IBM Patent Applications

IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120198355
    Abstract: Embodiments of the invention relate to integrating a messaging system with at least one collaboration tool. According to one embodiment of the invention, in response to a user creating a message in a messaging system, information from the message is compared with data sets associated with the user. Each of the data sets correspond to a collaboration topic of the user for the at least one collaboration tool. At least one of the data sets is selected based on the comparison, and information indicating the one or more collaboration topics of the user that correspond to the at least one data set that is selected is presented to the user via a user interface, with the information suggesting to the user to post the message to the one or more corresponding collaboration topics of the user.
    Type: Application
    Filed: January 31, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Tessa A. LAU, Jalal U. Mahmud, Tara L. Matthews, Thomas P. Moran, Barton A. Smith, Stephen J. Whittaker
  • Publication number: 20120193599
    Abstract: An array of phase change memory cells is manufactured by forming a separation layer over an array of contacts, forming a patterning layer on the separation layer and forming an array of mask openings in the patterning layer using lithographic process. Etch masks are formed within the mask openings by a process that compensates for variation in the size of the mask openings that result from the lithographic process. The etch masks are used to etch through the separation layer to define an array of electrode openings exposing the underlying contacts. Electrode material is deposited within the electrode openings; and memory elements are formed over the bottom electrodes. Finally, bit lines are formed over the memory elements to complete the memory cells. In the resulting memory array, the critical dimension of the top surface of bottom electrode varies less than the width of the memory elements in the mask openings.
    Type: Application
    Filed: April 12, 2012
    Publication date: August 2, 2012
    Applicants: International Business Machines Corporation, Macronix International Co., Ltd.
    Inventors: Hsiang-Lan Lung, Chung Hon Lam, Matthew J. Breitwisch
  • Publication number: 20120198491
    Abstract: A set-top box device can detect a user interaction associated with a remote control proximate to the set-top box device. The set-top box device can store the user interaction within a storage device as user interaction data. The set-top box device can convey the user interaction data to a remotely located server. The set-top box device can receive a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile. The response can verify the identity of the user.
    Type: Application
    Filed: April 11, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: BRIAN M. O'CONNELL, KEITH R. WALKER
  • Publication number: 20120198413
    Abstract: An apparatus, method, and computer readable article of manufacture for obtaining working information in software engineering. The apparatus includes a sensor generator, configured to generate a sensor for a software tool used in software engineering according to the data storage manner of the software tool, such that the sensor detects the artifact change events associated with the software tool; and a central analyzer, configured to collect the artifact change events from the sensor, and analyze at least one attribute of the artifact change events, thereby obtaining working information. Also provided is a method corresponding to the apparatus described above. By using the apparatus and method for the invention, it can detect artifact change events for various software tools, and based on that, obtain various kinds of desired working information, therefore helping the collaboration of a team and the implementation of a project.
    Type: Application
    Filed: January 26, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Ya Bin Dang, Ying Liu, HuaFang Tan
  • Publication number: 20120196413
    Abstract: A method and structure implant a first-type impurity within a substrate to form a channel region within the substrate adjacent a top surface of the substrate; form a gate stack on the top surface of the substrate above the channel region; and implant a second-type impurity within the substrate to form source and drain regions within the substrate adjacent the top surface. The channel region is positioned between the source and drain regions. The second-type impurity has an opposite polarity with respect to the first-type impurity. The method and structure implant a greater concentration of the first-type impurity, relative to a concentration of the first-type impurity within the channel region, to form a primary body doping region within the substrate below (relative to the top surface) the channel region; and to form secondary body doping regions within the substrate below (relative to the top surface) the source and drain regions.
    Type: Application
    Filed: March 28, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Xiangdong Chen, Geng Wang, Da Zhang
  • Publication number: 20120197867
    Abstract: A method and apparatus for generating at least one data record in respect to a database query comprising a fetch command. A database may be updated according to the at least one data record. In an exemplary embodiment, a database management system may be tested by performing the database query against the database. In another exemplary embodiment, a data record that satisfies the database query is generated in order to increase coverage when testing a database management system.
    Type: Application
    Filed: April 15, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventor: Shady Copty
  • Publication number: 20120198190
    Abstract: A computer implemented method for automatically managing copies of source data volumes is provided. A copy management agent receives a message that target volume copies of source volumes are available. The copy management agent accesses the target volume copies of the source volumes. The copy management agent analyzes metadata for the target volume copies. The copy management agent determines whether any of the target volume copies is a boot volume copy based on the analyzed metadata. In response to a determination that one of the target volume copies is a boot volume copy, the copy management agent directs a provisioning agent to provision a new host for the target volume copies. The copy management agent directs the storage subsystem to present the target volume copies to a storage area network port associated with the new host. Then, the new host is booted using the boot volume copy.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brian Hart, Anil Kalavakolanu
  • Publication number: 20120198452
    Abstract: A mechanism is provided in a logically partitioned data processing system for controlling depth and latency of exit of a virtual processor's idle state. A virtualization layer generates a cede latency setting information (CLSI) data. Responsive to booting a logical partition, the virtualization layer communicates the CLSI data to an operating system (OS) of the logical partition. The OS determines, based on the CLSI data, a particular idle state of a virtual processor under a control of the OS. Responsive to the OS calling the virtualization layer, the OS communicates the particular idle state of the virtual processor to the virtualization layer for assigning the particular idle state and wake-up characteristics to the virtual processor.
    Type: Application
    Filed: April 12, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: RICHARD L. ARNDT, NARESH NAYAR, CHRISTOPHER FRANCOIS, KARTHICK RAJAMANI, FREEMAN L. RAWSON, III, RANDAL C. SWANBERG
  • Publication number: 20120198477
    Abstract: An event notification method for distributed processing systems provides reduction of queue space and event processing bandwidth associated with duplicate events such as a particular event that is duplicated and results in multiple event notifications propagated for multiple consumers. When a duplicate event notification is received at an input to an event notification queue, rather than queuing the duplicate event notification, a sequence number of the event notification already in the queue is updated to indicate to the event consumer, exactly how many duplicate events have been received. The timestamp of the updated event notification may also be set to the timestamp of the most recently received duplicate event notification.
    Type: Application
    Filed: March 22, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cheryl L. Jennings, Rajeev Mishra, Trishali Nayar, Lance W. Russell
  • Publication number: 20120198542
    Abstract: A mechanism is provided for sharing one or more security appliances. A trusted system component associated with an application of a plurality of applications in a logically partitioned data processing system sets a destination address of a received packet to an address of a security appliance shared by the plurality of applications. The trusted system component sends the received packet to the security appliance. The trusted system component receives a response from the security appliance. The trusted system component determines whether the response indicates permitting the received packet to proceed to the intended recipient. The trusted system component sends the received packet to the recipient in response to the response indicating permitting the received packet to proceed.
    Type: Application
    Filed: March 19, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Lap T. Huynh, Constantinos Kassimis, Jeffrey A. Lucovsky, Linwood H. Overby, JR., Jerry W. Stevens
  • Publication number: 20120198280
    Abstract: A method, and associated data processing system and computer program product, for generating test cases of different types for testing an application. A functional flow of the application is created based on a system design of the application. Additional test information corresponding to different stages of the functional flow with respect to a test types is generated. The generation of additional test information includes utilizing templates associated with the test types. The test cases are generated based on the additional test information and at least one test case generation rule. The test cases of different types are associated with one another.
    Type: Application
    Filed: January 3, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shu Xia Cao, Xue Feng Gao, De Shuo Kong
  • Publication number: 20120198568
    Abstract: An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an interface; and, a data repository connected to the interface stores the content. A portal connected to the data repository identifies an attempt to access the content from a non-user. A program processor connected to the portal determines whether the content includes a security classification. When the content does not include a security classification, a communications module connected to the program processor sends an alert to the user. The alert includes a request to assign a security classification to the content. When the content includes a security classification, the communications module sends a message to the user, wherein the message includes a request to verify the security classification.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Tamer E. Abuelsaad, John H. Handy-Bosma, Yael Ravin, William D. Morrison
  • Publication number: 20120197833
    Abstract: A system and related method for automating alert decision-making in a computer network are disclosed. The system and method act to receive an alert request from an event management system, and then carries out operations using several sets of inference rules, associating the alert request to a generic conceptual data model of alert request and alert resolution. The generic model is specialized to represent the specific environment being monitored. The alert request is enriched with contextual and network information in order to generate one or several alert resolution actions.
    Type: Application
    Filed: April 10, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventor: Freddy Lorge
  • Publication number: 20120198356
    Abstract: A plurality of emails having a same subject are identified. An inclusion relationship among the plurality of emails is determined. A user interface at an email client end is provided. The method includes on the user interface the plurality of emails and the inclusion relationship among the plurality of emails is graphically displayed, wherein the graphically displaying of the inclusion relationship comprises identifying content that is duplicated across at least two emails within the plurality of emails.
    Type: Application
    Filed: December 20, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Hong W. Ding, Jin Dong, Xiao Q. Wang, Minmin Qiu
  • Publication number: 20120198027
    Abstract: Embodiments of the invention relate to systematic migration of data. Data is streamed to data storage and stored in a virtual storage device (VSD). Stored data is systematically migrated from the VSD to a higher density VSD, while streaming of data is also switched to the higher density VSD. Source and target data extents are maintained and merged upon completion of the data migration, together with linking the streamed data blocks with the migrated data blocks in the order presented in the input stream.
    Type: Application
    Filed: January 27, 2011
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Robert Hetzler, Mario H. Lichtsinn, Hovey Raymond Strong, JR.
  • Publication number: 20120193680
    Abstract: A trench is formed by an anisotropic etch in a semiconductor material layer employing a masking layer, which can be gate spacers. In one embodiment, an adsorbed fluorine layer is provided at a cryogenic temperature only on vertical sidewalls of the semiconductor structure including the sidewalls of the trench. The adsorbed fluorine layer removes a controlled amount of the underlying semiconductor material once the temperature is raised above the cryogenic temperature. The trench can be filled with another semiconductor material to generate stress in the semiconductor material layer. In another embodiment, the semiconductor material is laterally etched by a plasma-based etch at a controlled rate while a horizontal portion of a contiguous oxide liner prevents etch of the semiconductor material from the bottom surface of the trench.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sebastian Ulrich Engelmann, Nicholas C.M. Fuller, Eric Andrew Joseph, Isaac Lauer, Ryan M. Martin, James Vichiconti, Ying Zhang
  • Publication number: 20120198202
    Abstract: A computer implemented method to establish at least one paging partition in a data processing system. The virtualization control point (VCP) reserves up to the subset of physical memory for use in the shared memory pool. The VCP configures at least one logical partition as a shared memory partition. The VCP assigns a paging partition to the shared memory pool. The VCP determines whether a user requests a redundant assignment of the paging partition to the shared memory pool. The VCP assigns a redundant paging partition to the shared memory pool, responsive to a determination that the user requests a redundant assignment. The VCP assigns a paging device to the shared memory pool. The hypervisor may transmit at least one paging request to a virtual asynchronous services interface configured to support a paging device stream.
    Type: Application
    Filed: April 12, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Richard L. Arndt, Carol B. Hernandez, Kyle A. Lucke, Timothy R. Marchini, Naresh Nayar, James A. Pafumi
  • Publication number: 20120198095
    Abstract: Mechanisms are provided for assigning addresses for use in communications between computing devices. With these mechanisms, a centralized domain name registrar server assigns a unique global identifier to a domain of a site such that the unique global identifier uniquely identifies the domain. The unique global identifier is received in a data processing system from the centralized domain name registrar server. The site is divided into a plurality of sub-domains and a unique sub-domain identifier is assigned to each sub-domain in the site such that the unique sub-domain identifier uniquely identifies a corresponding sub-domain in the site. The global identifier for the domain of the site and the sub-domain identifiers of the sub-domains in the plurality of sub-domains are provided by the data processing system to routers of the site for use in associating addresses with devices of the site.
    Type: Application
    Filed: April 13, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seth D. Jennings, Roocha K. Pandya, Prashant A. Paranjape
  • Publication number: 20120198269
    Abstract: Embodiments of the invention relate to block layout and block allocation in a file system to support transparency of application processing. At least one copy of an application is replicated in a write affinity region of a secondary server, and at least one copy of the application is replicated in a wide striping region across a cluster file system. When the application is subject to failure, application processing is transferred from the failure location to the write affinity copy. At the same time, the failed application is rebuilt using the wide striping replication of the application. Once the application is rebuilt, processing may return to the failed location employing the rebuilt application.
    Type: Application
    Filed: January 27, 2011
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Karan Gupta, Reshu Jain, Himabindu Pucha, Prasenjit Sarkar, Dinesh K. Subhraveti
  • Publication number: 20120194867
    Abstract: A method of integrating devices using radio frequency identification (RFID) technology can include tracking movement of an RFID tag, wherein the RFID tag is associated with a user, and determining proximity of the RFID tag to a communication device. The method also can include initiating a programmatic action with the communication device according to the proximity of the RFID tag to the communication device, wherein the programmatic action is associated with the user.
    Type: Application
    Filed: April 16, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JAMES P. APPLEYARD, SHANNON HARDT, SHIJU MATHAI
  • Publication number: 20120197485
    Abstract: A method for tuning a parameter of a Kalman filter in a wheel inspection for a vehicle. The method includes: associating wheel inspection data of the vehicle with locations of wheels in the vehicle; evaluating a wheel stable score of the vehicle based on the wheel inspection data and the association, wherein the wheel stable score indicates reliability of the wheel inspection; and tuning measurement error covariance of the Kalman filter according to the evaluated wheel stable score. By using the method, the parameter of the Kalman filter can be dynamically tuned to enable the Kalman filter to filter more accurately to ensure the correct result of the wheel inspection. In addition, an apparatus for tuning a parameter of a Kalman filter and a wheel inspection system for a vehicle are disclosed.
    Type: Application
    Filed: January 23, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Ning Duan, Ke Hu, Zhong Bo Jiang, Wen Tinh Mo, Wei Sun, Xin Zhang
  • Publication number: 20120198167
    Abstract: A processing unit includes a store-in lower level cache having reservation logic that determines presence or absence of a reservation and a processor core including a store-through upper level cache, an instruction execution unit, a load unit that, responsive to a hit in the upper level cache on a load-reserve operation generated through execution of a load-reserve instruction by the instruction execution unit, temporarily buffers a load target address of the load-reserve operation, and a flag indicating that the load-reserve operation bound to a value in the upper level cache. If a storage-modifying operation is received that conflicts with the load target address of the load-reserve operation, the processor core sets the flag to a particular state, and, responsive to execution of a store-conditional instruction, transmits an associated store-conditional operation to the lower level cache with a fail indication if the flag is set to the particular state.
    Type: Application
    Filed: April 12, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guy L. Guthrie, William J. Starke, Derek E. Williams
  • Publication number: 20120198557
    Abstract: Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source.
    Type: Application
    Filed: January 31, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Marco PISTOIA, Ori Segal, Omer Tripp
  • Publication number: 20120197932
    Abstract: For accessing a database, a request attribute module constructs a request attribute list for a data value name received in a request block. The request attribute list associates the data value name with an attribute name and with a schema name. A schema name module adds the schema name from the request attribute list to a schema names list in response to the schema name not being included in the schema names list. An attribute name module adds the attribute name from the request attribute list to an attribute names list in response to the attribute name not being included in the attribute names list. A query build module builds a query statement directed to a target database from the schema names list and the attribute names list.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Brian Paul Doyle
  • Publication number: 20120193236
    Abstract: A nanodevice is provided that includes a reservoir filled with a conductive fluid and a membrane separating the reservoir. The membrane includes an electrode layer having a tunneling junction formed therein. A nanopore is formed through the membrane, and the nanopore is formed through other layers of the membrane such that the nanopore is aligned with the tunneling junction of the electrode layer. When a voltage is applied to the electrode layer, a tunneling current is generated by a base in the tunneling junction to be measured as a signature for distinguishing the base. When an organic coating is formed on an inside surface of the tunneling junction, transient bonds are formed between the electrode layer and the base.
    Type: Application
    Filed: January 27, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hongbo Peng, Stephen M. Rossnagel, Ajay K. Royyuru, Gustavo A. Stolovitky, Deqiang Wang
  • Publication number: 20120198429
    Abstract: Mechanisms are provided for arranging binary code to reduce instruction cache conflict misses. These mechanisms generate a call graph of a portion of code. Nodes and edges in the call graph are weighted to generate a weighted call graph. The weighted call graph is then partitioned according to the weights, affinities between nodes of the call graph, and the size of cache lines in an instruction cache of the data processing system, so that binary code associated with one or more subsets of nodes in the call graph are combined into individual cache lines based on the partitioning. The binary code corresponding to the partitioned call graph is then output for execution in a computing device.
    Type: Application
    Filed: April 12, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tong Chen, Brian Flachs, Brad W. Michael, Mark R. Nutter, John K.P. O'Brien, Kathryn M. O'Brien, Tao Zhang
  • Publication number: 20120197854
    Abstract: A method for finding sequential patterns of attributes in a directed graph includes constructing a directed graph comprising multiple nodes and edges between the nodes. Each of the nodes may be assigned one or more attributes. Similarly, each of the edges may be assigned a weight value which may indicate the probably the edge will be traversed during traversal of the directed graph. The method may further include finding sequences of attributes in the directed graph that have some minimum amount of frequency and/or time support. In performing this step, the frequency support of each individual instance of a sequence of attributes may be calculated by multiplying the weight values along the edge or edges of the instance. A corresponding apparatus and computer program product are also disclosed and claimed herein.
    Type: Application
    Filed: March 27, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jose Nelson Amaral, Adam Paul Jocksch, Marcel Mitran
  • Publication number: 20120198150
    Abstract: Provided are a computer program product, system, and method for assigning device adaptors and background tasks to use to copy source extents to target extents in a copy relationship. A relation is provided of a plurality of source extents in source ranks to copy to a plurality of target extents in target ranks in the storage system. One target rank in the relation is used to determine an order in which the target ranks in the relation are selected to register for copying. For each selected target rank in the relation selected according to the determined order, an iteration of a registration operation is performed to register the selected target rank and a selected source rank copied to the selected target rank in the relation.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael T. Benhase, Theresa M. Brown, Lokesh M. Gupta, Carol S. Mellgren
  • Publication number: 20120198451
    Abstract: According to one aspect of the present disclosure, a method and technique for preprovisioning virtual machines is disclosed. The method includes analyzing requests for a plurality of different virtual machine (VM) configurations where each VM configuration has a plurality of configuration attributes. The method also includes determining a request frequency corresponding to each requested VM configuration, determining a configuration of each provisioned VM, and responsive to determining the configuration of each provisioned VM, determining a configuration for a preprovisioned VM based on a request frequency of the different VM configurations and the configurations of the provisioned VMs. The method further includes creating the preprovisioned VM.
    Type: Application
    Filed: April 10, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manish Gupta, Neeran M. Karnik
  • Publication number: 20120198216
    Abstract: A monitoring facility that is operable in two modes allowing compatibility with prior existing monitoring facilities. In one mode, in response to encountering a monitored event, an interrupt is generated. In another mode, in response to encountering a monitored event, one or more associated counters are incremented without causing an interrupt.
    Type: Application
    Filed: April 13, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dan Greiner, James H. Mulder, Robert R. Rogers, Robert W. Stjohn
  • Publication number: 20120198564
    Abstract: An embodiment of the invention includes a method and system for content management. More specifically, the system includes a user interface for receiving content from a user and a data repository connected to the user interface for storing the content. The user interface also receives a request to access the content from the user. A program processor is connected to the data repository, wherein the program processor determines whether the content includes a security classification. A communications module is connected to the program processor, wherein the communications module sends an alert to the user interface when the content does not include a security classification. The alert includes a request to assign a security classification to the content.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Tamer E. Abuelsaad, John H. Handy-Bosma, Yael Ravin, William D. Morrison
  • Publication number: 20120198178
    Abstract: One embodiment provides a cached memory system including a memory cache and a plurality of read-claim (RC) machines configured for performing read and write operations dispatched from a processor. According to control logic provided with the cached memory system, a hazard is detected between first and second read or write operations being handled by first and second RC machines. The second RC machine is suspended and a subset of the address bits of the second operation at specific bit positions are recorded. The subset of address bits of the first operation at the specific bit positions are broadcast in response to the first operation being completed. The second operation is then re-requested.
    Type: Application
    Filed: January 31, 2011
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jason A. Cox, Robert J. Dorsey, Kevin CK Lin, Eric F. Robinson
  • Publication number: 20120198153
    Abstract: A data storage system comprises a controller, a first lower performance storage medium and a second higher performance storage medium. The controller is connected to the storage mediums and is arranged to control Input/Output (IO) access to the storage mediums. In operation, the controller is arranged to store an image on the first storage medium, initiate a copy function from the first storage medium to the second storage medium, direct all IO access for the image to the second storage medium, and periodically age data from the second storage medium to the first storage medium.
    Type: Application
    Filed: August 26, 2010
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Carlos Francisco Fuente, William James Scales, Barry Douglas Whyte
  • Publication number: 20120197951
    Abstract: A computer implemented method to handle events based on historic actions. An event-handler receives an event, wherein the event has an associated event-type. The event-handler records the event to an event-action history table. The event-handler determines a history associated with the event by reading the event-action history table. The event-handler looks up a row entry in an action table based at least in part on the event-type, wherein the row entry comprises an action. The event-handler executes at least one instruction of the action. The event-handler records the event and action data to the event-action history table.
    Type: Application
    Filed: March 29, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanaa Abdelhadi, Guoyou Chen, Kenneth Bruce MacKenzie, David W. Nip
  • Publication number: 20120197942
    Abstract: Illustrative embodiments disclose a computer process controlling access to one or more documents by one or more parties, the parties organized over one or more organizations. In response to a party associated with a first organization attempting to access documents, determining an access level associated with the party as a first access level, a second access level, a third access level, or a fourth access level. The first, second, third and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. In response to determining the access level associated with the party, permitting the party to access the documents, or preventing the party from accessing the documents, according to the access level associated with the party.
    Type: Application
    Filed: April 10, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhial Shah
  • Publication number: 20120194792
    Abstract: A method and system to predict lithography focus error using chip topography data is disclosed. The chip topography data may be measured or simulated topography data. A plane is best fitted to the topography data, and residuals are computed. The residuals are then used to make a prediction regarding the focus error. The density ratio of metal to dielectric may also be used as a factor in determining the predicted focus error.
    Type: Application
    Filed: January 27, 2011
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brian Christopher Sapp, Choongyeun Cho, Lawrence A. Clevenger, Laertis Economikos, Bernhard R. Liegl, Kevin S. Petrarca, Roger Allan Quon
  • Publication number: 20120197803
    Abstract: Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barbara Febonio, Sandro Piccinini
  • Publication number: 20120198428
    Abstract: A compiler compiles code in a target program for later execution with a dynamic binary optimizer by including aliasing information with the compiled code. When the program is subsequently executed, the dynamic binary optimizer accesses the aliasing information to determine whether certain optimizations can be safely performed. Preferably, the aliasing information includes a memory reference index assigning an index to each memory reference instruction and a may-alias bit matrix indicating, for each memory reference instruction, which other memory reference instructions might reference the same memory location. Aliasing information is preferably used by the optimizer during execution to safely re-order operations.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventor: William J. Schmidt
  • Publication number: 20120198200
    Abstract: A computer-implemented method, system, apparatus, and article of manufacture for memory overload management. The method includes: collecting memory application information of at least one node of a computer system that is implementing the method; predicting a memory overload period and an overload memory size of a first node where memory overload will occur based on the memory application information; and scheduling a memory space according to the memory overload period and the overload memory size.
    Type: Application
    Filed: January 30, 2012
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Li Li, Ju Wei Shi, Wen Jie Wang, Bo Yang
  • Publication number: 20120198285
    Abstract: In one embodiment, a computer program product for first time data capture includes a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code is configured to run jobs on a systems complex (sysplex), to trace the jobs running on the sysplex, to monitor each of the jobs running on the sysplex for an unexpected action by any of the jobs, and to store information relating to each unexpected action performed by any of the jobs into an entry of a data store. In another embodiment, a method includes running jobs on a sysplex, tracing the jobs running on the sysplex, monitoring each of the jobs running on the sysplex for an unexpected action by any of the jobs, and storing information relating to each unexpected action performed by any of the jobs into an entry of a data store.
    Type: Application
    Filed: January 31, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Arthur J. Bariska, JR., Marc A. Martin, Thaiese N. Trader
  • Publication number: 20120193715
    Abstract: A trench is formed by an anisotropic etch in a semiconductor material layer employing a masking layer, which can be gate spacers. In one embodiment, an adsorbed fluorine layer is provided at a cryogenic temperature only on vertical sidewalls of the semiconductor structure including the sidewalls of the trench. The adsorbed fluorine layer removes a controlled amount of the underlying semiconductor material once the temperature is raised above the cryogenic temperature. The trench can be filled with another semiconductor material to generate stress in the semiconductor material layer. In another embodiment, the semiconductor material is laterally etched by a plasma-based etch at a controlled rate while a horizontal portion of a contiguous oxide liner prevents etch of the semiconductor material from the bottom surface of the trench.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sebastian Ulrich Engelmann, Nicholas C.M. Fuller, Eric Andrew Joseph, Isaac Lauer, Ryan M. Martin, James Vichiconti, Ying Zhang
  • Publication number: 20120197768
    Abstract: A system for performing an inventory count. A scan of an object is initiated according to a profile in order to perform the inventory count of the object. A scan result is compared with a recorded level for the object to determine if a variance exists between the scan result and the recorded level. A variance analysis is performed if the variance exists.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: George Michael Hurtis, Ivory Wellman Knipfer, Manivannan Thavasi, Thembani Togwe
  • Publication number: 20120198111
    Abstract: Controlling access to a resource by a plurality of resource requesters is disclosed. The resource lock operates in a contention efficient (heavyweight) operating mode, and in response to a request from a resource requester to acquire the resource lock, a count of a total number of acquisitions of the resource lock in the contention efficient operating mode is incremented. In response to access to the resource not being contended by more than one resource requester, a count of a number of uncontended acquisitions of the resource lock in the contention efficient operating mode is incremented, and a contention rate is calculated as the number of uncontended acquisitions in the contention efficient operating mode divided by the total number of acquisitions in the contention efficient operating mode. In response to the contention rate meeting a threshold contention rate, the resource lock is changed to a non-contention efficient (lightweight) operating mode.
    Type: Application
    Filed: March 13, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: DAVID K. SIEGWART
  • Publication number: 20120198417
    Abstract: Preparing a computer software application for static analysis by identifying a control flow within a model portion of a computer software application having a model-view-controller architecture, where the control flow passes a value to a controller portion of the computer software application, analyzing a declarative specification of the controller portion of the computer software application to identify a view to which the controller portion passes control based on the value, and synthesizing a method within the computer software application, where the method calls the view.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yinnon A. HAVIV, Omer TRIPP, Omri WEISMAN
  • Publication number: 20120198566
    Abstract: A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version of the media data is sent to one or more recipient(s). After confirming identity of a recipient at a receiving system, a supplemental version of the media data is sent to the receiving system which augments the degraded version such that it can then be played by the recipient(s). The degraded version of the media data has a reduced quality that is obtained by removing portions of the data and filling in the removed portions with dummy data. During a subsequent rebuilding of the media data, a supplemental version of the media data is sent to the receiving data processing system where it is merged/combined with the degraded version to form a copy that corresponds to the original, high-quality version of the media data.
    Type: Application
    Filed: April 11, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rob A. Gearhart, Liam Harpur, Mark Kelly, John Rice
  • Publication number: 20120198275
    Abstract: Systems and methods for transforming a logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Transforming the logical data object comprises creating in the storage device a transformed logical data object comprising one or more allocated storage sections with a predefined size; transforming one or more sequentially obtained chunks of obtained data corresponding to the transforming logical data object; and sequentially storing the processed data chunks into said storage sections in accordance with a receive order of said chunks, wherein said storage sections serve as atomic elements of transformation/de-transformation operations during input/output transactions on the logical data object.
    Type: Application
    Filed: April 13, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chaim KOIFMAN, Nadav KEDEM, Avi ZOHAR
  • Publication number: 20120198523
    Abstract: Provided are a method, system, and computer storage device for managing zone information for devices in a network. A zone table includes entries indicating whether devices in at least one zone are permitted to communicate. An attributes table has attributes of the devices indicated in the zone table. A determination is made of attributes from the attributes table for devices indicated in the zone table entries as being permitted to communicate. The entries in the zone table indicating that devices can communicate are verified by determining whether the attributes for the devices indicated as permitted to communicate in the entries in the zone table are consistent with the determined devices being able to communicate. Information is outputted indicating whether the entries in the zone table indicating that devices can communicate are in error.
    Type: Application
    Filed: April 13, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yoshitaka Matsumoto, Yoshihiko Terashita, Hiroyuki Tanaka
  • Publication number: 20120193833
    Abstract: A method and apparatus are provided to deposit conductive bonding material into cavities in a mold. A fill head is placed in substantial contact with a mold that includes cavities. The fill head includes a sealing member that substantially encompasses an entire area to be filled with conductive bonding material. The conductive bonding material is forced out of the fill head toward the mold. The conductive bonding material is provided into at least one cavity of the cavities contemporaneous with the at least one cavity being in proximity to the fill head.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Russell A. BUDD, John P. KARIDIS, Mark D. SCHULTZ
  • Publication number: 20120193678
    Abstract: Exemplary embodiments include a method for fabricating a heterojunction tunnel field-effect-transistor (FET), the method including forming a gate region on a silicon layer of a silicon-on-insulator (SOI) substrate, forming a drain region on the silicon layer adjacent the gate region and forming a vertical heterojunction source region adjacent the gate region, wherein the vertical heterojunction source region generates a tunnel path inline with a gate field associated with the gate region.
    Type: Application
    Filed: March 26, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Isaac Lauer, Amlan Majumdar, Paul M. Solomon, Steven J. Koester
  • Publication number: 20120193710
    Abstract: A device and method for reducing junction leakage in a semiconductor junction includes forming a faceted raised structure in a source/drain region of the device. Dopants are diffused from the faceted raised structure into a substrate below the faceted raised structure to form source/drain regions. A sprinkle implantation is applied on the faceted raised structure to produce a multi-depth dopant profile in the substrate for the source/drain regions.
    Type: Application
    Filed: April 13, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kanggou Cheng, Bruce B. Doris, Ali Khakifirooz, Pranita Kulkarni, Ghavam G. Shahidi