IBM Patent Applications

IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140268987
    Abstract: A technique is provided for a thermally assisted magnetoresistive random access memory device. The device has a synthetic antiferromagnetic layer disposed on an antiferromagnetic layer. The synthetic antiferromagnetic layer has a first ferromagnetic storage layer, a non-magnetic coupling layer disposed on the first ferromagnetic storage layer, and a second ferromagnetic storage layer disposed on the non-magnetic coupling layer. A non-magnetic tunnel barrier is disposed on the second ferromagnetic storage layer, and a ferromagnetic sense layer is disposed on the non-magnetic tunnel barrier. A first ferromagnetic critical temperature of the first ferromagnetic storage layer is higher than an antiferromagnetic critical temperature of the antiferromagnetic layer, is higher than a second ferromagnetic critical temperature of the second ferromagnetic storage layer, and is higher than a third ferromagnetic critical temperature of the ferromagnetic sense layer.
    Type: Application
    Filed: August 20, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Anthony J. Annunziata, Philip L. Trouilloud, Daniel Worledge
  • Publication number: 20140269742
    Abstract: Method, computer program product, and system to assist in distribution of packets between a plurality of switch elements in a distributed switch, by monitoring an attribute of each of the plurality of switch elements including a first switch element and a first surrogate switch element, the first surrogate switch element in a first level of a hierarchy and configured using a default hierarchy configuration, the default hierarchy configuration forwarding a data frame to at least one of: a destination switch element of the data frame, and a second surrogate switch element, the second surrogate switch element in a second hierarchy level; computing a score, based on the monitored attribute, for each of the switch elements; and upon determining the score of the first switch element is greater than the score of the first surrogate switch element, designating the first switch element as the first surrogate switch element.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David A. Christenson, Josep Cors, Ward R. Nelson, Jun C. Yin
  • Publication number: 20140280539
    Abstract: Methods, apparatuses, and computer program products for dynamically managing social networking groups according to embodiments of the present invention are provided. A particular embodiment includes detecting a predetermined number of user devices within a specified physical area; and in response to detecting the predetermined number of user devices within the specified physical area, creating a social networking group corresponding to the specified physical area. Another embodiment includes detecting a predetermined number of user devices exiting a specified physical area, each user device associated with a user belonging to a social networking group corresponding to the specified physical area; and in response to detecting the predetermined number of user devices exiting the specified physical area, destroying the social networking group after a duration following the detection of the predetermined number of users of the social networking group exiting the specified physical area.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alfredo Aldereguia, Jeffrey R. Hamilton, Clifton E. Kerr, Grace A. Richter
  • Publication number: 20140279980
    Abstract: Arrangements described herein relate to managing versions of artifacts stored across disparate tools. In a multi-dimensional configuration space, dimensions can be defined. The dimensions can represent respective variations of respective versions of a plurality of artifacts for at least a first configuration of a system. Via the dimensions, versions of the plurality of artifacts can be mapped to at least a corresponding first configuration of the system, the mapped versions of the plurality of artifacts corresponding to the versions of the artifacts used in the first configuration. The first configuration can be identified by a point in the multi-dimensional configuration space defined by the respective dimensions. At least a first of the plurality of artifacts can be stored by a first tool, and at least a second of the plurality of artifacts can be stored by a second tool disparate from the first tool.
    Type: Application
    Filed: March 31, 2014
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Geoffrey M. Clemm, Nicholas D.J. Crossley, Daniel D.J. Leroux, Schuyler B. Matthews, Martin P. Nally, Darcy L. Wiborg Weber
  • Publication number: 20140266406
    Abstract: A method and system to control crosstalk among qubits on a chip are described. The method includes placing two or more components symmetrically on the chip, the chip including the qubits, and driving two or more ports symmetrically to control the crosstalk based on controlling coupling of chip mode frequencies and qubit frequencies.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: International Business Machines Corporation
  • Publication number: 20140264746
    Abstract: A capacitor and method for fabricating the same. In one configuration, the capacitor has a silicon substrate, a first and a second silicon dioxide layer over the silicon substrate, and silicon nitride fins between the silicon dioxide layers. The capacitor further includes a dielectric layer over the silicon nitride fins and metal vias in the dielectric layer.
    Type: Application
    Filed: September 25, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kangguo Cheng, Bruce B. Doris, Pouya Hashemi, Ali Khakifirooz, Alexander Reznicek
  • Publication number: 20140281347
    Abstract: Profile properties in a partition profile are user-configurable through a management entity such as a management console. A partition manager calculates a secondary processing unit entitlement for a logical partition based in part on a secondary processing unit mode property in the partition profile. The secondary processing unit entitlement may be smaller than a primary processing unit entitlement for the logical partition. The partition manager reserves processing units from a secondary shared processor pool equal to the logical partition's secondary entitlement for the logical partition. The primary and secondary processing unit entitlements may be stored in primary and secondary configuration data structures associated with the logical partition. The partition manager may relocate the logical partition to the secondary shared processor pool in response to a predetermined condition.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Naresh Nayar, Geraint North, Bryan M. Logan
  • Publication number: 20140278405
    Abstract: Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edwin W. Peters, Sherry L. Platek, Nitty T. Pulikan, Balaji Ranganathan, Liviu Rodean, Balasubramanian Sivasubramanian, Eric Woods
  • Publication number: 20140283097
    Abstract: Mechanisms are provided for relational context sensitive anonymization of data. A request for data is received that specifies a relational context corresponding to a selected group of selected persons selected from a global group of persons based on the relational context. The relational context specifies one or more attributes of selected persons in the selected group that establishes a relationship between the selected persons and distinguishes the selected persons from non-selected persons in the global group that are not in the selected group. For the relational context, based on a corpus of personal information data corresponding to the selected persons, key attributes in the personal information data are determined and a rarity value for each key attribute is determined. Selected key attributes are then anonymized based on the determined rarity value for each of the key attributes within the relational context of the selected group.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Corville O. Allen, Scott R. Carrier, Harold Moss, III, Eric Woods
  • Publication number: 20140278288
    Abstract: Selectively tuning frequency modes of a structure, including: identifying, by a finite element analysis module, a plurality of frequency modes of the structure; and selectively altering, by the finite element analysis module, a target frequency mode a greater amount than the other frequency modes of the structure, including modifying a local attribute of a portion of the structure associated with the target frequency mode without modifying the attribute over the entire structure.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James A. Cooke, Kenton C. Green, Michael S. Green, Matthew L. Nickerson
  • Publication number: 20140281084
    Abstract: Embodiments include a method for bypassing data in an active memory device. The method includes a requestor determining a number of transfers to a grantor that have not been communicated to the grantor, requesting to the interconnect network that the bypass path be used for the transfers based on the number of transfers meeting a threshold and communicating the transfers via the bypass path to the grantor based on the request, the interconnect network granting control of the grantor in response to the request. The method also includes the interconnect network requesting control of the grantor based on an event and communicating delayed transfers via the interconnect network from other requestors, the delayed transfers being delayed due to the grantor being previously controlled by the requestor, the communicating based on the control of the grantor being changed back to the interconnect network.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bruce M. Fleischer, Thomas W. Fox, Hans M. Jacobson, Ravi Nair, Martin Ohmacht, Krishnan Sugavanam
  • Publication number: 20140279952
    Abstract: For efficient calculation of both similarity search values and boundaries of digest blocks in data deduplication, input data is partitioned into chunks, and for each chunk a set of rolling hash values is calculated. A single linear scan of the rolling hash values is used to produce both similarity search values and boundaries of the digest blocks of the chunk.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shay H. AKIRAV, Lior ARONOVICH, Shira BEN-DOR, Michael HIRSCH, Ofer LENEMAN
  • Publication number: 20140281460
    Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a first computer having a first memory, a software stack in a second memory of a second computer coupled to the first computer via a network. The software stack is copied from the second memory to the first memory, and the copied software stack is executed by the first computer.
    Type: Application
    Filed: November 7, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alex FRIEDMAN, Constantine GAVRILOV
  • Publication number: 20140252418
    Abstract: A memory array and a method for electrically coupling memory cell access devices to a word line. The memory array includes a source line electrically coupled to each source terminal of the memory cell access devices. The memory array also includes a first set of at least two vertical pillars positioned above and electrically coupled to the source line. A second set of vertical pillars electrically isolated from the source line and positioned such that the source line does not extend below the second set of vertical pillars is also included. Furthermore, gate terminals of the memory cell access devices laterally surround the first set of vertical pillars and the second set of vertical pillars. Finally, a first word line contact is positioned between two of the second set of vertical pillars. The first word line contact is electrically coupled to the gate terminals.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Chung H. Lam, Jing Li, Edward W. Kiewra
  • Publication number: 20140258594
    Abstract: A system for random number generation may include non-volatile memory, and a random number stored on the non-volatile memory. The system may also include a key linked to the random number. The system may further include a computer-apparatus designed to use the random number based upon the key.
    Type: Application
    Filed: August 15, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: James R. Kozlosk, Robert K. Montoye, Raquel Norel, John J. Rice
  • Publication number: 20140253764
    Abstract: An apparatus, computer program product, and method for reducing persistent shadows within an image. The apparatus includes a camera configured to generate frames of the image. The apparatus also includes a computer processor. The computer processor calculates the average normalized brightness for each pixel in the image and adjusts the brightness of each pixel with the average normalized brightness.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Norman Haas, Ying Li, Charles A. Otto, Sharathchandra Pankanti, Hoang Trinh
  • Publication number: 20140257847
    Abstract: Systems and methods for data analysis include determining medical events co-occurring within a time period from a patient record database. The medical events are grouped into sets of medical events such that a number of sets of medical events is minimized based upon medical event cardinality. Patterns from the sets of medical events are identified, using a processor, to provide relationships between the patterns and patient outcomes.
    Type: Application
    Filed: August 16, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JIANYING HU, ADAM N. PERER, FEI WANG
  • Publication number: 20140257045
    Abstract: Systems and methods for data analysis include determining medical events co-occurring within a time period from a patient record database. The medical events are grouped into sets of medical events such that a number of sets of medical events is minimized based upon medical event cardinality. Patterns from the sets of medical events are identified, using a processor, to provide relationships between the patterns and patient outcomes.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jianying Hu, Adam N. Perer, Fei Wang
  • Publication number: 20140259021
    Abstract: Systems, methods, and computer program products for job scheduling are disclosed. An exemplary computer-implemented method includes receiving a job in a job scheduling system. At least part of the job is transmitted to a job reader. An indication of one or more functions required for performing the job is received from the job reader. A first computing device is selected from among a plurality of computing devices, where the selection is based, at least in part, on whether the first computing device supports the functions required for performing the job.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Steven B. Jones, Brian Keuling, Thomas J. Wasik
  • Publication number: 20140254603
    Abstract: Embodiments of the invention relate to providing interoperability between hosts supporting multiple encapsulation. One embodiment includes a method that includes mapping packet encapsulation protocol type information for virtual switches. Each virtual switch is associated with one or more virtual machines (VMs). It is determined whether one or more common encapsulation protocol types exist for a first VM associated with a first virtual switch and a second VM associated with a second virtual switch based on the mapping. A common encapsulation protocol type is selected if it is determined that one or more common encapsulation protocol types exist for the first virtual switch and the second virtual switch. A packet is encapsulated for communication between the first VM and the second VM using the selected common encapsulation protocol type.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bhalachandra G. Banavalikar, Amitabha Biswas, Vinit Jain, Jayakrishna Kidambi
  • Publication number: 20140258629
    Abstract: Embodiments relate to a method, system, and computer program product for prefetching data on a chip having at least one scout core and a parent core. The method includes saving a prefetch code start address by the parent core. The prefetch code start address indicates where a prefetch code is stored. The prefetch code is specifically configured for monitoring the parent core based on a specific application being executed by the parent core. The method includes sending a broadcast interrupt signal by the parent core to the at least one scout core. The broadcast interrupt signal being sent based on the prefetch code start address being saved. The method includes monitoring the parent core by the prefetch code executed by at least one scout core. The scout core executes the prefetch code based on receiving the broadcast interrupt signal.
    Type: Application
    Filed: March 5, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fadi Y. Busaba, Steven R. Carlough, Christopher A. Krygowski, Brian R. Prasky, Chung-lung K. Shum
  • Publication number: 20140252502
    Abstract: Multilayer dielectric structures are provided having silicon nitride (SiN) and silicon oxynitride (SiNO) films for use as capping layers, liners, spacer barrier layers, and etch stop layers, and other components of semiconductor nano-devices. For example, a semiconductor structure includes a multilayer dielectric structure having multiple layers of dielectric material including one or more SiN layers and one or more SiNO layers. The layers of dielectric material in the multilayer dielectric structure have a thickness in a range of about 0.5 nanometers to about 3 nanometers.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Alfred Grill, Seth L. Knupp, Son V. Nguyen, Vamsi K. Paruchuri, Deepika Priyadarshini, Hosadurga K. Shobha
  • Publication number: 20140258981
    Abstract: A method, computer program product, and computer system for generating, at a computing device, a first suspect profile of a plurality of suspect profiles that includes one or more characteristics, wherein the first suspect profile is associated with a traceability link between at least two artifacts. A change to a first characteristic associated with a first artifact of the at least two artifacts is determined. Which of the plurality of suspect profiles includes the first characteristic is determined. The first characteristic is matched to the first suspect profile of the plurality of suspect profiles based upon, at least in part, determining that the first suspect profile includes the first characteristic. The traceability link is marked as suspect based upon, at least in part, matching the first characteristic to the first suspect profile.
    Type: Application
    Filed: October 29, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Marc A. Baumbach, Patrick J. Danford, George P. DeCandio, Christian Funkhouser, David K. Grotjohn, Vishwanath Ramaswamy
  • Publication number: 20140259013
    Abstract: Among other things, the disclosure is applied to a generic microprocessor architecture with a set (e.g., one or more) of controlling/main processing elements (e.g., MPEs) and a set of groups of sub-processing elements (e.g., SPEs). Under this arrangement, MPEs and SPEs are organized in a way that a smaller number MPEs control the behavior of a group of SPEs using program code embodied as a set of virtualized control threads. The apparatus includes a MCP coupled to a power supply coupled with cores to provide a supply voltage to each core (or core group) and controlling-digital elements and multiple instances of sub-processing elements. In accordance with these features, virtualized control threads can traverse the physical boundaries of the MCP to control SPE(s) (e.g., logical partitions having one or more SPEs) in a different physical partition (e.g., different from the physical partition from which the virtualized control threads originated.
    Type: Application
    Filed: May 19, 2014
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Karl J. Duvalsaint, Harm P. Hofstee, Daeik Kim, Moon J. Kim
  • Publication number: 20140258417
    Abstract: Methods, apparatuses, and computer program products for collective operation management in a parallel computer are provided. Embodiments include a parallel computer having a first compute node operatively coupled for data communications over a tree data communications network with a plurality of child compute nodes. Embodiments also include each child compute node performing a first collective operation. The first compute rode, for each child compute node, receives from the child compute node, a result of the first collective operation performed by the child compute node. For each result received from a child compute node, the first compute node stores a timestamp indicating a time that the child compute node completed the first collective operation. The first compute node also manages, based on the stored timestamps, execution of a second collective operation over the tree data communications network.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles J. Archer, James E. Carey, Philip J. Sanders, Brian E. Smith
  • Publication number: 20140258658
    Abstract: For reducing data loss by a processor device in a computing storage environment, data blocks are prioritized for creating an N number of additional secondary copies of data using a vulnerability factor for identifying those of the data blocks having a probability of failure. The data blocks include at least a primary copy and a secondary copy of the data.
    Type: Application
    Filed: March 7, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven F. BEST, Janice M. GIROUARD, Ziv SERLIN, Yehuda SHIRAN
  • Publication number: 20140257878
    Abstract: A method for managing inbound user traffic to a reservation system. The method includes receiving messages from one or more users and determining, by one or more computer processors, at least one of the one or more users is not a preferred user, based on the messages received. The method further includes sending the messages from the at least one user to a limiting component, wherein the limiting component slows the messages from the at least one of the one or more users to the reservation system.
    Type: Application
    Filed: March 5, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arnold H. Bramnick, Peter L. Lutz
  • Publication number: 20140258205
    Abstract: System, computer-implemented method, and computer program product to receive a case by a deep question answering system, identify a policy relevant in generating a response to the case, the policy containing a set of criteria used in generating the response to the case, produce, by a first annotator, of a set of annotators, one or more relevant passages of the case, compute a criteria score for a first criterion, of the set of criteria, based on the one or more relevant passages of the case, an determine that the first criterion is met by the case when the criteria score for the first criterion exceeds a predefined threshold.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20140252114
    Abstract: A method of operating an irrigation system is provided and includes coupling one or more lateral driplines to a main irrigation line, dividing each lateral dripline into zones and providing each lateral dripline with a plurality of replaceable emitters at each zone, disposing a plurality of controllable valves along each of the one or more lateral driplines at zone borders and actuating each one of the plurality of controllable valves to thereby activate corresponding emitters in the associated zone.
    Type: Application
    Filed: August 15, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Hendrik F. Hamann, Levente I. Klein, Sergio A. Bermudez Rodriguez, Michael A. Schappert
  • Publication number: 20140257681
    Abstract: Techniques, systems, and articles of manufacture for leveraging information for use in a traffic prediction scenario. A method includes extracting transportation-related information pertaining to a geographic region from multiple user-driven information systems, processing said transportation-related information by merging the transportation-related information across the multiple user-driven information systems and one or more transportation-related databases, and determining a supply and demand estimation for one or more aspects of transportation in the geographic region based on said processing of said transportation-related information.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishna Kummamuru, Nitendra Rajput, Biplav Srivastava
  • Publication number: 20140255044
    Abstract: A signal transfer link includes a first plasmonic coupler, and a second plasmonic coupler spaced apart from the first plasmonic coupler to form a gap. An insulator layer is formed over end portions of the first and second plasmonic couplers and in and over the gap. A plasmonic conductive layer is formed over the gap on the insulator layer to excite plasmons to provide signal transmission between the first and second plasmonic couplers.
    Type: Application
    Filed: August 16, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Phaedon Avouris, Vasili Parebeinos, Mathias B. Steiner, Alberto Valdes Garcia
  • Publication number: 20140258823
    Abstract: System, method, and computer program product, comprising, responsive to accessing a first electronic page in a browser, collecting metadata from the first electronic page, determining: (i) a set of existing data structures to store bookmarks for electronic pages in the browser, each data structure in the set of existing data structures representing an associated category for electronic pages, and (ii) a preference for using the existing data structures to store bookmarks for electronic pages, and, responsive to receiving an indication to bookmark the first electronic page, identifying, based on the metadata, the existing data structures, and the preference for using the existing data structures, a first data structure in which to store the bookmark for the first electronic page, presenting the first data structure for approval, and responsive to receiving approval for the first data structure, storing a bookmark for the first electronic page in the first data structure.
    Type: Application
    Filed: March 25, 2014
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ryan A. DAVIS, Asima SILVA
  • Publication number: 20140255021
    Abstract: A method and apparatus for testing an optical cable is provided. In one embodiment, the apparatus may include a receiver for receiving a received pulse train through the optical cable. The apparatus may further include a cross-correlation system in communication with the receiver. The cross-correlation system may be adapted to determine a cross-correlation of the received pulse train and matched filter to an expected pulse train. The apparatus may further include a comparator in communication with the cross-correlation system. The comparator may be adapted to compare the cross-correlation to a threshold. The apparatus may also include an output transmitter, in communication with the comparator. The output transmitter may be able to output a comparison-result output that includes the results of the comparator comparison of the cross-correlation against a threshold.
    Type: Application
    Filed: March 7, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Louie A. Dickens, Michael E. Starling, Daniel J. Winarski
  • Publication number: 20140259089
    Abstract: Techniques, systems and articles of manufacture for security-aware admission control of requests in a distributed system. A method includes identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20140258632
    Abstract: Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server.
    Type: Application
    Filed: March 7, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary D. Cudak, Lydia M. Do, Christopher J. Hardee, Adam Roberts
  • Publication number: 20140258728
    Abstract: A secure password generation method and system is provided. The method includes enabling by a processor of a computing system, password translation software. The computer processor generates and stores the random translation key. A first password is received and a second associated password is generated. The computer processor associates the second password with a secure application. The computer processor stores the random translation key within an external memory device and disables a connection between the computing system and the external memory device.
    Type: Application
    Filed: May 21, 2014
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Arnaud Lund
  • Publication number: 20140254291
    Abstract: A memory cell and method for operating a memory cell including a bidirectional access device and memory element electrically coupled in series. The bidirectional access device includes a tunneling capacitance. The memory element programmable to a first and second state by application of a first and second write voltage opposite in polarity to one another. The memory element has a lower capacitance in the first state than the second state. A read unit senses a transient read current due to a voltage drop upon application of a read voltage. Determining if the memory element is the first or second state is based on whether the read current is greater or less than a sense threshold. The sense threshold is based on a capacitance ratio between the first and second state.
    Type: Application
    Filed: August 14, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: SangBum Kim, Chung H. Lam
  • Publication number: 20140258958
    Abstract: A method is provided to convert commercial microprocessors to radiation-hardened processors and, more particularly, a method is provided to modify a commercial microprocessor for radiation hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation hardened applications. The method is implemented in a computing infrastructure and includes evaluating a probability that one or more components of an existing commercial design will be affected by a single event upset (SEU). The method further includes replacing the one or more components with a component immune to the SEU to create a final device.
    Type: Application
    Filed: January 10, 2014
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: John A. FIFIELD, Mark C. HAKEY, Jason D. HIBBELER, James S. NAKOS, Tak H. NING, Kenneth P. RODBELL, Ronald D. ROSE, Henry H.K. TANG, Larry WISSEL
  • Publication number: 20140258251
    Abstract: A method, system, and computer program product to efficiently maintain a database is disclosed. The method, system, and computer program product may include structuring the database to have a table, an index associated with the table, and a log associated with the index. The method, system, and computer program product may include receiving a maintenance request related to the index. The method, system, and computer program product may include accounting for the maintenance request when the index is being searched. The method, system, and computer program product may include adding the maintenance request to the log when the index is not being searched.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert J. Bestgen, Daniel E. Beuch
  • Publication number: 20140258992
    Abstract: A disclosed method includes accessing one or more seeding specifications and a program including computer-readable code and applying the one or more seeding specifications to the program to identify for analysis seeds including strings for corresponding identified string variables. The method includes tracking flows emanating from the identified seeds. The tracking includes computing an integral offset into a tracked string variable for any statements causing such a computation. The tracking also includes providing a string representation based on the computed integral offset, wherein the provided string representation comprises a value of the integral offset and an indication of the corresponding tracked string variable. The tracking further includes modeling string manipulations of the tracked string variables using the string representations. Apparatus and program products are also disclosed.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Salvatore Angelo Guarnieri, Marco Pistoia, Omer Tripp
  • Publication number: 20140258789
    Abstract: In accordance with one aspect of the present description, an indication that a communication failure reported in a predetermined time interval is more likely the result of a software failure than a hardware failure may be made if the number of communication links reporting a communication failure in the predetermined time interval exceeds a communication link failure threshold, and the number of communication link devices such as nodes or communication paths which have been implicated as causing a communication failure, exceeds an implicated device threshold. Other features and aspects may be realized, depending upon the particular application.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Publication number: 20140252103
    Abstract: A method of operating a drip irrigation system is provided and includes providing drip irrigation lines aside a diverter line with T-junctions interleaved between adjacent ones of the drip irrigation lines and each T-junction including a three-way line coupled to the diverter line, a check valve operably disposable between the three-way line and a downstream end of an upstream one of the drip irrigation lines to permit fluid flow in only a forward direction and a controllable valve operably disposable between the three-way line and an upstream end of a downstream one of the drip irrigation lines.
    Type: Application
    Filed: August 15, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Hendrik F. Hamann, Levente L. Klein, Sergio A. Bermudez Rodriguez, Michael A. Schappert
  • Publication number: 20140258967
    Abstract: A system and method to automatically and continuously update the urgency rating of a backlog item associated with a technical debt item in a software development project are described. The technical debt represents potential additional work or rework associated with current code. The method includes a user defining a plurality of components that comprise the software development project. The method also includes a processor associating the technical debt with one or more components of the plurality of components, and the processor updating the urgency of the backlog item associated with the technical debt according to a function based on a development event associated with at least one of the one or more components.
    Type: Application
    Filed: August 5, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Evelyn Duesterwald, Tamir Klinger
  • Publication number: 20140252117
    Abstract: A controllable emitter of an irrigation apparatus including a drip line having pressurized fluid therein is provided. The controllable emitter includes a container coupled to the drip line, the container being formed to define an interior and including an inlet through which the pressurized fluid is receivable in the interior from the drip line and an outlet through which the pressurized fluid is exhaustible from the interior, a magnetic stopper, which is normally disposable in a first position such that the magnetic stopper prevents a flow of the pressurized fluid through the outlet and which is actively disposable in a second position such that the magnetic stopper permits the flow and a controllable actuator configured to generate a magnetic field operable to urge the magnetic stopper to move from the first position to the second position.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hendrik F. Hamann, Levente L. Klein, Sergio A. Bermudez Rodriguez, Michael A. Schappert, Alejandro G. Schrott
  • Publication number: 20140258152
    Abstract: A method and system for resolving an unlicensed installation of a type of software in a first computer of a company. The method and system: determines that the type of software is currently installed on a second computer of the company; determines that the company has an existing license permitting multiple copies of the software to be installed on the second computer; and based on the determination that the company has an existing license which permits multiple copies of the software to be installed on the second computer, determines, and generates a computer record indicating, that a solution to the unlicensed installation of the type of software on the first computer is to decommission the unlicensed software from the first computer and install another copy of the software in the second computer under the existing license in addition to the type of software currently installed on the second computer.
    Type: Application
    Filed: May 12, 2014
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Marna J. Boomershine, Marie Kosciusko, Jacque L. Henderlite, Jamie B. Marsnik
  • Publication number: 20140253729
    Abstract: An apparatus, computer program product, and method for reducing persistent shadows within an image. The apparatus includes a camera configured to generate frames of the image. The apparatus also includes a computer processor. The computer processor calculates the average normalized brightness for each pixel in the image and adjusts the brightness of each pixel with the average normalized brightness.
    Type: Application
    Filed: September 25, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Norman Haas, Ying Li, Charles A. Otto, Sharathchandra Pankanti, Hoang Trinh
  • Publication number: 20140258188
    Abstract: Embodiments of the invention relate to predicting user activity in a social media application. In one embodiment, user activity information is collected for a user from a social media application and activity features of the user are determined, based on the collected activity information for the user. Then a model is created to predict a future activity of the user in the social media application. The model uses the determined activity features of the user and results obtained from running the created model, to determine future activity of the user in the social media application.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Jilin Chen, Jalal U. Mahmud, Jeffrey W. Nichols
  • Publication number: 20140253339
    Abstract: A message presentation method and system is disclosed. The method includes receiving by a computer processor of an electrical device, data associated with a function of the electrical device. The electrical device comprises light emitting devices. The computer processor generates an identification code identifying the function, a first bit signal associated with a first bit of the identification code, and a second bit signal associated with a second bit of the identification code. The computer processor transmits the first bit signal to a first light emitting device. The first bit signal results in the first light emitting device indicating the first bit signal as a first illuminated color.
    Type: Application
    Filed: May 21, 2014
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek Kwan, Angela Y. Lee
  • Publication number: 20140258199
    Abstract: Embodiments of the invention provide a method comprising creating a structural description for at least one neurosynaptic core circuit. Each core circuit comprises an interconnect network including plural electronic synapses for interconnecting one or more electronic neurons with one or more electronic axons. The structural description defines a desired neuronal activity for the core circuits. The desired neuronal activity is simulated by programming the core circuits with the structural description. The structural description controls routing of neuronal firing events for the core circuits.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventor: Dharmendra S. Modha
  • Publication number: 20140252629
    Abstract: Self-aligned pitch split techniques for metal wiring involving a hybrid (subtractive patterning/damascene) metallization approach are provided. In one aspect, a method for forming a metal wiring layer on a wafer includes the following steps. A copper layer is formed on the wafer. A patterned hardmask is formed on the copper layer. The copper layer is subtractively patterned using the patterned hardmask to form a plurality of first copper lines. Spacers are formed on opposite sides of the first copper lines. A planarizing dielectric material is deposited onto the wafer, filling spaces between the first copper lines. One or more trenches are etched in the planarizing dielectric material. The trenches are filled with copper to form a plurality of second copper lines that are self-aligned with the first copper lines. An electronic device is also provided.
    Type: Application
    Filed: August 21, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Josephine B. Chang, Michael A. Guillorn, Eric A. Joseph, Hiroyuki Miyazoe