IBM Patent Applications

IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140310465
    Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include defining, in a storage system including receiving, by a processor, metadata describing a first cache configured as a master cache having non-destaged data, and defining, using the received metadata, a second cache configured as a backup cache for the master cache. Subsequent to defining the second cache, the non-destaged data is retrieved from the first cache, and the non-destaged data is stored to the second cache.
    Type: Application
    Filed: April 16, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David D. CHAMBLISS, Ehood GARMIZA, Leah SHALEV
  • Publication number: 20140307938
    Abstract: A technique for generating a representative image representing a case and radiographic interpretation information for each case includes calculating wavelet features of a plurality of images that have been taken and stored in the past. The calculated wavelet features and extracted keywords are stored in association with the stored images. The stored images are classified on the basis of the extracted keywords to generate a plurality of groups. For each of the generated groups, a centroid vector of wavelet feature-based feature vectors of respective images corresponding to the keywords is calculated and a spatial distance between the calculated centroid vector and each of the wavelet feature-based feature vectors is calculated. For each of the groups, the image for which the calculated spatial distance is the shortest and the radiographic interpretation information associated with the image is stored as a representative image of that group.
    Type: Application
    Filed: September 20, 2012
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Munehhiro Doi, Yumi Mori, Hiroki Nakano
  • Publication number: 20140310796
    Abstract: A multiple inspection avoidance (MIA) technique is implemented in a virtualized environment. Preferably, the technique is implemented in a packet processing unit (PPU) and takes advantage of a protection scope determined in an automated manner. The protection scope may be MAC-based. The MIA technique ensures that the same packet is not inspected more than once by a same packet processing unit (PPU), and that the same packet is not inspected more than once by different PPUs. According to this disclosure, when a PPU implementing MIA receives a packet, it uses the protection scope to determine whether it needs to process the packet. Preferably, the determination of whether to process the packet depends on the source and destination addresses in the packet, whether those addresses are being protected by the PPU that receives the packet, the direction of the packet flow, and optionally one or more packet processing rules.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Cheng-Ta Lee, Jeffrey Lawrence Douglass, Deepti Sachdev
  • Publication number: 20140306274
    Abstract: A FinFET structure which includes a bulk semiconductor substrate; semiconductor fins extending from the bulk semiconductor substrate, each of the semiconductor fins having a top portion and a bottom portion such that the bottom portion of the semiconductor fins is doped and the top portion of the semiconductor fins is undoped; a portion of the bulk semiconductor substrate directly underneath the plurality of semiconductor fins being doped to form an n+ or p+ well; and an oxide formed between the bottom portions of the fins.
    Type: Application
    Filed: August 30, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Veeraraghavan S. Basker, Effendi Leobandung, Tenko Yamashita, Chun-Chen Yeh
  • Publication number: 20140306286
    Abstract: A tapered fin field effect transistor can be employed to provide enhanced electrostatic control of the channel. A stack of a semiconductor fin and a dielectric fin cap having substantially vertical sidewall surfaces is formed on an insulator layer. The sidewall surfaces of the semiconductor fin are passivated by an etch residue material from the dielectric fin cap with a tapered thickness profile such that the thickness of the etch residue material decreased with distance from the dielectric fin cap. An etch including an isotropic etch component is employed to remove the etch residue material and to physically expose lower portions of sidewalls of the semiconductor fin. The etch laterally etches the semiconductor fin and forms a tapered region at a bottom portion. The reduced lateral width of the bottom portion of the semiconductor fin allows greater control of the channel for a fin field effect transistor.
    Type: Application
    Filed: April 10, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Josephine B. Chang, Michael A. Guillorn, Chung-Hsun Lin, Ryan M. Martin, Jeffrey W. Sleight
  • Publication number: 20140310694
    Abstract: A computer captures a thread state data of a first program. The computer generates a second program by applying a first program patch to the first program. The computer inserts additional code into a source code of the second program. The computer executes a first performance test using the second program and the inserted additional code. The computer monitors a first status of the second program and the inserted additional code that are under the first performance test. The computer determines a degree that a first deadlock state was prevented during the first performance test. The computer generates a first message based, at least in part, on the determined degree that the first deadlock state was prevented during the first performance test.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: David Granshaw, Samuel T. Massey, Daniel J. McGinnes, Martin A. Ross, Richard G. Schofield, Craig H. Stirling
  • Publication number: 20140310763
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network. The computer determines a current operating environment corresponding to the one or more identified local computers. The computer determines a current security value for the current operating environment corresponding to identities and security of the identified local computers. The computer identifies data corresponding to the current operating environment, the data corresponding to a current time period of the current operating environment.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul B. French, Jack Healy, Niall J. Lucey, Michael Truss
  • Publication number: 20140310814
    Abstract: Identifying security vulnerabilities related to inter-process communications by identifying within the instructions of a computer software application an object creation location configured to create an inter-process communications object, identifying within the instructions of the computer software application a location of an inter-process communications method, determining whether a path exists for an inter-process communications object created at the object creation location to propagate to the inter-process communications method, classifying with a classification selected from a plurality of predefined classifications, any of the inter-process communications object, the object creation location, and the location of the inter-process communications method, and reporting as a security vulnerability the classified inter-process communications object, object creation location, or location of the inter-process communications method if the path exists and if the classification is predefined to indicate that re
    Type: Application
    Filed: March 26, 2014
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Roee Hay, Omri Weisman
  • Publication number: 20140304975
    Abstract: A method comprises engaging hinge members on a first housing portion with hinge members on a second housing portion so that the first and second housing portions are pivotally engaged in an open position. The first housing portion includes a first cover securing a first server and a first bezel portion secured along a proximal end of the first housing portion, and the second housing portion includes a second cover securing a second server and a second bezel portion secured along a proximal end of the first housing portion. The method further comprises pivoting the first housing portion relative to the second housing portion about a pivot axis of the hinge members until the first and second housing portions are in a closed position forming a common housing with the first server facing the second server. The first and second housing portions are then latched in the closed position.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Michael D. French, JR., Edward J. McNulty, Glenn E. Myrto
  • Publication number: 20140310220
    Abstract: Embodiments of the invention provide electronic synapse devices for reinforcement learning. An electronic synapse is configured for interconnecting a pre-synaptic electronic neuron and a post-synaptic electronic neuron. The electronic synapse comprises memory elements configured for storing a state of the electronic synapse and storing meta information for updating the state of the electronic synapse. The electronic synapse further comprises an update module configured for updating the state of the electronic synapse based on the meta information in response to an update signal for reinforcement learning. The update module is configured for updating the state of the electronic synapse based on the meta information, in response to a delayed update signal for reinforcement learning based on a learning rule.
    Type: Application
    Filed: December 30, 2010
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Leland Chang, Dharmendra S. Modha, Robert K. Montoye
  • Publication number: 20140310069
    Abstract: Embodiments of the present invention provide a method, system and computer program product for an integrated business rules management system (BRMS) and mixed integer programming (MIP) technology application deployment. In an embodiment of the invention, a method of rules processing with MIP constraints can include selecting candidate rules from amongst a set of rules in a rules engine executing in memory of a computer and reducing the candidate rules to rules in a conflict set according to constraints specified in the candidate rules. The method also can include conflict resolving the rules in the conflict set and generating an agenda for the rules of the conflict set. Finally, the method can include adding constraints specified in the rules of the conflict set to working memory of the rules engine and applying the rules in the conflict set in agenda order to the working memory.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Vincent Beraudier, Philippe Couronne, Georges-Henri Moll
  • Publication number: 20140307389
    Abstract: Cooling apparatuses and methods of fabrication thereof are provided which facilitate cooling a multi-component assembly, such as a hub module assembly. The cooling apparatus includes a first liquid-cooled heat sink configured to facilitate removal of heat generated by one or more first electronic components of the multi-component assembly, and a second liquid-cooled heat sink configured to facilitate removal of heat generated by one or more second electronic components of the multi-component assembly. The first liquid-cooled heat sink is separably coupled to the multi-component assembly, and the second liquid-cooled heat sink is fixedly secured to the multi-component assembly. Fluid couplers fluidically couple the first and second liquid-cooled heat sinks to facilitate liquid coolant flow through the fixedly-secured, second liquid-cooled heat sink from the separably-coupled, first liquid-cooled heat sink.
    Type: Application
    Filed: April 15, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20140310565
    Abstract: A processor-implemented method for determining scan compression ratio based on fault density is provided. The processor-implemented method may include calculating, by a processor, a fault density value for each of a plurality of partitions of an integrated circuit. The fault density is computed by the processor based on a ratio of a total number of faults per partition to a total number of flip-flops per partition. The processor-implemented method further includes the processor determining a compression ratio for each of the plurality of partitions based on the fault density value for each of the plurality of partitions and applying the compression ratio to each of the plurality of the partitions of the integrated circuit.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20140308004
    Abstract: An apparatus for optical coupling comprises a substrate, a first waveguide formed on the substrate and includes a grating structure directing light in a first direction, and a second waveguide formed on the first waveguide and including an angled portion directing the light in a second direction different from the first direction.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Fuad E. Doany, Frank R. Libsch, Jeonghwan Song
  • Publication number: 20140310338
    Abstract: A server can efficiently distribute images for a web page as groups of images. The server receives a request from a client for a group of images associated with a web page. The request encodes an image group identifier and a retrieving function. The server executes the retrieving function with the image group identifier to obtain the group of images. In response to the request, the group of images are transmitted over a number of data communication connections between the client and the server that are less than a number of images in the group of images.
    Type: Application
    Filed: May 28, 2014
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Hung T. Dinh, Mansoor A. Lakhdhir, Phong A. Pham
  • Publication number: 20140307969
    Abstract: A computer-implemented method for automating interaction with a computer system includes linking a control computer system to an input interface and to an output interface of a client computer system, which is operative for producing user interface images on a display device. The control computer system executes distinct software modules that include a virtual operator for simulating actions of a human operator. Execution of the software modules causes the control computer system to capture an image from the output interface, and to recognize information in the image. In response to the information, the virtual operator controls an input device to automatically execute predetermined operations on the client computer system via the input interface.
    Type: Application
    Filed: June 2, 2014
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Amir Geva, Eugene Walach
  • Publication number: 20140310061
    Abstract: One embodiment of the invention, directed to a computer implemented method in a computer system comprising at least one component, includes the step of responsive to detecting a problem in the system, generating a set of crowdsourcing tasks for analyzing a first possible cause of the detected problem. The method further includes the steps of assigning the set of crowdsourcing tasks to one or more selected crowdsourcing experts, and using information derived at least in part from task results provided by one or more crowdsourcing experts to compute a problem completeness (PC) index. Responsive to determining that the first possible cause is not the root cause of the detected problem, the PC Index is used to determine whether to assign one or more additional crowdsourcing tasks to any crowdsourcing experts.
    Type: Application
    Filed: April 15, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark A. Carmichael, Emi K. Olsson, Larisa Shwartz, Maja Vukovic
  • Publication number: 20140310125
    Abstract: A computer receives a first set of geographic restrictions on the sale of an item from a seller. The computer receives an offer for purchase of the item from a buyer, wherein the offer includes geographic information of the buyer. The computer determines whether the geographic information of the buyer satisfies the first set of geographic restrictions on the sale of the item. Based on the determination of whether the geographic information of the buyer satisfies the first set of geographic restrictions on the sale of the item, the computer determines whether to transmit the offer for purchase of the item to the seller.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Divya Gopinath, Rajesh Radhakrishnan, Jennifer A. Watson
  • Publication number: 20140310818
    Abstract: Systems and articles of manufacture for execution-based license discovery and optimization include collecting execution information for one or more software processes on one or more servers in an operating system, mapping the collected execution information for the one or more software processes to one or more software products, determining usage of a software product in the operating system based on the mapping of the collected execution information for the one or more software processes to one or more software products, and identifying one or more software product license optimization opportunities based on a comparison of the determined usage of the software product in the operating system and an indication of all installations of the software product in the operating system.
    Type: Application
    Filed: August 19, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Han Chen, Nicholas Fuller, Liangzhao Zeng, Zhe Zhang
  • Publication number: 20140310547
    Abstract: A system, method, and/or computer program product comprises an input/output (I/O) bus and an intelligent current bank that couples a voltage source to the I/O bus. The intelligent current bank includes an ammeter that measures a real-time flow of current to the I/O bus. In response to the current to the I/O bus exceeding a predetermined level, an intelligent Pulse-Width Modulator (iPWM) within the intelligent current bank selectively decreases current to one or more electronic devices on the I/O bus by shortening a duty cycle of voltage being received by the iPWM from the voltage source.
    Type: Application
    Filed: April 17, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPPORATION
  • Publication number: 20140307386
    Abstract: A blade server comprises first and second housing portions. Each housing portion includes a cover securing a first printed circuit board assembly, two sides extending from the cover, a bezel portion secured along a proximal end of the cover between the two sides, a first hinge member formed near the proximal end of one side, and a second hinge member formed near the proximal end of the other side. The hinge members on the first housing portion are selectively engagable with the hinge members on the second housing portion to enable the housing portions to pivot between an open position and a closed position with the first and second printed circuit board assemblies disposed between the first and second housing portions.
    Type: Application
    Filed: April 10, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Michael D. French, Jr., Edward J. McNulty, Glenn E. Myrto
  • Publication number: 20140310214
    Abstract: A method, computer program product and system for reconciling a plurality of surprisal data sets of a genetic sequence of an organism being generated from a surprisal data reference genome using a base reference genome. If the base reference genome is not the surprisal data reference genome indicated in the surprisal data set, the surprisal data reference genome is retrieved and compared to the base reference genome to obtain reference genome differences. If a starting location of an instance of the surprisal data set is present in the reference genome differences, the nucleotides of the instance of the surprisal data are compared to the nucleotides of the reference genome difference. If the nucleotides of the instance of the surprisal data are the same as the nucleotides of the reference genome difference, the instance of surprisal data is removed from the surprisal data set.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer, Josko Silobrcic
  • Publication number: 20140310517
    Abstract: The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information.
    Type: Application
    Filed: September 12, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: MIHAI CHRISTODORESCU, XIN HU, DOUGLAS L. SCHALES, REINER SAILER, MARC PH. STOECKLIN, TING WANG, ANDREW M. WHITE
  • Publication number: 20140310688
    Abstract: A computer accesses a stack data and a source code of a program. The computer searches for a first change made to the program, wherein the first change is one of a change to a method of the program, a change to a class of the program, a change to a method that is invoked by the program, or a change to a class containing a method that is invoked by the program. The computer identifies the first change that was made to the program and determines the probability that the identified first change caused one or both of an error and a regression. The computer generates a ranked list of identified changes based, at least in part, on the probability that the identified first change caused one or both of an error and a regression.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: David Granshaw, Samuel T. Massey, Daniel J. McGinnes, Martin A. Ross, Richard G. Schofield, Craig H. Stirling
  • Publication number: 20140310812
    Abstract: Identifying security vulnerabilities related to inter-process communications by identifying within the instructions of a computer software application an object creation location configured to create an inter-process communications object, identifying within the instructions of the computer software application a location of an inter-process communications method, determining whether a path exists for an inter-process communications object created at the object creation location to propagate to the inter-process communications method, classifying with a classification selected from a plurality of predefined classifications, any of the inter-process communications object, the object creation location, and the location of the inter-process communications method, and reporting as a security vulnerability the classified inter-process communications object, object creation location, or location of the inter-process communications method if the path exists and if the classification is predefined to indicate that re
    Type: Application
    Filed: April 10, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Roee Hay, Omri Weisman
  • Publication number: 20140310455
    Abstract: A method for ensuring compliance of service levels corresponding to file-system operations in a deduplicated, tiered storage system comprising storage devices of varying performance levels, each of the performance levels being associated with at least one service level, includes performing a deduplication remapping operation so that a data item corresponding to a higher service level, is stored as an original on a higher performance storage tier while duplicates of the data item corresponding to a lower service level exist in lower performance storage tier at least in part as pointers to the data item on the higher performance storage tier.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Duane M. Baldwin, Sasikanth Eda, Deepak R. Ghuge, John T. Olson, Sandeep R. Patil
  • Publication number: 20140310040
    Abstract: One embodiment of the invention, directed to a computer implemented method in a computer system comprising at least one component, includes the step of responsive to detecting a problem in the system, generating a set of crowdsourcing tasks for analyzing a first possible cause of the detected problem. The method further includes the steps of assigning the set of crowdsourcing tasks to one or more selected crowdsourcing experts, and using information derived at least in part from task results provided by one or more crowdsourcing experts to compute a problem completeness (PC) index. Responsive to determining that the first possible cause is not the root cause of the detected problem, the PC Index is used to determine whether to assign one or more additional crowdsourcing tasks to any crowdsourcing experts.
    Type: Application
    Filed: August 17, 2013
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark A. Carmichael, Emi K. Olsson, Larisa Shwartz, Maja Vukovic
  • Publication number: 20140306322
    Abstract: A semiconductor structure, method of manufacturing the same and design structure thereof are provided. The semiconductor structure includes a substrate including a semiconductor layer and a plurality of TSVs embedded therein. At least one TSV has a TSV tip extending from a backside surface of the substrate. The semiconductor structure further includes a multilayer metal contact structure positioned on the backside surface of the substrate. The multilayer metal contact structure includes at least a conductive layer covering the backside surface of the substrate and covering protruding surfaces of the TSV tip. The conductive layer has a non-planar first surface and a substantially planar second surface opposite of the first surface.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Robert D. Edwards, Jeffrey P. Gambino, Charles F. Musante, Ping-Chuan Wang
  • Publication number: 20140310789
    Abstract: Embodiments described herein provide approaches for user access control to a secured application. Specifically, a custom authentication tool is configured to intercept a request from a user for access to a secured application and override one or more default requirements (e.g., application pre-registration, for accessing the application). That is, when credentials of the user are received at the authentication tool, they are verified against data within a user directory to generate a user profile, which is then provided to the secured application to satisfy the requirements for granting access to the user. As such, the secured application's requirements are met, yet users do not have to manually pre-register to obtain access because the registration is performed in the background by the authentication tool.
    Type: Application
    Filed: April 15, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gautam Majumdar, Tarun K. Saha, Michael Q. Wang
  • Publication number: 20140307555
    Abstract: In one embodiment, a system includes an initiator port adapted to receive a traffic flow having a plurality of packets and a hardware processor and logic integrated with and/or executable by the processor, the logic being adapted to classify the traffic flow into a traffic class based on at least one criteria related to the traffic flow, the traffic class being selected from a plurality of traffic classes and transmit one or more packets of the traffic flow to a target port designated by the one or more packets of the traffic flow until an amount of flow credits allocated to the target port is insufficient to service additional packets. Other systems, methods, and computer program products for providing credit-based flow control are described in more embodiments.
    Type: Application
    Filed: April 15, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Casimer M. DeCusatis, Mircea Gusat, Keshav G. Kamble, Cyriel J. Minkenberg
  • Publication number: 20140310588
    Abstract: An approach is provided for managing a display of a keyword search result. The search for the keyword on a web page includes identifying first Document Object Model (DOM) element(s) including a subset of DOM element(s) that include the keyword. Based on preference(s), second DOM element(s) are identified, which are unrelated to the subset of DOM element(s). Based on the preference(s), styles of the first and second DOM element(s) are modified to generate a display of the search result that includes content of the web page specified by the first DOM element(s), and that (1) does not include other content of the web page specified by the second DOM element(s) or (2) emphasizes the content specified by the first DOM element(s) over the other content specified by the second DOM element(s), in accordance with the modified styles.
    Type: Application
    Filed: April 10, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Lisa Seacat DeLuca, Robert R. Peterson
  • Publication number: 20140308771
    Abstract: Micro-Electro-Mechanical System (MEMS) structures, methods of manufacture and design structures are disclosed. The method includes forming a Micro-Electro-Mechanical System (MEMS) beam structure by venting both tungsten material and silicon material above and below the MEMS beam to form an upper cavity above the MEMS beam and a lower cavity structure below the MEMS beam.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Michael T. Brigham, Christopher V. Jahnes, Cameron E. Luce, Jeffrey C. Maling, William J. Murphy, Anthony K. Stamper, Eric J. White
  • Publication number: 20140310668
    Abstract: To assist verification of a digital circuit design, a data processing system presents, within a graphical user interface of a display device, a presentation including a plurality of verification notifications arising from verification of a digital circuit design. The data processing system detects one or more user operations by which a user interacts with the plurality of verification notifications utilizing one or more user input devices and stores, in a memory, user operation information regarding the one or more user operations detected by the data processing system. The data processing system determines, based on said user operation information, a recommended subsequent user operation and presents, within the graphical user interface, an indication of the recommended subsequent user operation.
    Type: Application
    Filed: February 27, 2014
    Publication date: October 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CARSTEN GREINER, GERRIT KOCH, JUERGEN RUF, KEN WERNER
  • Publication number: 20140306290
    Abstract: In one aspect, a method for fabricating an electronic device includes the following steps. A wafer is provided having at least one first active area and at least one second active area defined therein. One or more p-FET/n-FET devices are formed in the active areas, each having a p-FET/n-FET gate stack and p-FET/n-FET source and drain regions. A self-aligned silicide is formed in each of the p-FET/n-FET source and drain regions, wherein the self-aligned silicide in each of the p-FET source and drain regions has a thickness T1 and the self-aligned silicide in each of the n-FET source and drain regions having a thickness T2, wherein T1 is less than T2. During a subsequent trench silicidation in the p-FET/n-FET source and drain regions, the trench silicide metal will diffuse through the thinner self-aligned silicide in the p-FET device(s) but not through the thicker self-aligned silicide in the n-FET device(s).
    Type: Application
    Filed: April 11, 2013
    Publication date: October 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Emre Alptekin, Siyuranga O. Koswatta, Christian Lavoie, Ahmet S. Ozcan, Kathryn T. Schonenberg, Paul M. Solomon, Zhen Zhang
  • Publication number: 20140301140
    Abstract: Methods and apparatuses for reduction of Read Disturb errors in a memory system utilizing modified or extra memory cells.
    Type: Application
    Filed: May 19, 2014
    Publication date: October 9, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles J. Camp, Holloway H. Frost
  • Publication number: 20140304548
    Abstract: A method for servicing a redundant array of independent storage drives (i.e., RAID) includes performing a service call on the RAID by performing the following steps: (1) determining whether the RAID includes one or more consumed spare storage drives; (2) in the event the RAID includes one or more consumed spare storage drives, physically replacing the one or more consumed spare storage drive with one or more non-consumed spare storage drives; and (3) initiating a copy process that copies data from a storage drive that is predicted to fail to a non-consumed spare storage drive associated with the RAID. The service call may then be terminated. After the service call is terminated, the method waits for an indication that a number of non-consumed spare storage drives in the RAID has fallen below a selected threshold. A corresponding apparatus and computer program product are also disclosed.
    Type: Application
    Filed: April 3, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Raymond Steffan, Michael Thomas Benhase, Volker Michael Kiemes
  • Publication number: 20140304396
    Abstract: A computer-implemented method for prediction of required number of server computing systems for future computing workload is provided. The computer implemented method comprises connecting a portion of a plurality of server computing systems of a data center. The computer-implemented method further comprises computing at least one server computing system of each of a class I server computing system, a class S server computing system, and a class R server computing system of the plurality of the server computing systems based on a deployment rate, an undeployment rate, and a removing rate of the each of the class I server computing system, the class S server computing system, and the class R server computing system.
    Type: Application
    Filed: February 7, 2014
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gianluca Della Corte, Alessandro Donatelli, Stefano Proietti, Antonio M. Sgro
  • Publication number: 20140304434
    Abstract: A method for continuous data transfer when a USB mass storage device is disconnected and reconnected is provided. The method may include monitoring state information from one or more mass storage devices, using a software driver to detect a change in state of the mass storage device on the computer. Active I/O transfers using the USB mass storage device are paused when the software driver detects that the USB mass storage device is detached from the computer. A configurable timer is started. The software drive may detect the attaching of a USB device. If, prior to the expiration of the timer, the software driver verifies that the USB mass storage device is the same that was previously attached to the computer, active I/O transfers are continued.
    Type: Application
    Filed: April 8, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Phani K. Ayyagari, Purnachandra R. Jasti, Sudhir Maddali, Madhusudana R. Thanugundala
  • Publication number: 20140299473
    Abstract: A system of controlled translocation of macromolecules by gel electrophesis employs a funnel nanopore structure. A graphene portion is attached to a porous material layer including funnel-shaped pores such that the graphene portion blocks the side of the porous material layer having openings for smaller pores. A pair of electrical contacts is formed on the graphene portion. A dielectric material layer may be deposited to hold the graphene portion in place. A nanoscale hole is formed through the dielectric material layer and the graphene portion to provide a smallest opening in a funnel nanopore structure. The funnel nanopore structure is placed within a capsule configured for gel electrophoresis. A linear chain of molecules can pass through a funnel-shaped pore and the nanoscale hole during the gel electrophoresis. A graphene nanopore detector allows measurement of blockage current for sufficient resolution of base pairs in DNA's.
    Type: Application
    Filed: September 10, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventor: George F. Walker
  • Publication number: 20140300483
    Abstract: Methods and apparatus are provided for self-detection of lost device status using device-to-device communications with one or more expected neighboring devices. A device can detect when the device itself is lost, by determining one or more expected neighboring devices for one or more time periods; monitoring a local environment for one or more of the expected neighboring devices using device-to-device communication; detecting when the device is lost based on device-to-device communication and whether a threshold criteria of the expected neighboring devices in proximity to the device for a given interval of time; and sending at least one relay message to notify an owner of the lost device. The threshold criteria comprises, e.g., whether a minimum number of expected neighboring devices are nearby or whether at least one fixed neighboring device is nearby. The device-to-device communications employ one or more of short range relay communications and low-power mesh communications.
    Type: Application
    Filed: August 16, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shang Q. Guo, Canturk Isci, Jonathan Lenchner, Maharaj Mukherjee, Emmanuel Tong-Viet
  • Publication number: 20140304428
    Abstract: Delay commands are injected into sequential input/output (I/O) requests and the effects of the injected delay commands are measured for determining whether a storage system handling the sequential input/output (IO) requests is causing a bottleneck.
    Type: Application
    Filed: April 9, 2013
    Publication date: October 9, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan FISCHER-TOUBOL, Omer HAKLAY, Nir MILSTEIN, Ori SHALEV
  • Publication number: 20140304566
    Abstract: An approach for saving power in a memory subsystem that uses memory access idle timer to enable low power mode and memory scrub operation within computing system has been provided. The computing system determines that a memory subsystem is switched out of low power operation mode due to a memory scrub operation. In addition, the computing system bypasses the low power operation mode of an idle timer of the memory subsystem such that the memory subsystem is returned to the low power operation mode upon completion of the memory scrub operation. The computing system further sets a scrub flag of the memory subsystem to a high state, and clears the scrub flag to a low state to track if the idle timer should be bypassed.
    Type: Application
    Filed: January 9, 2014
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Joab D. Henderson, Richard Nicolas, Stephen J. Powell, Kenneth L. Wright
  • Publication number: 20140304340
    Abstract: A method and system for breaking a communications thread on a communications system includes monitoring a communications system having a plurality of users. An initial communications thread is identified between two or more of the plurality of users on the communications system. The initial communications thread is broken based on a criteria. The criteria includes a user initiated break wherein a user selectively breaks the initial communications thread. New communications threads are generated from the break in the initial communications thread which include, a first thread including communications before the break and a second thread including communications after the break. A link may be generated in each of the first and second threads referring to the other thread such that the initial communications thread is reconstituted when either of the links are selected.
    Type: Application
    Filed: April 8, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Geetika T. Lakshmanan, Michael Muller
  • Publication number: 20140299922
    Abstract: A device structure for detecting partial pressure of oxygen in blood includes a semiconductor substrate including a source region and a drain region. A multi-layer gate structure is formed on the semiconductor substrate. The multi-layer gate structure includes an oxide layer formed over the semiconductor substrate, a high-k layer formed over the oxide layer, a metal gate layer formed over the high-k layer, and a polysilicon layer formed over the metal gate layer. A receiving area holds a blood sample in contact with the multi-layer gate structure. The high-k layer is exposed to contact the blood sample in the receiving area.
    Type: Application
    Filed: August 20, 2013
    Publication date: October 9, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHEN SHI, STEVEN E. STEEN, YANFENG WANG, SUFI ZAFAR
  • Publication number: 20140304677
    Abstract: Provided herein are approaches to re-factor, rationalize, and prioritize a service model, and to assess service exposure in the service model. At least one approach provides: determining a granularity of one or more services of the service model; re-factoring and refining a service portfolio and a hierarchy of the service model; adapting a Service Litmus Test (SLT) and service exposure scope to the service model; applying Service Litmus Tests (SLTs) to the service model; and verifying, with each affected stakeholder associated with the service model, that the service model achieves business and technical needs based on the results of the SLTs, which include tests to make exposure decisions, including whether to expose the service or not expose the service, wherein the service represent business capabilities and are placed in the hierarchy of the service model which represents the granularity.
    Type: Application
    Filed: April 16, 2014
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Abdul Allam, Ali P. Arsanjani, Shuvanker Ghosh, Kerrie L. Holley
  • Publication number: 20140304304
    Abstract: A mechanism is provided for creating modules from an XML schema. The mechanism includes creating a syntax tree from a sample XML fragment of the XML schema, creating a module with a list of parameters based on the syntax tree, identifying variable pieces of information in the syntax tree to be inserted in the list of parameters with a variable sign, and inserting the variable information into the list of parameters. The mechanism includes inserting another module in the syntax tree of the module, in which the other module corresponds to another sample XML fragment and has another list of parameters, and identifying the other module with the variable sign in the syntax tree of the module. The mechanism includes inserting the other module into the list of parameters of the module in which the other module to serve as a parameter, and providing an option for constraining the module.
    Type: Application
    Filed: April 8, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Joshua W. Hui, Sarah E. Knoop, Peter M. Schwarz, John T. Timm
  • Publication number: 20140303970
    Abstract: An acoustic model adaptation system includes a memory device and a model selector engine coupled to the memory device. The model selector engine is configured to compile information of environmental conditions to identify a current speech environment for audio input into a speech recognizer on a device. The model selector engine is further configured to compare the information of the environmental conditions with profiles of acoustic models. Each profile associates with an acoustic model. Each acoustic model compensates for background noise or acoustical distortions of the audio input. The model selector engine is further configured to select a first acoustic model for the speech recognizer based on the information of the environmental conditions exclusive of audio input from the user.
    Type: Application
    Filed: April 5, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Denise A. Bell, Lisa Seacat DeLuca, Jana H. Jenkins, Jeffrey A. Kusnitz
  • Publication number: 20140304484
    Abstract: Storing defined presets for configuration of a storage controller may include providing a storage controller interface to define a preset associated with an action of the storage controller; receiving preset parameter values for the preset via the interface; validating the preset parameter values to check that the preset is valid; storing the preset within the storage controller, and creating one or more preset objects from the preset, the preset object being accessible by the storage controller at run time. The preset may include a human-readable name; an action name indicating to which associated storage controller action the preset applies, and a set of parameter name-value pairs.
    Type: Application
    Filed: March 17, 2014
    Publication date: October 9, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John M. Clifton, Matthew J. Fairhurst, Colin R. Jewell, James Mulcahy
  • Publication number: 20140304224
    Abstract: For replicating a source storage system, a scan module generates a source storage server description for each source storage server of the source storage system from a scan of the source storage system. The source storage server description includes a replication type and a source volume record for each source logical volume of the source storage server. A provision module determines a number of replicated instances of each source logical volume for a target storage system from the replication type. In addition the provision module generates a target storage server description for each target storage server of the target storage system from each source storage server description in response to the target storage system satisfying a target storage requirement.
    Type: Application
    Filed: April 9, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Marina V. Lopez, Khang N. Nguyen, David C. Reed, Max D. Smith
  • Publication number: 20140304573
    Abstract: In a data processing system, a memory subsystem detects whether or not at least one potentially transient condition is present that would prevent timely servicing of one or more memory access requests directed to the associated system memory. In response to detecting at least one such potentially transient condition, the memory system identifies a first read request affected by the at least one potentially transient condition. In response to identifying the read request, the memory subsystem signals to a request source to issue a second read request for the same target address by transmitting to the request source dummy data and a data error indicator.
    Type: Application
    Filed: April 4, 2013
    Publication date: October 9, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JOHN S. DODSON, BENJIMAN L. GOODMAN, GUY L. GUTHRIE, ERIC E. RETTER, WILLIAM J. STARKE, JEFFREY A. STUECHELI