IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120233426Abstract: A data processing system includes a host and a plurality of locations. A difference recording operation between a first location of the plurality of locations and a second location of the plurality of locations is started. A first operational relationship between a third location of the plurality of locations and the first location is started. A signal is sent is response to the first operational relationship starting after the difference recording operation. A first dataset is updated in response to the host writing data to at least one of the first location or the second location. The first dataset is updated with changes to the first location in response to the signal.Type: ApplicationFiled: May 23, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John P. AGOMBAR, Christopher B.E. BEEKEN
-
Publication number: 20120233227Abstract: Files located on local or remote storage device are retrieved by determining that a link attachment of an electronic communication received at a computer device matches a pointer of a file directory structure of the computer device. The pointer allows retrieving within the file directory structure a file link and file identification information, and then accessing a file at a local or remote storage device by the file link and using the file identification information.Type: ApplicationFiled: September 8, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael E. Alexander, Jean-Claude Dispensa, Dominique Rossi-Chevrel, Zsolt Szalai
-
Publication number: 20120233670Abstract: A message that a user is requesting an access to a resource is received. The access is associated with a requested access level and is granted if an access path exists between the user and the resource for the requested access level. In response to the message reception, a first identifier of the user, a second identifier of the resource, the requested access level, and a first value that represents that the access to the resource was requested is stored in a record. All access paths usable to determine whether the user is authorized to access the resource are identified. Another security object including a flag to represent its usage in authorizing access to the resources is received. A decision is made with respect to whether the received other security object was used within one of the identified access paths as a function of its flag value.Type: ApplicationFiled: August 26, 2010Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Augustinus H. J. Bonnes, Hans Schoone
-
Publication number: 20120231622Abstract: A self-aligned interconnect structure is provided that includes a first patterned and cured low-k material located on a surface of a substrate, wherein the first patterned and cured low-k material includes at least one first interconnect pattern (via or trench pattern) therein. A second patterned and cured low-k material having at least one second interconnect pattern that is different from the first interconnect pattern is located atop the first patterned and cured low k material. A portion of the second patterned and cured low-k material partially fills the at least one first interconnect within the first patterned and cured low-k material. A conductive material fills the at least one first interconnect pattern and the at least one second interconnect pattern. A method of forming such a self-aligned interconnect structure is also provided.Type: ApplicationFiled: May 17, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Shyng-Tsong Chen, Qinghuang Lin, Sampath Purushothaman, Terry A. Spooner, Shawn M. Walsh
-
Publication number: 20120233673Abstract: A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in Internet protocol (IP) multimedia subsystem (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device.Type: ApplicationFiled: May 25, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mamdouh IBRAHIM, Sri RAMANATHAN, Tapas K. SOM, Matthew B. TREVATHAN
-
Publication number: 20120233607Abstract: Establishing relationships among elements in a computing system, the computing system including one or more servers, one or more switches, the one or more servers and one or more switches forming one or more local area networks and also forming one or more virtual local area networks, including: identifying, for each server in the computing system, physical topology data; identifying, for each server in the computing system, virtual topology data; and creating, in dependence upon the physical topology data and the virtual topology data, a system map.Type: ApplicationFiled: March 7, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: AKIHIKO KURODA, NIKITA MATHUR, SANKET S. SANGWIKAR
-
Publication number: 20120233614Abstract: Test coverage is enhanced by measuring various types of coupling between coverage tasks. The coupling measurements may be implicit coupling measurements, explicit coupling measurements, coding coupling measurements, performance coupling measurements, resource coupling measurements or the like. Based on the coupling measurements, different coverage tasks may be grouped together. For example, closely coupled coverage tasks may be grouped together. The groups may also be determined based on an initial distribution of groups, by combining groups having closely coupled member coverage tasks. The groups may be ordered and prioritized, such as based on the size of the groups and the number of uncovered tasks in each group. The groups may also be ordered, such as based on coupling score which aggregate the coupling measurements of the member coverage tasks.Type: ApplicationFiled: March 7, 2011Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Yoram Simha Adler, Rachel Tzoref-Brill, Moshe Klausner, Orna Pelleg Raz, Onn Menahem Shehory, Aviad Zlotnick
-
Publication number: 20120233148Abstract: Provided are techniques for creating one or more fine-grained access control rules that are associated with a base table. A materialized query table is created from the base table without applying the one or more fine-grained access control rules associated with the base table when obtaining data from the base table. A fine-grained access control protection indicator is turned on for the materialized query table. In response to receiving a direct access request to the materialized query table in a query referencing the materialized query table, access is provided to the data in the materialized query table by applying one or more fine-grained access control rules associated directly with the materialized query table to the data in the materialized query table before returning the data.Type: ApplicationFiled: March 9, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yao-Ching S. CHEN, Curt L. COTNER, Gerald G. KIERNAN, David J. KUANG, Irene C. LIU, Regina J. LIU, Walid RJAIBI, Timothy J. VINCENT
-
Publication number: 20120233223Abstract: In one embodiment, an extended data storage system employs a first data storage and an extended data storage. A first level of metadata is established with respect to data from the using entity, the first level of metadata is provided in the first data storage. The data from the using entity is stored in the extended data storage. A second level of metadata at least describing the data as stored in the extended data storage is also established, wherein the second level of metadata associated with the first level of metadata for the stored data. The first level of metadata is made accessible to the using entity at the first data storage; and the second level of metadata is made unavailable to the using entity. Thus, the data is stored in the extended data storage and a small amount of metadata is stored in the first data storage.Type: ApplicationFiled: May 22, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SAID A. AHMAD, SHAWN O. BRUME
-
Publication number: 20120233310Abstract: Embodiments of the present invention provide approaches (e.g., online methods) to analyze end-to-end performance issues in a multi-tier enterprise storage system (ESS), such as a storage cloud, where data may be distributed across multiple storage components. Specifically, performance and configuration data from different storage components (e.g., nodes) is collected and analyzed to identify nodes that are becoming (or may become) performance bottlenecks. In a typical embodiment, a set of components distributed among a set of tiers of an ESS is identified. For each component, a total capacity and a current load are determined. Based on these values, a utilization of each component is determined. Comparison of the utilization with a predetermined threshold and/or analysis of historical data allows one or more components causing a bottleneck to be identified.Type: ApplicationFiled: March 9, 2011Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Sandip Agarwala, David P. Goodman, Sandeep Gopisetty, David D. Weck
-
Publication number: 20120228771Abstract: An interconnect structure and method for forming a multi-layered seed layer for semiconductor interconnections are disclosed. Specifically, the method and structure involves utilizing sequential catalytic chemical vapor deposition, which is followed by annealing, to form the multi-layered seed layer of an interconnect structure. The multi-layered seed layer will improve electromigration resistance, decrease void formation, and enhance reliability of ultra-large-scale integration (ULSI) chips.Type: ApplicationFiled: March 10, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel C. Edelstein, Takeshi Nogami
-
Publication number: 20120228709Abstract: Disclosed is an integrated circuit having an asymmetric FET as a power gate for an electronic circuit, which has at least two stacked symmetric field effect transistors. The asymmetric FET has an asymmetric halo configuration (i.e., a single source-side halo or a source-side halo with a higher dopant concentration than a drain-side halo) and an asymmetric source/drain extension configuration (i.e., the source extension can be overlapped to a greater extent by the gate structure than the drain extension and/or the source extension can have a higher dopant concentration than the drain extension). As a result, the asymmetric FET has a low off current. In operation, the asymmetric FET is turned off when the electronic circuit is placed in a standby state and, due to the low off current (Ioff), effectively reduces standby leakage current from the electronic circuit.Type: ApplicationFiled: March 10, 2011Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Brent A. Anderson, Andres Bryant, Edward J. Nowak
-
Publication number: 20120233435Abstract: A memory management method in a virtualized computing environment is provided, in which a hypervisor implements at least a virtual machine (VM) over a host machine, wherein a guest operating system (OS) is executed over the VM and an application supporting memory management capabilities is executed over the guest OS. The method comprises invoking a first memory manager (java balloon) implemented by the application to deallocate memory allocated to the application for use by the hypervisor, in response to a request submitted by the hypervisor; and invoking a second memory manager (guest balloon) implemented over the guest operating system to deallocate memory allocated to the guest OS, in response to a request submitted by the hypervisor.Type: ApplicationFiled: March 13, 2011Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Shmuel Ben-Yehuda, Dilma Menezes Da Silva, Abel Gordon, Michael R. Hines
-
Publication number: 20120227846Abstract: A micro-electro-mechanical device includes a substrate; a piezoelectric actuator disposed on the substrate; and an elastic member affixed to the substrate at a first end thereof, and mechanically coupled to the piezoelectric actuator; wherein the elastic member comprises at least one of: a notch, a groove, and a recess.Type: ApplicationFiled: May 22, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Harish Bhaskaran, Michel Despont
-
Publication number: 20120230136Abstract: The present invention relates to a method and circuit for selectively repairing an embedded memory module having memory elements in an integrated circuit chip. The method comprises performing a plurality of tests on the embedded memory module under operating conditions to identify a plurality of non-operational memory elements in the embedded memory module and, in response to identifying the non-operational memory elements, generating a plurality of corresponding repair solutions. The method further comprises storing the plurality of corresponding repair solutions in a non-volatile storage element and determining from a mask a subset of the plurality of repair solutions that should be restored.Type: ApplicationFiled: March 8, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin William Gorman, John Robert Goss, Michael Richard Ouellette, Troy Joseph Perry, Michael Anthony Ziegerhofer
-
Publication number: 20120233510Abstract: A chip stack structure includes a logic chip having an active device surface, and memory slices of a memory unit vertically aligned such that a surface of the memory slices is oriented perpendicular to the active device surface of the logic chip. The chip stack structure also includes wiring patterned on an upper surface of the memory slices, the wiring electrically connecting memory leads of the memory slices to logic grids corresponding to logic grid connections of the logic chip.Type: ApplicationFiled: March 9, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Evan G. Colgan, Monty M. Denneau, Kimberley A. Kelly, Sampath Purushothaman, Roy R. Yu
-
Publication number: 20120230192Abstract: A network switch, in response to receipt from a source station of a Layer 2 reservation request, establishes a reservation for capacity of an ingress queue of the network switch for a data flow of the source station. In response to a queue overrun condition on the ingress queue of the network switch while the reservation is active, the network switch preserves data frames in the data flow of the source station transmitted pursuant to the reservation and discards other data frames.Type: ApplicationFiled: March 9, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: VINIT JAIN, JAMES F. MACON, JR., VIJOY A. PANDEY, RENATO J. RECIO
-
Publication number: 20120233299Abstract: A method, system and computer program product for managing system management agent configurations which include agent system management programs and program parameters in a distributed environment. A configuration management server sends upon request from the agents installed on the distributed system a description of their configuration. To this effect, the configuration management server maintains a database storing the agent configuration information, this database being usually updated by a system management administrator. The agents get from the server the list of peer distributed systems having the same agent configuration and their configuration from one distributed system of the list or obtain an agent configuration directly from the configuration management server if the peer distributed systems have modified their configuration. The agents advise the system management server when a new configuration has been installed.Type: ApplicationFiled: October 20, 2010Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Luisa Attanasio, Gianluca Gigliarelli, Francesco Lecciso, Gianluca Mariani, Antonio Secomandi
-
Publication number: 20120233429Abstract: A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes travelling up the cascaded architecture until the source of the data is found. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein.Type: ApplicationFiled: March 8, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael T. Benhase, Theresa M. Brown, Lokesh M. Gupta, Carol S. Mellgren
-
Publication number: 20120233479Abstract: A mechanism is provided for oversubscribing branch circuits. An active energy management mechanism determines a cumulative wattage rating using power consumption information for a powered element, the power consumption information is for a primary and a redundant portion of the powered element. The active energy management mechanism determines a power reduction power cap to be used by the powered element in the event of a loss of either a primary or a redundant power source supplied to the powered element using the cumulative wattage rating, a branch circuit rating, and a circuit breaker rating for the powered element. The active energy management mechanism sends the power reduction power cap to the powered element in order that the powered element reduces power to the power reduction power cap in the event of the loss of either the primary power source or the redundant power source supplied to the powered element.Type: ApplicationFiled: April 19, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Patrick K. Egan, Wesley M. Felter, Karthick Rajamani, Juan C. Rubio, Malcolm S. Ware
-
Publication number: 20120233221Abstract: For seamlessly abstracting metadata in multiple formats, an abstraction module converts first metadata of an incoming object and additional metadata for the incoming object from an annotation map contained by the first metadata into a common format useable. The additional metadata is not part of an original format of the first metadata. A communication module communicates the converted metadata to an adapter in the common format, the adapter processing the first metadata and the additional metadata independent of the original format of the first metadata.Type: ApplicationFiled: May 29, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Madhavi Katari, Travis E. Nelson, Suraksha Vidyarthi
-
Publication number: 20120233368Abstract: A networking system includes a host adapter card including a card connector having four transceiver pairs and a mechanical connector configuration, and a controller having control logic for detecting whether a single-channel connection or a four-channel connection is made to the card connector. The controller further includes control logic for communicating over a network using a default, four-channel-protocol in response to detecting the four-channel connection or using an alternative, single-channel-protocol in response to detecting the single-channel connection. The system further includes an alternative-network compatibility device including a first connector configured for releasably mating with the card connector and a second connector having a different mechanical connector configuration than the card connector.Type: ApplicationFiled: March 8, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shareef F. Alshinnawi, John J. Struble, JR., Edward S. Suffern, J. Mark Weber
-
Publication number: 20120233133Abstract: Method, system, and computer program product embodiments for recording data on a contactless integrated circuit (IC) memory associated with a data storage cartridge are provided. In one exemplary embodiment, an index of a plurality of files to be recorded on a storage media of the data storage cartridge is parsed with a table of contents (TOC) profile file to build a table of contents (TOC) specific to an owning application of the plurality of files. The TOC is written to the contactless IC memory.Type: ApplicationFiled: May 21, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shinobu FUJIHARA, Diana J. HELLMAN, Glen A. JAQUETTE
-
Publication number: 20120232880Abstract: An apparatus and a computer-implemented method performed by a computerized device comprising: receiving a model describing an aspect of a computer program; and determining comparative performance assessment of a property of the model by operating the model.Type: ApplicationFiled: March 13, 2011Publication date: September 13, 2012Applicant: International Business Machines CorporationInventor: Gad Haber
-
Publication number: 20120230081Abstract: Apparatus and method for measuring the state of a resistive memory cell. A bias voltage controller applies a bias voltage to the cell and controls the level of the bias voltage. A feedback signal generator senses cell current due to the bias voltage and generates a feedback signal (SFB) dependent on the difference between the cell current and a predetermined target current. The bias voltage controller controls the bias voltage level in dependence on the feedback signal (SFB) such that the cell current converges on the target current. An output is provided indicative of the bias voltage level at which the cell current corresponds to the target current, thus providing a voltage-based metric for cell-state.Type: ApplicationFiled: March 8, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Gael Close, Christoph Hagleitner, Angeliki Pantazi, Nikolaos Papandreou, Charalampos Pozidis, Abu Sebastian
-
Publication number: 20120233159Abstract: In response to a query of discernible facial attributes, the locations of distinct and different facial regions are estimated from face image data, each relevant to different attributes. Different features are extracted from the estimated facial regions from database facial images, which are ranked in base layer rankings by matching feature vectors in a bipartite graph to a base layer ranking sequence as a function of edge weights parameterized by an associated base layer parameter vector. Second-layer rankings define second-layer attribute vectors as bilinear combinations of the base-layer feature vectors and associated base layer parameter vectors for common attributes, which are matched in a bipartite graph to a second-layer ranking sequence as a function of edge weights parameterized by associated second-layer parameter vectors. The images are thus ranked for relevance to the query as a function of fusing the second-layer rankings.Type: ApplicationFiled: March 10, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ankur Datta, Rogerio S. Feris, Sharathchandra U. Pankanti, Daniel A. Vaquero
-
Publication number: 20120233422Abstract: A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume.Type: ApplicationFiled: May 16, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Theresa M. Brown, Nedlaya Y. Francisco, Matthew J. Kalos, Suguang Li, Beth A. Peterson
-
Publication number: 20120233609Abstract: Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance.Type: ApplicationFiled: March 10, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Blythe, Michael H. Dawson, Curtis E. Hrischuk, Aaron J. Quirk
-
Publication number: 20120233476Abstract: Managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices is provided. A receiver receives a policy comprising a power-management parameter, a first parameter and a rule associated with the policy. An analyser, responsive to receipt of a policy, analyzes second data associated with the rule. A determiner, responsive to the analysis, determines third data in accordance with the second data. The third data is associated with migration of the first data.Type: ApplicationFiled: May 16, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alastair Cooper, Robert B. Nicholson
-
Publication number: 20120230196Abstract: A network switch, in response to receipt from a source station of a Layer 2 reservation request, establishes a reservation for capacity of an ingress queue of the network switch for a data flow of the source station. In response to a queue overrun condition on the ingress queue of the network switch while the reservation is active, the network switch preserves data frames in the data flow of the source station transmitted pursuant to the reservation and discards other data frames.Type: ApplicationFiled: May 15, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: VINIT JAIN, JAMES F. MACON, JR., VIJOY A. PANDEY, RENATO J. RECIO
-
Publication number: 20120231442Abstract: A computer implemented method, apparatus, and computer usable program code for developing training for a client. Training delivery requirements for a client are identified. Assessment information is gathered. A training curriculum is developed based on the training delivery requirements and the assessment information. An amount of time required to complete the training is estimated to form a delivery estimate. The delivery estimate is translated into an estimate of resources required for development of training materials for the training. Verification is performed to verify that the client receives the training materials for delivery to an end user.Type: ApplicationFiled: May 22, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventor: James Patrick Collier, II
-
Publication number: 20120233669Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.Type: ApplicationFiled: May 24, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Dirk Husemann, Michael Elton Nidd
-
Publication number: 20120233180Abstract: One embodiment of the disclosure can represent within a K-partite graph, weighting factors between a set of identifier elements and a set of data elements. The K-partite graph can also represent weighting factors between the set of identifier elements and a set of metadata elements. In the K-partite graph, the set of identifier elements, the set of data elements, and the set of metadata elements are independent and disjoint sets such that no two vertices within a same set are adjacent. A score vector can be calculated that ranks each data element in a set of data elements. The score vector can be calculated from the weighting factors. At least one data element from the set of data elements can be selected using the score vector and a predetermined selection criterion.Type: ApplicationFiled: May 25, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: HANY M. HASSAN, AMGAD M. MADKOUR
-
Publication number: 20120233336Abstract: In an exemplary embodiment, a method is disclosed that includes, in an electronic device, forming a hypothesis that a situation exists based on one or more situation definitions and data from one or more sensors accessible by the electronic device. The method includes searching for other electronic devices via one or more network interfaces in the electronic device and establishing a network with one or more other electronic devices found during the searching. The method also includes receiving information from the one or more other electronic devices, the information corresponding to the situation. The method further includes, based at least on the information, modifying the hypothesis that the situation exists. Apparatus and computer readable memory media are also disclosed.Type: ApplicationFiled: March 11, 2011Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Kun Bai, David F. Bantz, Thomas E. Chefalas, Leslie S. Liu, Steven J. Mastrianni, James R. Moulic, Dennis G. Shea
-
Publication number: 20120233292Abstract: There is disclosed a method, system and computer readable medium for transferring data in a LAN-free environment, in particular for a tape backup or restore operation. Data of a client partition of a first server is sent to a partition of a LAN-free server through the Local Area Network (LAN). The data sent is then converted from TCP/IP protocol to Fibre Channel protocol. The converted data is sent to a Storage Area Network (SAN) through a Fibre Channel card and finally to a tape library. An advantage is thus to mutualize and virtualize resources, in particular Fibre Channel cards. Storage Area Network tape drives are shared using such host bus adapter cards. Certain embodiments avoid the reconfiguration of Storage Area Network tape drives when the client partition moves to a new hardware.Type: ApplicationFiled: May 24, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alain Lentini, Jarl Theuwissen
-
Publication number: 20120232962Abstract: A method and system is provided to manage and track changes in enterprise architectures. The invention provides a hierarchical visual management tool to manage and update relational information within an enterprise in a controlled fashion. The relationship may be maintained in a database and displayed via graphical user interface. Enterprise assets are categorized into such categories as goals, customer values or requirements, capabilities, resources, and the like. A hierarchy is constructed so that relationships between these various categories are identified and captured using the invention. Weights may be assigned to each element of the categories so that any proposed change to an enterprise architecture may be viewed so that a value can be ascertained and compared between other values of other proposed changes. In this manner, tracking and management of evolutionary changes to an architecture may be accomplished using relational information.Type: ApplicationFiled: May 24, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marybeth AHERN, Michael J. LAW
-
Publication number: 20120231554Abstract: A method and a structure for reworking an antireflective coating (ARC) layer over a semiconductor substrate. The method includes providing a substrate having a material layer, forming a planarization layer on the material layer, forming an organic solvent soluble layer on the planarization layer, forming an ARC layer on the organic solvent soluble layer, forming a pattern in the ARC layer, and removing the organic solvent soluble layer and the ARC layer with an organic solvent while leaving the planarization layer unremoved. The structure includes a substrate having a material layer, a planarization layer on the material layer, an organic solvent soluble layer on the planarization layer, and an ARC layer on the organic solvent soluble layer.Type: ApplicationFiled: May 10, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hakeem Akinmade Yusuff, John A. Fitzsimmons, Ranee Wai-Ling Kwong
-
Publication number: 20120233039Abstract: A method for inventory management performed by a computerized inventory management system includes, with an inventory management system, receiving an initial inventory line comprising an item, a quantity, and a bin. The method further includes, with the inventory management system providing a split quantity user interface window in response to determining that the quantity of the item exceeds an actual quantity stored at the bin, creating and displaying a plurality of new inventory lines to replace the first inventory line in response to an autosplit control of the user interface being engaged, the new inventory lines including different bins, and providing a control through the user interface window to allow manual adjustment of the new inventory lines.Type: ApplicationFiled: March 8, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin Buonagurio, Sarika Budhiraja
-
Publication number: 20120233121Abstract: A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple space-efficient (SE) targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A space-efficient (SE) target associated with the relation is then identified. A mapping structure maps data in logical tracks of the SE target to physical tracks of a repository. The method then identifies a sibling SE target that inherits data from the SE target. Once the SE target and the sibling SE target are identified, the method modifies the mapping structure to map the data in the physical tracks of the repository to the logical tracks of the sibling SE target. The relation is then deleted between the source and the SE target. A corresponding computer program product is also described herein.Type: ApplicationFiled: March 8, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael T. Benhase, JR., Theresa M. Brown, Lokesh M. Gupta, Rivka M. Matosevich, Carol S. Mellgren
-
Publication number: 20120229855Abstract: A method and associated system for servicing a print request from a specific client system of a plurality of client systems. A network connection between the specific client system and at least two printer server systems is set up response to receiving the print request from the specific client system. Client-specific information from a client profile is read from database accessible to each printer server system. At least one best-suited printer of the at least two printers is ascertained to be used for servicing the print request, utilizing the client-specific information, printer server information from a server profile, and printer information from a printer profile. The print request is serviced by the at least one best suited printer.Type: ApplicationFiled: May 17, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Jochen Heil
-
Publication number: 20120233423Abstract: A secondary storage controller receives metadata that uniquely identifies a source volume of a primary storage controller. Data stored in the source volume of the primary storage controller is synchronously copied to a target volume of the secondary storage controller. The secondary storage controller receives a command from a primary host to write selected data to the source volume. In response to receiving the command at the secondary storage controller, the selected data is written to the target volume of the secondary storage controller.Type: ApplicationFiled: May 21, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Joshua James Crawford, Benjamin J. Donie, Andreas Bernardus Mattias Koster, Leann Armstrong Vaterlaus
-
Publication number: 20120230097Abstract: A method, an apparatus, and a device for determining the state of a phase-change memory cell. The method includes the steps of: biasing a cell with a time-varying read voltage (Vread); making a measurement (TM) that satisfies a predetermined condition where the predetermined condition depends on a cell current when the read voltage is applied; and determining a state of the cell based on the measurement.Type: ApplicationFiled: March 8, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Urs Frey, Angeliki Pantazi, Nikolaos Papandreou, Charalampos Pozidis, Abu Sebastian
-
Publication number: 20120233332Abstract: The present invention provides for resource property aggregation. A set of new instances is received from one or more providers. For each new instance in the set of new instances, a determination is made as to whether the new instance represents a same resource as at least one other instance. Responsive to determining that the new instance represents the same resource as another instance, a set of properties associated with the new instance and with the at least one other instance are identified. Each property from the new instance is compared to an associated property in the at least one other instance using a set of precedence rules. At least one property value is identified from either the new instance or the at least one other instance. An aggregate instance is then generated that represents the resource using the identified property values.Type: ApplicationFiled: May 24, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: James R. Boykin, Alberto Giammaria, Patricia D. Griffin, Mark W. Johnson, Christopher A. Peters
-
Publication number: 20120233249Abstract: A system and method is provided to facilitate subscriber driven media agnostic content delivery across same or different networks. The method includes receiving preferences from a sending client and a receiving client and receiving content of a first media type over a network. The method further includes sending the content or a reference to the content to the receiving client in a preferred media type and to a preferred device in accordance with at least one preference of the receiving client. The method also includes notifying at least the receiving client that the content is to be received by the preferred device.Type: ApplicationFiled: May 25, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael E. ALEXANDER, Sri Ramanathan, Frank A. Schaffa, Matthew B. Trevathan
-
Publication number: 20120233153Abstract: Techniques are disclosed for generating a hierarchical view from a directory attribute stored in a directory. In one embodiment, a user request is received to query a directory attribute of a directory service. One or more search requests are issued against a directory service according to a protocol, where each search request specifies: (i) the directory attribute, (ii) a search key, and (iii) a maximum count of result entries to be returned by the directory service for the respective search request. The hierarchical view may be generated from result entries retrieved responsive to the one or more search requests.Type: ApplicationFiled: March 11, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John S. Roman, William A. Spencer
-
Publication number: 20120233276Abstract: A system for providing a local computer user with detailed activity information regarding remote users, in order to assist the local user in determining whether to initiate a communication session with a remote user. The system provides activity information describing the number of instant messaging sessions one or more remote users are currently involved in, the identities of participants in those sessions, activity levels, time period information, and other information. The system further provides detailed activity information describing recent instant messaging sessions of one or more remote users.Type: ApplicationFiled: May 19, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan Feinberg, Paul B. Moody, Daniel M. Gruen, Richard M. Wilson
-
Publication number: 20120230098Abstract: A method and apparatus for programming a phase-change memory cell. A bias voltage signal (VBL) is applied to the cell. A measurement portion (m) of this bias voltage signal has a profile which varies with time. A measurement (TM), which is dependent on a predetermined condition being satisfied, is then made. The predetermined condition is dependent on cell current during the measurement portion (m) of the bias voltage signal. A programming signal is generated in dependence on the measurement (TM), and the programming signal is applied to program the cell.Type: ApplicationFiled: March 8, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Urs Frey, Angeliki Pantazi, Nikolaos Papandreou, Charalampos Pozidis, Abu Sebastian
-
Publication number: 20120233182Abstract: A display of a source data model on a user interface component being associated with a target data model is provided. The source data model and the target data model comprise a collection of data types (class/object), each including a set of name and type attributes. For each source data type of the source data model, a matching target data type is determined among said target data types in the target data model. Said source data type is linked to said matching target data type. A display of said source data model using said link between a source data type and a target data type.Type: ApplicationFiled: April 21, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas Baudel, Frederic Delhoume
-
Publication number: 20120233683Abstract: A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in Internet protocol (IP) multimedia subsystem (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device.Type: ApplicationFiled: May 25, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mamdouh IBRAHIM, Sri RAMANATHAN, Tapas K. SOM, Matthew B. TREVATHAN
-
Publication number: 20120232884Abstract: A computer implemented method, system, and product for finding correspondence between terms in two different languages. The method includes the steps of: creating a technical term set and a general term set for each of i) a first language and ii) a second language, creating two bipartite graphs, where each graph corresponds to one of the two languages, and connects the technical term set and general term set of each language, respectively, with weighted links based on corpus information, creating a third bipartite graph by creating weighted links between general terms in the first language and general terms in the second language by using a translation dictionary, creating an association matrix M corresponding to the three bipartite graphs, calculating a similarity matrix Q by calculation of an inverse matrix, and outputting correspondence between the technical term sets of the first and second language on basis of the similarity matrix.Type: ApplicationFiled: March 7, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Tetsuya Nasukawa, Raymond Harry Rudy, Yuta Tsuboi, Yao-zhong Zhang