IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120245975Abstract: A system and method for researching virtual markets and using the research to optimize product placements and displays. The system includes a monitoring engine configured to monitor information about user reactions and/or at least one product. The system also includes a recommendation engine configured to recommend a location within a virtual universe to display the at least one product based on the information monitored by the monitoring engine and a display engine configured to display the at least one product at a recommended location.Type: ApplicationFiled: June 7, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michele P. BRIGNULL, Rick A. HAMILTON, II, Anne R. SAND, James W. SEAMAN
-
Publication number: 20120243599Abstract: A system includes a memory hub chip including a Tomlinson-Harashima precoding (THP) equalizer portion operative to perform transmitter equalization at the memory hub chip and send data from to a memory chip.Type: ApplicationFiled: March 25, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marcel A. Kossel, Thomas H. Toifl
-
Publication number: 20120246574Abstract: An active meeting can be identified that occurs in a collaborative environment that is an electronic meeting system. The meeting can be associated with a meeting identifier, a ranking value, and/or a plurality of participants. Relationship information of the participants with regard to a specified entity can be determined. Relationship information can include a social network relationship, presence information, and/or collaboration metadata. A ranking value, which is a numerical or alphanumeric value, for the meeting can be programmatically established based on the relationship information.Type: ApplicationFiled: March 23, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: DOUGLAS G. HOARD, WILLIAM M. QUINN, AMY D. TRAVIS
-
Publication number: 20120246321Abstract: Systems and methods for fair-sharing in bandwidth sharing ad-hoc networks. A method includes maintaining a borrower account and lender account of a borrower and a lender of an ad hoc network. The method also includes adjusting at least one of the borrower account and the lender account based upon data transfer by the lender for the borrower.Type: ApplicationFiled: June 6, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. DAWSON, Peter G. FINN, Rick A. HAMILTON, II, Jenny S. LI
-
Publication number: 20120245724Abstract: Disclosed is a resonator made up of three sections (i.e., first, second and third sections) of a semiconductor layer. The second section has an end abutting the first section, a middle portion (i.e., an inductor portion) coiled around the first section and another end abutting the third section. The first and third sections exhibit a higher capacitance to the wafer substrate than the second section. Also disclosed are a process control system and method that incorporate one or more of these resonators. Specifically, during processing by a processing tool, wireless interrogation unit(s) detect the frequency response of resonator(s) in response to an applied stimulus. The detected frequency response is measured and used as the basis for making real-time adjustments to input settings on the processing tool (e.g., as the basis for making real-time adjustments to the temperature setting(s) of an anneal chamber).Type: ApplicationFiled: March 21, 2011Publication date: September 27, 2012Applicant: International Business Machines CorporationInventors: Mete Erturk, Ezra D.B. Hall, Kirk D. Peterson
-
Publication number: 20120245970Abstract: A Business Intelligence (BI) meta model template is selected based on one or more meta model object types in a model structure. A BI meta model is generated from the selected BI meta model template. One or more BI report specification templates are selected based on a mining model type. A BI report specification is generated from the selected one or more BI report specification templates, a schema of the model structure, and content of the model structure. The BI meta model and the BI report specification are deployed to a BI server for use in generating a BI report using a BI tool at the BI server. In response to a user request for a BI report, the BI report is generated with a BI tool at the BI server that uses the BI meta model and the BI report specification.Type: ApplicationFiled: June 7, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ruben PULIDO DE LOS REYES, Christoph SIEB
-
Publication number: 20120240657Abstract: An apparatus for electrical inspection is disclosed. The apparatus comprises an inert gas delivery system that delivers inert gas near a microscope imaging element and electrical test probes. A gas supply provides an inert gas such as argon or nitrogen. The inert gas displaces oxygen to prevent premature oxidation of the test probes. In one embodiment, one or more delivery tubes deliver inert gas to the measurement area.Type: ApplicationFiled: March 22, 2011Publication date: September 27, 2012Applicant: International Business Machines CorporationInventors: Richard Walter Oldrey, Terence Lawrence Kane, Michael Tenney
-
Publication number: 20120246199Abstract: Provided are techniques for displaying the model objects in models in a models stack. In response to a model object in a model of the models stack being selected as an initial context, one or more navigation paths associated with the selected model object are displayed, wherein each of the navigation paths has nodes represented as graphical components that are built in real time. In response to a user selecting a node in one of the one or more navigation paths, a new model object represented by the selected node in the models stack is navigated to in one of a forward direction and a backward direction to provide bidirectional navigation between the model objects in the models without loosing the initial context and one or more navigation paths associated with the new model object and at least one appended node that represents a previously traversed model object are displayed.Type: ApplicationFiled: March 24, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Gary Denner
-
Publication number: 20120246107Abstract: A system and method for managing responsiveness of virtual desktops using passive monitoring includes measuring a time between an interactive desktop event and a result of the interactive desktop event. Based on the time, system resources are reallocated to improve the responsiveness.Type: ApplicationFiled: June 7, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kirk A. Beaty, Rajdeep Bhowmik, Andrzej Kochut
-
Publication number: 20120246132Abstract: Overflow access records (OARs) are managed in a database system. An OAR is created in response to receiving an update command for a data record and to the updated data record generated by the update command not fitting onto the page in the table where the data record was stored. The OAR that is created includes an index counter that indicates a number of indexes associated with the table. When an OAR is accessed in response to a query command, an identifier of the accessed OAR is replaced in the index by an identifier of a data record pointed to by the OAR, and the index counter in the accessed OAR is changed by a predefined amount. When the index counter reaches a predefined value, the accessed OAR is removed from the table.Type: ApplicationFiled: March 2, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nelke Sebastian, Martin Oberhofer, Yannick Saillet, Jens Seifert, Knut Stolze
-
Publication number: 20120246439Abstract: Disclosed are a method and system for measuring the performance of individual logical partitions of a logically partitioned computer system. Preferably, the method and system both hardware and firmware to allow measurement samples to be collected only for user specified zones of interest. In one embodiment, the method comprises the steps of specifying a Zone or Zones of interest (a Zone being a logical partition), collecting measurement samples only from the one or more specified Zones of interest, and measuring the performance of each of these Zones using only the measurement samples collected from said each of the Zones.Type: ApplicationFiled: June 7, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jane H. Bartik, Michael Billeci, Lisa C. Heller, Donald G. O'Brien, Bruce A. Wagar, Patrick M. West, JR.
-
Publication number: 20120246497Abstract: Embodiments of the present invention provide an approach for controlling and minimizing electrical power consumption of a plurality of lights and electronic devices connected to a networked computing environment, wherein asset and space management software can be utilized to monitor and remotely turn off the electronic devices that are determined as not being utilized, based on observed indicators of inactivity associated with the electronic devices. Specifically, the location of the electronic devices are determined and then registered and stored in a database, wherein the electronic devices include desktop computers, laptops, phones, and heating ventilation and air conditioning (HVAC) systems that are connected to the networked computing environment.Type: ApplicationFiled: March 21, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Ariane Hernandes Amadeu
-
Publication number: 20120241885Abstract: Magnetic devices, magnetoresistive structures, and methods and techniques associated with the magnetic devices and magnetoresistive structures are presented. For example, a magnetic device is presented. The magnetic device includes a ferromagnet, an antiferromagnet coupled to the ferromagnet, and a nonmagnetic metal proximate to the ferromagnet. The antiferromagnet provides uniaxial anisotropy to the magnetic device. A resistance of the nonmagnetic metal is dependent upon a direction of a magnetic moment of the ferromagnet.Type: ApplicationFiled: June 6, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guohan Hu, Jonathan Zanghong Sun
-
Publication number: 20120246655Abstract: In a method for automatically tracking time, a computer receives a user identification. The computer automatically starts a first task, based on the received user identification. The computer records a start time for the first task. The computer monitors a state of the first task. The computer automatically records an end time for the first task in response to determining that the state of the first task has changed.Type: ApplicationFiled: March 25, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jarir Kamel Chaar, William R. Cope, JR., Per J. Kroll, Gaston Robert Williams
-
Publication number: 20120242369Abstract: A system includes a register, a first logical function portion, the first logical function portion operative to receive a first numerical value from the register, perform a first logical function with the first numerical value, and output a second numerical value, a second logical function portion, the second logical function portion operative to receive the first numerical value from the register, perform a second logical function with the first numerical value, and output a third numerical value, and a control logic portion, the control logic portion operative to receive the first numerical value from the register, determine whether the first numerical value includes a code associated with either the first logical function or the second logical function, and responsive to determining that the code is associated with the first logical function, and direct the output of the second numerical value to an input of the register.Type: ApplicationFiled: March 24, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Jan Van Lunteren
-
Publication number: 20120246571Abstract: A system and method for providing items to users and, more particularly, a system and method for rating items and placing such items into a queued list. The method includes providing an item from a web browser to a recipient on a preferred list and placing the item into a queued list with respect to other items based on a rating. The system includes a computer infrastructure being operable to provide a rated item from a web browser to a recipient on a preferred list and place the rated item in a queued list with respect to other items.Type: ApplicationFiled: March 13, 2012Publication date: September 27, 2012Applicant: International Business Machines CorporationInventors: Robert W. BOND, Stephen E. JAFFE, Keith P. LORING, Douglas J. MCCULLOCH, Patrick J. RICHARDS, JR., Matthew B. TREVATHAN
-
Publication number: 20120246488Abstract: A device for generating a born encrypted optical file includes a photovoltaic matrix for converting an optical image into a digital file. The digital file is a collection of digital data that has not been processed by any image processing logic and thus cannot be used to directly generate a reproduced image of the object. An encryption logic converts the digital file into an encrypted digital file that can be exported from the device to an authorized device to create a decrypted digital file. This decrypted digital file is capable of being used by a display logic to display an image of the object.Type: ApplicationFiled: March 24, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: TIMOTHY DURNIAK, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER
-
Publication number: 20120246549Abstract: A request is received via an input device of a computing device for a hypertext link to an item of web content rendered on a display of the computing device. It is determined whether a markup language (ML) document used to render the web content includes an existing page anchor proximate to an item reference within the ML document. The hypertext link is configured based upon the determination of whether the ML document includes the existing page anchor proximate to the item reference within the ML document. The configured hypertext link is returned in response to the request.Type: ApplicationFiled: June 6, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Theodore R. Carraher, Jake Palmer
-
Publication number: 20120245943Abstract: A natural language request for modifying a set of subscriptions for one or more topics in a publish/subscribe topic hierarchy is received at a processing device. The natural language request includes a predetermined natural language element. The natural language request is transformed into a publish/subscribe topic string and the predetermined natural language element is transformed into a publish/subscribe symbol. The symbol represents one or more topics in the topic hierarchy. One or more subscriptions to one or more topics is modified based on the transformed topic string.Type: ApplicationFiled: April 25, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Benjamin J. Fletcher, Gareth E. Jones
-
Publication number: 20120241913Abstract: An article including a microelectronic substrate is provided as an article usable during the processing of the microelectronic substrate. Such article includes a microelectronic substrate having a front surface, a rear surface opposite the front surface and a peripheral edge at boundaries of the front and rear surfaces. The front surface is a major surface of the article. A removable annular edge extension element having a front surface, a rear surface and an inner edge extending between the front and rear surfaces has the inner edge joined to the peripheral edge of the microelectronic substrate. In such way, a continuous surface is formed which includes the front surface of the edge extension element extending laterally from the peripheral edge of the microelectronic substrate and the front surface of the microelectronic substrate, the continuous surface being substantially co-planar and flat where the peripheral edge is joined to the inner edge.Type: ApplicationFiled: June 6, 2012Publication date: September 27, 2012Applicant: International Business Machines CorporationInventors: Charles W. Koburger, III, Steven J. Holmes, David V. Horak, Kurt R. Kimmel, Karen E. Petrillo, Christopher F. Robinson
-
Publication number: 20120244500Abstract: A system, method and computer program product for detecting leadership in a socio-technical environment based on the chronologic distribution of artifacts. The system and method captures and makes use of chronologic information as a predictor of causality in the dissemination of artifacts. A measure of leadership is based in part on the amount of relevant artifacts generated as a result, and temporal causality is used to detect this. The system method and computer program product further determines the patterns of behavior that govern a socio-technical context. By defining a set of patterns and comparing them with the interactions observed within a socio-technical network issues are discoverable.Type: ApplicationFiled: March 23, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Maria-Cristina V. Marinescu, Vadakkedathu T. Rajan, Mark N. Wegman
-
Publication number: 20120235814Abstract: Enforcing user-defined real-time communication session terminations can begin with a termination enforcement handler identifying termination conditions applicable to a real-time communication session hosted by a unified telephony system. The termination conditions can define a limit for an operational variable for the unified telephony system or the real-time communication session. The identified termination conditions can be evaluated. If a termination condition is satisfied, it can be determined which participants are to be disconnected from the real-time communication session based upon handling rules for the termination conditions and/or termination preferences associated with the real-time communication session. The termination preferences can be defined by an initiating entity of the real-time communication session. The participants can be notified that their connection to the real-time communication session will be terminated in a predefined time limit.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean Callanan, Ruthie D. Lyle, Patrick O'Sullivan, Fred Raguilat, Carol S. Zimmet
-
Publication number: 20120236433Abstract: In one general embodiment, a magnetic head comprises an inner module comprising an array of data readers; and first and second outer modules flanking the inner module. The outer modules are identical, each outer module comprising an array of data writers. A number of active data writers in each outer module is less than a number of active data readers in the inner module. For the first outer module, one of the active data writers is aligned with one of the data reader positioned towards a first end of the inner module array in a direction generally parallel to the path of tape travel thereacross. For the second outer module, one of the active data writers is aligned with one of the data readers positioned towards a second end of the inner module array in the direction generally parallel to the path of tape travel thereacross.Type: ApplicationFiled: May 24, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Peter VanderSalm Koeppe
-
Publication number: 20120240110Abstract: Systems and methods for deploying a virtual machine (VM) on a host are provided. An exemplary method comprises notifying a host to download a master copy of a VM image from a remotely located network storage device, in response to a service provider providing a definition manifest for a service request supported by the VM, wherein the host deploys the VM directly from the VM image downloaded to a storage medium locally connected to the host machine, wherein deployment of the VM allows the host to locally service the service request associated with the definition manifest, wherein the host replicates copies of the VM image, in response to receiving additional service requests to create one or more VM clones; wherein the host customizes the one or more VM clones based on the definition manifest.Type: ApplicationFiled: March 16, 2011Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: David Breitgand, Irit Loy, Kenneth Nagin, Benny Rochwerger, Ezra Silvera
-
Publication number: 20120235239Abstract: A method of forming a transistor device includes forming a patterned gate structure over a semiconductor substrate, forming a raised source region over the semiconductor substrate adjacent a source side of the gate structure, and forming silicide contacts on the raised source region, on the patterned gate structure, and on the semiconductor substrate adjacent a drain side of the gate structure. Thereby, a hybrid field effect transistor (FET) structure having a drain side Schottky contact and a raised source side ohmic contact is defined.Type: ApplicationFiled: March 16, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kangguo Cheng, Ali Khakifirooz, Pranita Kulkarni, Ghavam G. Shahidi
-
Publication number: 20120235119Abstract: Techniques for forming a thin coating of a material on a carbon-based material are provided. In one aspect, a method for forming a thin coating on a surface of a carbon-based material is provided. The method includes the following steps. An ultra thin silicon nucleation layer is deposited to a thickness of from about two angstroms to about 10 angstroms on at least a portion of the surface of the carbon-based material to facilitate nucleation of the coating on the surface of the carbon-based material. The thin coating is deposited to a thickness of from about two angstroms to about 100 angstroms over the ultra thin silicon layer to form the thin coating on the surface of the carbon-based material.Type: ApplicationFiled: May 29, 2012Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Katherina Babich, Alessandro Callegari, Zhihong Chen, Edward Kiewra, Yanning Sun
-
Publication number: 20120235236Abstract: A semiconductor structure includes a semiconductor substrate. A conductive gate abuts a gate insulator for controlling conduction of a channel region. The gate insulator abuts the channel region. A source region and a drain region are associated with the conductive gate. The source region includes a first material and the drain region includes a second material. The conductive gate is self-aligned to the first and the second material.Type: ApplicationFiled: March 16, 2012Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Haining S. Yang, Kangguo Cheng, Robert Wong
-
Publication number: 20120239709Abstract: A method for performing garbage collection on an object heap is described. In one embodiment, such a method includes performing a copy phase on an object heap by copying live objects from a source space to a destination space. An abort condition is generated when copying an object from the source space to the destination space fails due to insufficient space. In response to the abort condition, tracing work and reference updating associated with the copy phase are terminated. A mark phase is then initiated that marks live objects in the source space. This mark phase resumes tracing work and reference updating terminated by the copy phase in order to avoid or minimize the repetition of work performed by the copy phase. A corresponding computer program product and system are also described.Type: ApplicationFiled: March 14, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter W. Burka, Jeffrey M. Disher, Daryl J. Maier, Aleksandar Micic, Ryan A. Sciampacone
-
Publication number: 20120239981Abstract: Error reporting software-based method where an error list for a currently-running version of some target software (or firmware) is compared to an error list for a previous versions. Helpful information can be gleaned from the comparison of error lists. For example, if it is known that the hardware configuration has not changed, as between the two lists, and there is an error on the current list that does not appear on the previous list, then this indicates that the error is in the software update and is not a hardware problem.Type: ApplicationFiled: March 15, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeffrey Michael Franke, Tu To Dang, Michael C. Elles, James A. Vignola
-
Publication number: 20120239749Abstract: Read messages are grouped by a plurality of unique sequence identifications (IDs), where each of the sequence IDs corresponds to a specific read sequence, consisting of all read and read-ahead requests related to a specific storage segment that is being read sequentially by a thread of execution in a client application. The storage system uses the sequence id value in order to identify and filter read-ahead messages that are obsolete when received by the storage system, as the client application has already moved to read a different storage segment. Basically, a message is discarded when its sequence id value is less recent than the most recent value already seen by the storage system. The sequence IDs are used by the storage system to determine corresponding read-ahead data to be loaded into a read-ahead cache.Type: ApplicationFiled: June 4, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lior ARONOVICH, Konstantin MUSHKIN, Oded SONIN
-
Publication number: 20120239810Abstract: According to one aspect of the present disclosure, a system and technique for clustered computer environment partition resolution is disclosed. The system includes: a first node couplable to a second node in a clustered network environment; and a storage provider resource accessible by the first and second nodes. The first node comprises logic executable to: create a key; communicate the key to the second node; responsive to detecting a potential partition event, generate a lock code using the key for reserving the storage provider resource; and responsive to determining an unlocked status of the storage provider resource, resolve the partition event by writing the lock code to the storage provider resource.Type: ApplicationFiled: March 18, 2011Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Markus Mueller, Steve Raspudic
-
Publication number: 20120239539Abstract: Sub-metering of fluid use is performed using a single acoustic transducer positioned at a common supply point. A computer attached to the transducer determines when each consumption point is active and measures the respective amount of fluid drawn by each. Acoustic signatures of each consumption point differ depending on the length of piping runs, location of elbows, tees, and other structures which cause acoustic energy as the fluid flows through. The acoustic signatures are recorded by the computer and are used to simultaneously differentiate fluid use at each consumption point.Type: ApplicationFiled: March 18, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: David Chun-Hao Shen
-
Publication number: 20120239393Abstract: A multiple audio/video data stream simulation method and system. A computing system receives first audio and/or video data streams. The first audio and/or video data streams include data associated with a first person and a second person. The computing system monitors the first audio and/or video data streams. The computing system identifies emotional attributes comprised by the first audio and/or video data streams. The computing system generates second audio and/or video data streams associated with the first audio and/or video data streams. The second audio and/or video data streams include the first audio and/or video data streams data without the emotional attributes. The computing system stores the second audio and/or video data streams.Type: ApplicationFiled: May 31, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sara H. Basson, Dimitri Kanevsky, Edward Emile Kelley, Bhuvana Ramabhadran
-
Publication number: 20120240237Abstract: A method, system, and computer program product for operating a web browser in an open browsing mode and a private browsing mode. The method may include calculating, by a computer processor, a privacy probability that a website contains information sensitive to the user. The privacy probability may be based, at least in part, on historical use of the private browsing mode by the user. The method may also include comparing the privacy probability to a privacy threshold and automatically switching the browser from the open browsing mode to the private browsing mode for the website if the privacy probability is greater than the privacy threshold.Type: ApplicationFiled: March 14, 2011Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Dimitri Kanevsky, James R. Kozloski, Clifford A. Pickover, Tara N. Sainath
-
Publication number: 20120235216Abstract: Semiconductor structures with damascene metal gates and pixel sensor cell shields, methods of manufacture and design structures are provided. The method includes forming a dielectric layer over a dummy gate structure. The method further includes forming one or more recesses in the dielectric layer. The method further includes removing the dummy gate structure in the dielectric layer to form a trench. The method further includes forming metal in the trench and the one more recesses in the dielectric layer to form a damascene metal gate structure in the trench and one or more metal components in the one or more recesses.Type: ApplicationFiled: March 18, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brent A. ANDERSON, Andres Bryant, William F. Clark, JR., John J. Ellis-Monaghan, Edward J. Nowak
-
Publication number: 20120236732Abstract: Provided are a computer program product, system, and method for supporting non-delivery notification between a switch and device in a network. A login with a switch is initiated including a test service parameter requesting a non-delivery notification service to cause the switch to return a non-delivery notification in response to a test path request indicating a destination node that is unavailable. Indication is made that the test service is available for the login in response to receiving a reply from the switch that the switch accepts the login with the non-delivery notification service. The test path request is sent to the switch to determine whether the destination node is available. The non-delivery notification is received from the switch in response to the switch determining that the destination node to which the test path request is directed is unavailable.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel G. Eisenhauer, Roger Gregory Hathorn, Louis William Ricci
-
Publication number: 20120237023Abstract: A system for implementing computer security is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a method that includes creating a token and populating a payload section of the token with key material and selecting a wrapping method that specifies how the key material is securely bound to key control information. A structure of the key control information in the token is independent of the wrapping method. Implementing computer security also includes wrapping the key material and binding key control information to the key material in the token. The key control information includes information relating to usage and management of the key material.Type: ApplicationFiled: March 14, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Todd W. Arnold, Elizabeth A. Dames, Thomas J. Dewkett, Carsten D. Frehr, Michael J. Kelly, Kenneth B. Kerr, Richard V. Kisley, Eric D. Rossman, Eric B. Smith
-
Publication number: 20120239788Abstract: Exemplary methods, computer systems, and computer program products for automatic registration of devices in a computer environment are provided. In one embodiment, the computer environment is configured for, in response to a fabric login (FLOGI) and/or a fixed disk (Fdisk) received from an initiator and/or a target disk, executing an automatic name server registration, state change registration, and management server registration to identify at least one of the devices.Type: ApplicationFiled: March 16, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas J. AMBER, Louie A. DICKENS
-
Publication number: 20120239867Abstract: A non-volatile flash memory comprises a plurality of non-volatile memories where a first non-volatile memory is pre-programmed (erased) with all ones, and at least a second non-volatile memory is pre-programmed with a seed value that takes advantage of the reduced programming time for less than six zeros. When writing (programming) a data byte, the memory system looks up the data byte in one or more seed tables to determine a portion of non-volatile memory to which the memory system may write the data byte with a reduced programming time. The memory system then records the location,of the data byte in an address translation table so the data byte may be accessed.Type: ApplicationFiled: June 4, 2012Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Brian J. Cagno, John C. Elliott, Gregg S. Lucas, Kenny N. Qiu
-
Publication number: 20120240105Abstract: A method of dynamically creating an OSGi bundle includes determining a directory for creation of the OSGi bundle, a runtime environment, and an OSGi framework, determining a functionality and data for the OSGi bundle based on the runtime environment and the OSGi framework, creating a JAR file of the OSGi bundle with the data and the functionality, and creating a bundle manifest for the OSGi bundle accordingly.Type: ApplicationFiled: May 31, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Piotr BELTOWSKI, Wojciech KOCJAN
-
Publication number: 20120240101Abstract: A method, system and/or program product corrects semantic errors in code in an integrated development environment. The method includes inputting, using a code editor, code being developed in an integrated development environment. One or more nodes, in a syntax tree constructed for inputting the code, are identified as containing semantic errors pertaining to use of a third-party library. A primary executable code snippet and a secondary code snippet for correcting the semantic errors are displayed. If execution of the primary code snippet does not correct the semantic errors, then the secondary code snippet is automatically executed.Type: ApplicationFiled: June 1, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Swaminathan Balasubramanian
-
Publication number: 20120239687Abstract: In one exemplary embodiment, a DSM is used to store the data structures in a cluster shared memory, such that updates, deletions and insertions are applied to both the persistent data set and the DSM, and search, list and retrieval operations are processed directly from the DSM. A data structure in the persistent data set is stored in two separate DSM pages: a first page includes an identifying search key of the data structure, the search key also pointing to a location of the data structure in the storage. A second page includes the updatable properties of the data structure. A DSM storing the data structures' pages is organized as a two-row matrix.Type: ApplicationFiled: June 4, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lior ARONOVICH, Asaf LEVY, Liran LOYA
-
Publication number: 20120235234Abstract: A FinFET device with an independent control gate, including: a silicon-on-insulator substrate; a non-planar multi-gate transistor disposed on the silicon-on-insulator substrate, the transistor comprising a conducting channel wrapped around a thin silicon fin; a source/drain extension region; an independently addressable control gate that is self-aligned to the fin and does not extend beyond the source/drain extension region, the control gate comprising: a thin layer of silicon nitride; and a plurality of spacers.Type: ApplicationFiled: March 14, 2011Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Josephine B. Chang, Michael A. Guillorn, Chung-hsun Lin
-
Publication number: 20120240121Abstract: A cross-functional area service identification method and system. The method includes reading by a computing system, processes. The computing system processes process elements associated with the processes. The computing system identifies a first functional area associated with a first current process element of the process elements and a second functional area associated with a first parent process element of the first current process element. The computing system compares the first functional area to the second functional area and determines if the first functional area comprises a same functional area as the second functional area. The computing system generates and stores results indicating if the first functional area comprises a same functional area as the second functional area.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ravi Shankar Arunachalam, Ahamed Jalaldeen
-
Publication number: 20120239447Abstract: A system and method for using product profiling to maximize load capacity of a vehicle. The method includes defining product profiles and retrieving product information associated with the product profiles. The method further includes performing cubing operations for products associated with the product information. The system includes components to perform the method steps.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard B. BETTES, Stephen E. JAFFE, Bret R. SANDEFUR, Matthew B. TREVATHAN
-
Publication number: 20120240117Abstract: Virtual machine management among networked servers coupled for data communications with a data communications network that includes a network device and a Virtual Machine Management Module (‘VMMM’), where VM management includes: monitoring, by the network device, network traffic of applications executing in virtual machines of the servers; determining, in dependence upon the monitored network traffic, whether a particular application's network traffic exceeds a predetermined threshold, the particular application executing in a particular virtual machine of a particular server; if the particular application's network traffic exceeds the predetermined threshold, allocating, by the VMMM, an additional virtual machine in a different server; and instantiating, by the VMMM, in the additional virtual machine at least one application.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: NILS P. HANSSON, BRUCE A. SMITH, EDWARD S. SUFFERN, JAMES L. WOOLDRIDGE
-
Publication number: 20120236110Abstract: A terminal device associated with a participant of the multipoint session can be identified. The multipoint session can be associated with a video and an audio stream. The terminal device can be a computing device comprising of an audio and video input, and a video output. The multipoint session can be a conference associated with a telephony session. The location of the terminal device and a conferencing device can be determined. The conferencing device can be associated with an audio input and output. If the terminal device is proximate to the conferencing device, a terminal device audio stream can be terminated and a conference device audio stream can be received. A video stream and an audio stream can be simultaneously presented upon the audio and video output of the conferencing device and terminal device. The video and the audio stream can be a synchronized stream of the session.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: DAVID M. OGLE, BRYAN D. OSENBACH
-
Publication number: 20120239797Abstract: Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold.Type: ApplicationFiled: March 14, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi AGRAWAL, Matthew DUGGAN, Vasileios PAPPAS, Mudhakar SRIVATSA, Kristian Jon STEWART, Murtaza ZAFER
-
Publication number: 20120238032Abstract: A Lab On a Chip (LOC) has a Sample Preparation Module (SPM) coupled to a sample inlet, a microchannel coupled to the SPM, and an optic module optically proximate to the microchannel. The optic module holds multiple lenses, each of which has a different effective focal length, such that all fields of focus within the microchannel are covered as objects suspended within the liquid sample pass through the microchannel.Type: ApplicationFiled: March 18, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: TIMOTHY DURNIAK, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER
-
Publication number: 20120235143Abstract: A vertical heterojunction bipolar transistor (HBT) includes doped polysilicon having a doping of a first conductivity type as a wide-gap-emitter with an energy bandgap of about 1.12 eV and doped single crystalline Ge having a doping of the second conductivity type as the base having the energy bandgap of about 0.66 eV. Doped single crystalline Ge having of doping of the first conductivity type is employed as the collector. Because the base and the collector include the same semiconductor material, i.e., Ge, having the same lattice constant, there is no lattice mismatch issue between the collector and the base. Further, because the emitter is polycrystalline and the base is single crystalline, there is no lattice mismatch issue between the base and the emitter.Type: ApplicationFiled: March 15, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jin Cai, Kevin K. Chan, Wilfried E. Haensch, Tak H. Ning