Patents Assigned to Machines Corporation
-
Publication number: 20150172913Abstract: Embodiments relate to an emergency wireless link in a data center comprising a plurality of servers. An aspect includes an emergency wireless link system in a data center comprising a plurality of servers. The emergency wireless link system includes an input interface to receive an input from a sensor coupled to one of the plurality of servers or to an auxiliary system among a plurality of auxiliary systems. The plurality of auxiliary systems includes a power supply system. The system also includes a processor to compare the input with a plurality of conditions, declare an emergency based on the input matching one of the plurality of conditions, and output one or more messages corresponding with the one of the plurality of conditions based on declaring the emergency. The system further includes a transmitter to wirelessly transmit the one or more messages output by the processor.Type: ApplicationFiled: December 12, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Casimer M. DeCusatis, Anuradha Rao
-
Publication number: 20150172203Abstract: Embodiments relate to a software-defined networking (SDN) interface between multiple platform managers. An aspect is a computer-implemented method for receiving, at an SDN controller of a network, provisioning data from a first network provisioning application associated with a first platform manager of a first computing platform. Provisioning data are received at the SDN controller from a second network provisioning application associated with a second platform manager of a second computing platform. The SDN controller compares the provisioning data from the first network provisioning application to the provisioning data from the second network provisioning application to identify provisioning issues. The SDN controller determines a modified provisioning that resolves the provisioning issues. The SDN controller configures the network to comply with the modified provisioning. The modified provisioning is reported to the first and second network provisioning applications.Type: ApplicationFiled: December 13, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Casimer M. DeCusatis, Rajaram B. Krishnamurthy
-
Publication number: 20150169785Abstract: An approach is provided in which a mobile device collects serviceability data from applications executing on the mobile device based upon one or more serviceability state changes provided by a server. The mobile device filters the collected serviceability data according to one or more collection filter rules provided by the server and, in turn, sends the filtered serviceability data to the server accordingly.Type: ApplicationFiled: December 12, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: William A. Nagy, Paul J. Reder
-
Publication number: 20150168963Abstract: Provided are techniques for analyzing sensor data received from a plurality of sensors associated with a plurality of buildings to identify a predictive pattern of use corresponding to users of a resource corresponding to the buildings; utilizing the predictive pattern to generate space assignments within the plurality of buildings corresponding to the users with respect to a control loop for allocating the resource based upon a criteria; and optimizing, by the control loop, use of the resource based upon the predicted pattern, the criteria and the space assignments.Type: ApplicationFiled: July 20, 2014Publication date: June 18, 2015Applicant: International Business Machines CorporationInventor: Douglas A. Wood
-
Publication number: 20150169654Abstract: A method for building indices for a time sequence in a time series database includes dividing, using a processing device, a time sequence in the time series database into a plurality of subsequences based on a sliding window; building spatial indices for the plurality of subsequences, the spatial indices being used for defining spatial locations of subsequences in the plurality of subsequences in the time sequence; and building content indices for the plurality of subsequences, the content indices being used for defining content ranges of subsequences in the plurality of subsequences.Type: ApplicationFiled: December 13, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Xiao Yan Chen, Yao Liang Chen, Sheng Huang, Kai Liu, Chen Wang
-
Publication number: 20150169361Abstract: A transactional memory system predicts the outcome of coalescing outermost memory transactions, the coalescing causing committing of memory store data to memory for a first transaction to be done at transaction execution (TX) end of a second transaction, the method comprising. A processor of the transactional memory system determines whether a first plurality of outermost transactions from an associated program that were coalesced experienced an abort, the first plurality of outermost transactions including a first instance of a first transaction. The processor updates a history of the associated program to reflect the results of the determination. The processor coalesces a second plurality of outermost transactions from the associated program, based, at least in part, on the updated history.Type: ApplicationFiled: December 12, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Fadi Y. Busaba, Harold W. Cain, III, Michael Karl Gschwind, Maged M. Michael, Eric M. Schwarz
-
Publication number: 20150169366Abstract: A computer manages methods for determining workload placement in a computing environment. The computer receives a plurality of workloads with associated information, wherein the associated information for each workload contains at least: contract information, billing information, and resource availability information. The computer determines a profitability factor for each workload of the plurality of workloads, wherein the profitability factor is at least based on the billing information. The computer determines a penalty factor for each workload of the plurality of workloads, wherein the penalty factor is at least based on the contract information. The computer determines a preference factor for each workload of the plurality of workloads, wherein the preference factor is at least based on the resource availability information. The computer assigns a priority ordering for each of the workloads from the plurality of workloads.Type: ApplicationFiled: December 17, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Ashish Billore, Sudipta Biswas
-
Publication number: 20150169329Abstract: Mechanisms are provided for performing a live update of an operating system. The mechanisms receive an update to an operating system and clone a root volume group associated with an operating system instance executing in a first logical partition of the data processing system to generate a cloned root volume group. The mechanisms apply the update to the cloned root volume group to generate an updated and cloned root volume group and boot a second logical partition of the data processing system using the updated and cloned root volume group. Moreover, the mechanisms migrate application instances and application data to the second logical partition.Type: ApplicationFiled: December 16, 2013Publication date: June 18, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic Barrat, Philippe Bergheaud, Luke M. Browning, Laurent Dufour, Khalid Filali-Adib, Christophe Lombard, John M. McConaughy, Guy Menanteau, Stephen B. Peckham, David W. Sheffield, Donald R. Stence, Sungjin Yook
-
Publication number: 20150169721Abstract: A method, system, and computer program product for discovering relationships between data processing environment components are provided in the illustrative embodiments. Whether a log entry in a set of log entries references a combination of the data processing environment components is detected. The combination of components includes a first component and a second component present in the data processing environment. A type of the log entry is determined. A weight is assigned to the log entry according to the determined type. the weight of the log entry is combined with a second weight of a second log entry to form a cumulative weight. A strength level for which the cumulative weight qualifies is determined. The strength level is assigned to a relationship between the combination of components.Type: ApplicationFiled: January 16, 2015Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: David A. Ashmore, Ann M. Moyer, Nirmala Shobitha Nandi, John Zupet
-
Publication number: 20150170060Abstract: A method for assigning locations to persons of a group of persons may include determining, for each person in the group, a number of communications between the person and each other person in the group. A plurality of reservations from reserving persons of the group may be received. A first force-directed graph having a node for each reserving person may be generated. The generating of the graph may include establishing an edge between one or more pairs of reserving persons, and assigning a first weight to the one or more edges that is derived from the number of communications between respective pairs of reserving persons. Each reserving person may be assigned to a location in the area using the first force-directed graph. A resource for a location not assigned to a reserving person may be controlled based on the assigning of reserving persons to locations.Type: ApplicationFiled: December 17, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Marcelo Blechner, Cristiano M. Breuel, Moreno S. Mello, Tiago B. Scarton
-
Publication number: 20150169868Abstract: A computer processor receives a plurality of execution items corresponding to a computer process. The computer processor allocates a first memory portion corresponding to a first stack, wherein the first stack corresponds to a first class of execution items. The computer processor allocates a second memory portion corresponding to a second stack, wherein the second stack corresponds to a second class of execution items. The computer processor identifies a first execution item of the plurality of execution items and determining a class corresponding to the first execution item.Type: ApplicationFiled: December 17, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Joerg Deutschle, Wolfgang Gellerich, Bernhard Kick, Gerrit Koch
-
Publication number: 20150169360Abstract: A transactional memory system controls the coalescing of outermost memory transactions. The coalescing causing committing of memory store data to memory for a first transaction to be done at transaction execution (TX) end of a second transaction. A processor of the transactional memory system executes a run-time instrumentation program for monitoring and modifying an associated program having a plurality of transactions. The processor initiates execution of the associated program. Based on execution of transactions, by the processor, of the associated program, the run-time instrumentation program dynamically obtains instrumentation information associated with the execution. Based on the obtained instrumentation information, the processor dynamically modifies continued execution of transactions of the associated program to optimize transactional execution (TX).Type: ApplicationFiled: December 12, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Fadi Y. Busaba, Michael Karl Gschwind, Maged M. Michael, Valentina Salapura, Chung-Lung K. Shum
-
Publication number: 20150164405Abstract: A tool for recommending proper sun block use. The tool receives, by one or more computer processors, a first image of a user captured by a camera, and a second image of a user captured by a camera, wherein the first image is an ultraviolet image, and the second image is a digital color image. The tool determines, by one or more computer processors, areas of ultraviolet radiation vulnerability for the user captured in the first and second image. The tool determines, by one or more computer processors, a level of ultraviolet radiation vulnerability for the determined areas. The tool determines, by one or more computer processors, a recommendation for proper sun block use based, at least in part, on the level of ultraviolet radiation vulnerability.Type: ApplicationFiled: December 16, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Brian C. De Guia, Sandy Y. McDonald, Duy Q. Nguyen, Esperanza D. Rodriguez, Gary D. William
-
Publication number: 20150170499Abstract: Embodiments of the invention provide a method, system and computer program product for dynamic activation of service indicators based upon service personnel proximity. In an embodiment of the invention, a method for dynamic activation of service indicators based upon service personnel proximity is provided. The method includes receiving at an enclosure of different hardware devices in a data center, a message for personnel proximity based activation of a service indicator lamp and activating a presence sensor in response to receiving the message. The method also includes responding to presence sensing an individual by the presence sensor by activating the service indicator lamp of the enclosure.Type: ApplicationFiled: December 17, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Fred Bower, Qiu Shuang Cai, Lu Chen, Ye Xu
-
Publication number: 20150169345Abstract: An aspect includes receiving, at a software-defined networking (SDN) controller, an inquiry from a virtual switch executing on a host machine. The inquiry includes a request to identify a flow of a data packet received at the virtual switch from a source virtual processor. The source virtual processor is either a logical partition (LPAR) or a virtual machine (VM) executing under control of a hypervisor on the host machine. A destination virtual processor associated with the data packet is determined by the SDN controller. In addition, the SDN controller identifies the flow between the source virtual processor and the destination virtual processor. The flow includes a least one virtual port in the virtual switch. The SDN controller instructs the virtual switch to send the data packet from the source virtual processor to the destination virtual processor via the identified flow.Type: ApplicationFiled: December 18, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Casimer M. DeCusatis, Rajaram B. Krishnamurthy
-
Publication number: 20150169446Abstract: The present disclosure includes identifying, in a memory system, a capacity for each of a plurality of memory modules for a first memory channel having a first amount of memory and a second memory channel having a second amount of memory; determining a memory segment size from the capacities of the memory modules; identifying a first memory segment of the memory segment size for the first memory channel and a second memory segment of the memory segment size for the second memory channel; and creating a virtual group that includes the first memory segment and the second memory segment and that uses less than the entire first amount of memory from the first memory channel.Type: ApplicationFiled: April 8, 2014Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Timothy J. Dell, Prasanna Jayaraman, Anil B. Lingambudi, Girisankar Paulraj
-
Publication number: 20150169544Abstract: An approach is provided for generating supersets of Q/A action paths based on dynamically generated type sets. In the approach, a corpus of knowledge that is used by the QA system is analyzed. The analyzing is performed according to a natural language processing (NLP) of a number of key words that have been found to exceed an expected frequency, such as a frequency found in general language usage. Runtime code is generated by utilizing the key words. The generated runtime code is able to provide answers from the corpus of knowledge, such as by being in a natural language question or in a structured query language expression, with the provided answers being related to one or more predicted questions.Type: ApplicationFiled: December 12, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: John P. Bufe, III, Timothy P. Winkler
-
Publication number: 20150170691Abstract: Aspects of the present invention relates generally to apparatuses with transducer arrays having offset transducers. Various embodiments are particularly suited to tilting for tape dimensional instability compensation. Some embodiments include dual servo readers in a given array.Type: ApplicationFiled: December 12, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Robert G. Biskeborn, Calvin S. Lo
-
Publication number: 20150169667Abstract: A time-aware union operator is disclosed for consistent integration of time-aware data, wherein the time-aware union produces a time-aware consistent integrated view of underlying sources according to specified key constraints and policies. The implementation of time-aware union is idempotent, commutative, and associative, thus making it suitable for data integration, and it produces the same integrated outcome, modulo representation of time, regardless of the order in which sources are integrated.Type: ApplicationFiled: December 16, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Mary A Roth, Wang-Chiew Tan
-
Publication number: 20150172099Abstract: Embodiments include a system for implementing multipath selection of ethernet links in a fiber channel over ethernet (FCoE) network. A first VLAN defined a point-to-point path through the ethernet side of the network. A link failure in the first VLAN link is replaced by activating an alternate VLAN link corresponding to a new path through the ethernet side of the network while disabling all other VLANS corresponding to other paths through the ethernet side of the network. An advertisement is received from the origination SAN device on the fiber channel side of the network indicating a request for network access by the origination SAN device. Communications are enabled between the origination SAN device and the destination LAN device via the alternate VLAN link. Communications are then resumed between the origination SAN device and the destination LAN device utilizing the alternate VLAN link.Type: ApplicationFiled: December 13, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Casimer M. DeCusatis, Anuradha Rao