data image on a display, wherein the screen view includes one or more graphical objects. A magnifier tool displays a zoomed-in view of a portion of the screen view, wherein the zoomed-in view is superimposed on the screen view, and wherein the zoomed-in view remains turned on until turned off by the user. A crosshair tool targets a graphical object in the zoomed-in portion of the view. A decoration tool displays a user control for a targeted graphical object.Type: ApplicationFiled: January 6, 2014Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: EDUARDO ABE, JULIEN CARNEC, YVES LE BRAS, DAVID M. ZELEZNIK
-
Publication number: 20140192964Abstract: A computer system manages emergency calls. The computer system receives an emergency call from a computing device along with a location of the computing device. The computer system determines that the location of the computing device is within a geographic area surrounding a location of a previously reported incident and sends a notification of the previously reported incident to the computer device. The computer system receives an indication from the computing device that the emergency call is related to the previously reported incident. Responsive to receiving the indication that the emergency call is related to the previously reported incident, the computer system handles the emergency call as a duplicative report of a known emergency.Type: ApplicationFiled: January 4, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kulvir S. Bhogal, Gregory J. Boss, Rick A. Hamilton, II, Anne R. Sand
-
Publication number: 20140190681Abstract: A method for controlling a cooling system based on a heat dissipation of an electronic module and an ambient air temperature includes determining a combination of individual controls on components of the cooling system that achieve a specific amount of cooling based on a cooling power relationship for the plurality of components, the heat dissipation of the electronic module and the ambient air temperature, and applying the individual controls to the plurality of components.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Timothy J. Chainer, Pritish R. Parida, Mark D. Schultz
-
Publication number: 20140195680Abstract: A method and apparatus for managing electronic communications is disclosed. One or more processors detect a reference in an electronic communication. The reference points to a resource stored in storage of a data processing system. The one or more processors identify a set of permissions required to access the resource pointed to by the reference in the electronic communication. The one or more processors then perform a set of access-oriented actions associated with the set of permissions.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
-
Publication number: 20140195060Abstract: Mandatory and optional consumption points are identified to support management of power allocation. A mandatory consumption point is a consumption point required to function at a given time and an optional consumption point is a discretionary consumption point. The energy required for mandatory consumption points to complete their designated functions is calculated. An energy quota is designated for power allocation to the optional consumption points in response to the mandatory consumption point calculation, and the identification of available energy. Energy required for optional consumption points to complete their designated functions is calculated. The optional consumption points are dynamically prioritized and power is allocated to the optional consumption points responsive to this prioritization and with respect to the designated energy quota.Type: ApplicationFiled: January 9, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Barry A. Kritt, Sarbajit K. Rakshit
-
Publication number: 20140195677Abstract: Event data pattern identification, storage, and sharing in a peer-to-peer network is disclosed. This includes peer-to-peer devices that store data events, review previously stored data events and identify patterns between the stored events and newly received events. Improvements can serve to reduce duplicative traffic and enhance network performance.Type: ApplicationFiled: March 13, 2014Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kazuhito Akiyama, Yasutaka Nishimura, Tadashi Tsumura
-
Publication number: 20140195759Abstract: A mechanism is provided for increasing the efficiency of block-level processes. Responsive to detecting an I/O write to a storage volume, a determination is made as to whether the I/O write matches one or more suspicious I/O reads in a plurality of suspicious I/O reads previously recorded in a memory. Responsive to the I/O write matching one or more suspicious I/O reads in the plurality of suspicious I/O reads, an identification is made that there is a data relocation associated with the sector associated with the I/O write. A data relocation application is informed of the data relocation of the sector associated with the one or more suspicious I/O reads associated with the sector indicated by the I/O write. Each sector associated with the one or more suspicious I/O reads is then released in a file system for reuse.Type: ApplicationFiled: January 7, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Alex Gantman, Eli Shahaf, Eran Raichstein, Asaf Yeger
-
Publication number: 20140192476Abstract: A cooling structure including a thermally conducting central element having a channel formed therein, the channel being configured for flow of cooling fluid there through, a first pressure plate, and a first thermally conductive resilient member disposed between the thermally conducting central element and the first pressure plate, wherein the first pressure plate, the first thermally conductive resilient member, and the thermally conducting central element form a first heat transfer path.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140193063Abstract: A system and method for comparing digital images, such as checks images used by banks, includes receiving and processing the images to be compared, including scaling the images to a common resolution, as well as filtering them to remove spot noise, background pels, and other non-information carrying elements. One or more regions of each image are selected for comparison. The selected regions are compared to one another by subtracting the pels of one image from the other's pels. A determination is made of whether the two or more images are duplicates of one another, or depict a substantially identical subject, based on the results of the subtractions. Furthermore, the amount of filtering and scaling may be adjusted to enhance the effects of the system to take advantage of common characteristics that may be known or detected in a particular set of images to be compared.Type: ApplicationFiled: January 4, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Rodney G. Moon, Gerald C. Rector, Philip Ridgway
-
Publication number: 20140196148Abstract: A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls to system resources from the binary executable file via export address redirection back to the security payload. Upon execution of the binary executable file, the security payload replaces system library export addresses within a process address space for the binary executable file with security monitoring stub addresses to the security payload. Upon the binary executable computer file issuing a call to a given API, the process address space directs the call to the given API back to the security payload via one of the security monitoring stub addresses that is associated with the given API. The security payload then can assess whether the call to the given API is a security breach.Type: ApplicationFiled: March 13, 2014Publication date: July 10, 2014Applicant: International Business Machines CorporationInventor: Vishal Chahal
-
Publication number: 20140195798Abstract: A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a data file from at least a portion of stream data during transmission. If the destination of the data file is the storage, the gateway device selects a set of analysis algorithms to determine whether the data file comprises sensitive data.Type: ApplicationFiled: January 9, 2014Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Dominik W. Brugger, Matthias Seul
-
Publication number: 20140196030Abstract: In response to a performance parameter of a virtual machine (VM) exceeding a threshold, an operation to be performed relative to the VM is identified. A resource requirement of performing the operation is determined using a resource requirement thresholds hierarchy. The resource requirement thresholds hierarchy is usable for computing the resource requirement of the operation when the operation is performed at a specified level in a hierarchy within a virtualized environment where the VM is executing. A violation value resulting from performing the operation is determined using a violation value thresholds hierarchy. If the resource requirement and the violation value do not exceed a resource requirement threshold and a violation value threshold respectively, a first configuration of the VM is revised to a second configuration of the VM. The second configuration includes a result of performing the operation relative to the VM at the specified level in the hierarchy.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Deepak Arun Deshpande, Anindya Neogi, Priti P. Patil
-
Publication number: 20140195214Abstract: Automatic driver modeling is used to integrate human-controlled vehicles into an autonomous vehicle network. A driver of a human-controlled vehicle is identified based on behavior patterns of the driver measured by one or more sensors of an autonomous vehicle. A model of the driver is generated based on the behavior patterns of the driver measured by the one or more sensors of the autonomous vehicle. Previously stored behavior patterns of the driver are then retrieved from a database to augment the model of the driver. The model of the driver is then transmitted from the autonomous vehicle to nearby vehicles with autonomous interfaces.Type: ApplicationFiled: August 8, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: James R. Kozloski, Timothy M. Lynar, Cristian Vecchiola
-
Publication number: 20140195373Abstract: A system includes a first device for allowing a consumer to input a shopping list, and multiple second devices associated with a plurality of aisles in a shopping store. Each second device is configured to detect the shopping list on the first device when the consumer is within a predefined range of distance from the second device, and to transmit the detected list. The system also includes one or more image-capturing device for transmitting captured images; and a server configured to do the following: (i) receive the list from the second device, (ii) receive the images from the image-capturing device, (iii) check whether an item on the list is present in an aisle based upon an identified location of the consumer, (iv) scan the images to identify one or more images including the at least one item, (v) dynamically sort the list, (vi) display the sorted list and links on the first device, and (vi) determine whether one or more items must be restocked on shelves.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Richard T. Bassemir, Eric Forestier, Alfredo V. Mendoza, Didier Petitprez, Andrew G. Tonkin
-
Publication number: 20140192662Abstract: A method for mobile data transmission are provided in the illustrative embodiments. A request for data is received from a mobile device. A determination is made whether a data transmission over a mobile data communication network in response to the request can be delayed, forming a time-shifting determination. A determination is made, responsive to the time-shifting determination being affirmative, a delayed schedule for the data transmission in response to the request such that the data transmission is completed by a deadline. The data is transmitted over the mobile data communication network according to the delayed schedule.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: International Business Machines CorporationInventors: Malolan Chetlur, Shivkumar Kalyanaraman, Hemant Jagdish Kowshik