Patents Assigned to The International Business Machines Corporation
  • Publication number: 20140019199
    Abstract: A method for evaluating a satisfaction of a customer in a retail environment includes identifying an item for which the customer is searching in the retail environment, monitoring an activity of the customer with respect to the item in the retail environment, and automatically evaluating the satisfaction of the customer based on the activity of the customer with respect to the item.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ana Paula Appel, Maira Athanazio De Cerqueira Gatti, Rogerio Abreu De Paula
  • Publication number: 20140019665
    Abstract: Optimized buffer placement is provided based on timing and capacitance assertions in a functional chip unit including a single source and multiple macros, each having a sink. Placement of the source and macros with the sinks is pre-designed and buffers are placed in branches connecting the source with the multiple sinks. An estimated slack is calculated for each branch, the branches are arranged according to the calculated slack, decoupling buffers are inserted in all branches except the most critical branch(es), the most critical branch(es) are globally routed and slew conditions are fixed within this branch, and at least one next branch is globally routed and slew conditions are fixed therein.
    Type: Application
    Filed: September 24, 2013
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lukas DAELLENBACH, Elmar GAUGLER, Ralf RICHTER
  • Publication number: 20140015051
    Abstract: A method of replacing semiconductor material with metal, Replacement Metal Gate Field Effect Transistors (RMG FETs) and Contacts (RMCs), and Integrated Circuit (IC) chips including the FETs and/or RMCs. A patterned semiconductor layer, e.g., silicon, is formed on a dielectric layer, e.g., a layered gate dielectric. A field dielectric layer fills between shapes in the patterned semiconductor layer. Metal is deposited on the shapes. The wafer is annealed to replace semiconductor in each shape with metal to form metal FET gates or contacts.
    Type: Application
    Filed: September 19, 2013
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kevin K. Chan, Christopher D'Emic, Young-Hee Kim, Dae-gyu Park, Jeng-Bang Yau
  • Publication number: 20140016814
    Abstract: An approach that provides hierarchical and index based watermarks represented as trees is described. In one embodiment, a watermark tree is formed from feature watermarks generated from a natural language processing (NLP) stack having NLP analytics. The watermark tree represents a hierarchical relationship between each of the feature watermarks. In particular, the watermark tree defines hierarchical pointers that point out inherited watermarks that exist between the feature watermarks according to the hierarchical relationship. Further, the watermark tree includes a time stamp specifying a time that a data set content residing in a corpus was accessed.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Aaron K. Baughman, Richard L. Darden, James J. Fan, Aditya A. Kalyanpur
  • Publication number: 20140018038
    Abstract: When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality of positions from which an access code for accessing a mobile device can be selected. Indications of a set of positions of the plurality of positions in a sequence are received. The sequence of the set of the positions form an access code. For at least the first of the set of positions, an aural cue associated with the first position is determined, and the aural cue is emitted to indicate the first position based on the aural cue. It is determined whether the access code is correct. Access to the mobile device is allowed if the access code is correct.
    Type: Application
    Filed: July 12, 2012
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Denise A. Bell, Lisa Seacat DeLuca, Jana H. Jenkins, Trevor Livingston
  • Publication number: 20140020057
    Abstract: A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link.
    Type: Application
    Filed: February 28, 2013
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Judith Helen Bank, Liam Harpur, Ruthie D. Lyle, Patrick Joseph O'Sullivan, Lin Sun
  • Publication number: 20140019854
    Abstract: A system, method and program product for receiving feedback about a document from one or more reviewers includes a step of a computer receives feedback about a document, responsive to input from the one or more reviewers into a user interface. The computer stores the feedback about the document. The computer transmits a notification to an owner of the document that the feedback has been received and stored. Responsive to receiving a request from the owner, the computer opens the document and displays the document with the feedback received. Responsive to input from the owner, the computer changes the document and saves a new version of the document.
    Type: Application
    Filed: July 11, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eugenie L. Alexander, Arthur J. Bariska, JR., Matthew T. Cousens, Eileen S. Kovalchick, Joel L. Masser, Kevin D. McKenzie, Eileen P. Tedesco
  • Publication number: 20140019398
    Abstract: A method for predicting a future situation based on an analysis of at least one predictive pattern. The method comprises monitoring a plurality of events carried out by an event processing component, detecting a predictive pattern predictive of a future situation, selecting one of a plurality of proactive actions and an execution time according to its effect on at least one of a probability of occurrence and a cost of occurrence of the future situation, and outputting the selected proactive action.
    Type: Application
    Filed: July 15, 2012
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Yagil Engel, Zohar Feldman
  • Publication number: 20140019937
    Abstract: Techniques are disclosed for generating and updating product documentation. The techniques include monitoring a script being executed to test the functionality of an application. The script may have one or more tags associated with corresponding tags in documentation associated with the application. The techniques further include capturing, during execution of the script, content items from the application based on the one or more tags of the script and inserting the captured content items into the documentation at locations indicated by the corresponding tags of the documentation.
    Type: Application
    Filed: July 11, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Adam T. Clark, John E. Petri
  • Publication number: 20140019119
    Abstract: Visualizing content change of a data collection over time. A topic may be split into multiple linear, non-overlapping sub-topics along a timeline by satisfying a diverse set of semantic, temporal, and visualization constraints simultaneously. For each derived sub-topic, a set of representative keywords may be automatically selected to summarize the main content of the sub-topic.
    Type: Application
    Filed: March 11, 2013
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shixia Liu, Shimei Pan, Wei Hong Qian, Yangqiu Song, Fei Wang, Michelle X. Zhou
  • Publication number: 20140019807
    Abstract: Embodiments of the present invention provide a method, system and computer program product for predicting transaction server performance failure in a transaction processing environment. In an embodiment of the invention, a method for predicting transaction server performance failure in a transaction processing environment is provided. The method includes receiving a performance metric for a transaction server during nominal operation of the transaction server in memory of a computing system and comparing the performance metric to a benchmark of performance metrics for the transaction server. Thereafter, in response to the performance metric falling outside a threshold variance from the benchmark, an alert is generated of a potential impending failure of the transaction server.
    Type: Application
    Filed: July 12, 2012
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Jim A. Harrison, Rob C. Jones, Phil R. Lee, Andy Wright
  • Publication number: 20140015980
    Abstract: Failover system for video surveillance. A video coverage area for each camera in the system is calculated by combining sensory information and optical specifications of each corresponding camera. The video coverage area information is embedded in a corresponding file of each camera and is used to autonomously re-orient operating cameras to cover a failed coverage area due to a non-operating camera.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Riju Pahwa, Kumar Ravi, Radhakrishnan Sethuraman, Manuel Silveyra
  • Publication number: 20140019682
    Abstract: Various embodiments are provided for saving a log data in a hierarchical storage management system using a disk system as a primary cache with a tape library as a secondary cache. The user data is stored in the primary cache and written into the secondary cache at a subsequent period of time. Blank tapes in the secondary cache is prepared for storing the user data and the log data based on priorities. At least one of the blank tapes is selected for copying the log data and the user data from the primary cache to the secondary cache based on priorities. The log data is stored in the primary cache. The selection of at least one of the blank tapes completely filled with the log data is delayed for writing additional amounts of the user data.
    Type: Application
    Filed: September 17, 2013
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Norie IWASAKI, Koichi MASUDA, Tadaaki MINOURA, Tomokazu NAKAMURA, Takeshi SOHDA, Takahiro TSUDA
  • Publication number: 20140019979
    Abstract: Embodiments of the invention relate to generating automated web task procedures from an analysis of web history logs. One aspect of the invention concerns a method that comprises identifying sequences of related web actions from a web log, grouping each set of similar web actions into an action class, and mapping the sequences of related web actions into sequences of action classes. The method further clusters each group of similar sequences of action classes into a cluster, wherein relationships among the action classes in the cluster are represented by a state machine, and generates automated web task procedures from the state machine.
    Type: Application
    Filed: September 16, 2013
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Saleema A. Amershi, Tessa A. Lau, Jalal U. Mahmud, Jeffrey W. Nichols
  • Publication number: 20140019093
    Abstract: Embodiments relate to reliability testing of a computer system by gradually and automatically increasing a workload of the computer system. A method of testing a computer system includes running a reliability testing program of a computer system by running the computer system under a workload and gradually and automatically increasing the workload over time until a termination condition is detected.
    Type: Application
    Filed: July 16, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Joel L. Masser
  • Publication number: 20140019577
    Abstract: Disclosed is a program for pre-fetching resources. A computer, communicatively coupled to a plurality of client computers and a server computer, identifies a resource, through an examination of one or more HTTP server logs, that is cached on at least one of the plurality of client computers and has been validated by the server computer. The computer determines to pre-fetch the resource based on one or more predefined rules, at least one of the predefined rules including a threshold number of responses validating the resource that must be received by the computer. The computer pre-fetches and caches the resource from the server computer. The computer receives a request for the resource from a client computer that does not have the resource cached. The computer validates resource cached locally and sends the resource to the client computer from the local cache on the computer.
    Type: Application
    Filed: August 9, 2013
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Alwyn R. Lobo, Devaorasad K. Nadgir, Shirish T. Shenvi Kuncolienkar
  • Publication number: 20140019774
    Abstract: A method and system for processing information. An apparatus divides target information into N pieces of divided data using a secret sharing scheme in which a predetermined number (K) of pieces of the N pieces of divided data is required to restore the target information, wherein N>K, and wherein the apparatus is an information processing device or an external storage device. The apparatus selects M pieces from the N pieces, wherein K<M<N. After selecting the M pieces, the M pieces are stored in the external storage device which limits a totality of pieces of the N pieces being stored on the external storage device to the M pieces. After storing the M pieces, the target information is restored from at least K pieces of the N pieces after which D pieces of the M pieces in the external storage device are destroyed, wherein D>M?K.
    Type: Application
    Filed: September 17, 2013
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Kiyotaka Nakayama
  • Publication number: 20140018265
    Abstract: In one embodiment, a biosample storage cartridge includes an enclosure having a same form factor as a data tape cartridge configured for use in an automated tape library; and a holder disposed in the enclosure. In another embodiment, a biosample storage cartridge includes an enclosure and a holder disposed in the enclosure; the holder is configured to receive one or more biosamples, the cartridge is structurally configured to be picked by a picker of an access robot that is configured to pick a data tape cartridge in an automated tape library. In still another embodiment, an analytical system includes a bioanalysis drive configured to perform bioanalysis on one or more biosamples received from at least one biosample storage cartridge.
    Type: Application
    Filed: September 17, 2013
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Allen K. Bates, Nils Haustein, James W. Johnson, Stephen L. Schwartz, Anna W. Topol, Daniel J. Winarski
  • Publication number: 20140016560
    Abstract: Methods and systems for discovery of a set of nodes (20, 30) in a network (165). The method comprises selecting (S11) a node (20) amongst nodes in a group of nodes to be processed; and instructing (S12) to implement a discovery procedure for the selected node. The procedure comprises broadcasting (S22) a neighbor discovery request from a node (20) currently selected on a shared transmission medium (1) of the network; and receiving (S23) at the node (20) currently selected replies sent (S34) by neighbor nodes on the shared transmission medium and adding (S13) the neighbor nodes to the group of nodes to be processed; and repeating (S14) the steps of selecting and instructing for other nodes (30) in the group of nodes to be processed, until all nodes of the set are discovered.
    Type: Application
    Filed: March 12, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Urs Hunkeler, Hong Linh Truong, Clemens Lombriser
  • Publication number: 20140016226
    Abstract: Provided are a computer program product, system, and method for determining a skew error signal (SES) offset used to determine an SES to adjust heads in a drive unit. A determination is made of a first difference in a first orientation with respect to a direction of movement of the recordable storage media based on first and second position information read by first and second servo read elements on a first head. A determination is made of a second difference in a second orientation with respect to the direction of movement of the recordable storage media based on third and fourth position information read by the first servo read element and a third servo read element on a second head. An offset, calculated based on the determined first and second difference, is used to generate an error signal to adjust the first and second heads.
    Type: Application
    Filed: July 10, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nhan X. Bui, Angeliki Pantazi, Tomoko Taketomi, Kazuhiro Tsuruta