IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120159132Abstract: Mechanisms are provided for a network processor comprising a parser, the parser being operable to work in normal operation mode or in repeat operation mode, the parser in normal operation mode loading and executing at least one rule in a first and a second working cycle respectively, the parser in repeat operation mode being operable to repeatedly execute a repeat-instruction, the execution of each repeat corresponding to one working cycle.Type: ApplicationFiled: July 15, 2011Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Francois Abel, Jean L. Calvignac, Chih-jen Chang, Philippe Damon, Fabrice J. Verplanken
-
Publication number: 20120158697Abstract: Embodiments of the present invention address deficiencies of the art in respect to subscribing and updating nodes within XML documents and provide a novel and non-obvious method, system and computer program product for matching various combinations of XML Path Language (XPATH) Uniform Resource Identifiers (URIs). In one embodiment of the invention, a method for matching various combinations of XML Path Language (XPATH) Uniform Resource Identifiers (URIs) that includes receiving a XPATH expression for a node in an XML document, retrieving the node identified by the XPATH expression, determining if a template exists for the identified node, where the template resides in a database of a document management system, comparing the template expression to the XPATH expression and determining if the expressions match.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Valerie M. BENNETT, Benson K. CHEN, Stephen M. HINTON, Douglas S. WILLIAMS
-
Publication number: 20120155494Abstract: A network packet includes a packet key that includes one or more source-destination field pairs that each include a source field and a destination field. For each selected source-destination field pair, first and second sections are selected in the packet key. A source field value is extracted from the source field and a destination field value is extracted from the destination field. For each source bit of the source field value: a destination bit is selected from the destination field; an OR logic function is applied to the source bit and the destination bit to generate a first resulting value stored at the same bit position as the source bit in the first section; an AND logic function is applied to the source bit and the destination bit to generate a second resulting value stored at the same bit position as the source bit in the second section.Type: ApplicationFiled: December 14, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CLAUDE BASSO, JEAN L. CALVIGNAC, NATARAJAN VAIDHYANATHAN, FABRICE VERPLANKEN
-
Publication number: 20120159466Abstract: Embodiments of the present invention provide a method, system and computer program product for dynamic selection of a runtime classloader for a generated class file. In an embodiment of the invention, a method for dynamic selection of a runtime classloader for a generated class file is provided. The method includes extracting meta-data from a program object directed for execution in an application server and determining from the meta-data a container identity for a container in which the program object had been compiled. The method also includes selecting a container according to the meta-data. Finally, the method includes classloading the program object in the selected container.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Erik J. Burckart, Andrew Ivory, Todd E. Kaplinger, Stephen J. Kenna, Aaron K. Shook
-
Publication number: 20120159417Abstract: A task-based multi-process design synthesis methodology relies on a plurality of child processes to assist a parent process in performing optimizations on an integrated circuit design. Objects from an integrated circuit design are grouped into subsets and assigned to child processes, with each child process performing a transform on each of the objects in the subset assigned to that child process and determining which of the objects in the subset are candidate objects for which performance of the transform has been successful. The child processes then notify the parent process of those objects that qualify as candidate objects, so that the parent process only has to perform the transform on the candidate objects, thereby relieving the parent process from the overhead associated with performing the transform on non-candidate objects for which the transform has been determined by the child processes as not being successful.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony D. Drumm, Jagannathan Narasimhan, Lakshmi N. Reddy, Louise H. Trevillyan, Brian C. Wilson
-
Publication number: 20120158836Abstract: A method in a distributed computer system includes a server and a client and is for delivering Web content within a body section of electronic mail messages. The method includes receiving at a server, at least one mail message containing an embedded hyperlink. The method includes downloading Web content associated with the hyperlink into the message store at the server. The method also includes transmitting the mail message and at least one of a link to the Web content downloaded into the message store at the server and the corresponding Web content for display at the client. The method includes determining whether the client has a preset time for downloading messages containing Web content. In response to determining that a preset time for downloading Web content exists, the method includes caching the message and Web content at the server until the preset time is reached.Type: ApplicationFiled: March 1, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Kulvir Singh Bhogal, Ishmael Nizamudeen, JR., Javid Jameossanaie
-
Publication number: 20120159203Abstract: A method, system, and computer program for using an array of networked 3D voltage regulation modules (VRMs) to optimize power usage by components on a voltage island in real time is presented. The networked VRM devices work in parallel to supply adequate power to connected voltage islands, and to supplement other VRMs in the system that may require additional power in the case of a critical event.Type: ApplicationFiled: February 17, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gilles Gervais, Alain Loiseau, Kirk D. Peterson, Norman J. Rohrer
-
Publication number: 20120159004Abstract: A first interconnect card is configured, wherein a first controller is included in the first interconnect card. A second interconnect card coupled to the first interconnect card is configured, wherein a second controller is included in the second interconnect card. In response to a failure of the first controller included in the first interconnect card, the first interconnect card is controlled via the second controller included in the second interconnect card. In response to a failure of the second controller included in the second interconnect card, the second interconnect card is controlled via the first controller included in the first interconnect card.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lee Dale Cleveland, Seth David Lewis, Christopher William Mann, Andrew Dale Walls
-
Publication number: 20120158679Abstract: A database trigger generates a return code having the effect of inhibiting further executions of the trigger within a pre-defined scope of execution. Preferably, the pre-defined scope is a task or process executing on behalf of a particular user. Upon first encountering the applicable trigger condition, the corresponding trigger is fired normally. Internal logic within the trigger determines whether it is necessary to call the same trigger again within the same scope, and if not, generates corresponding return data. A database management system which manages the trigger and causes it to automatically fire intercepts the return data and disables further firing of the trigger for the pre-defined scope.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Mark J. Anderson
-
Publication number: 20120159399Abstract: A table navigation system includes: a table identifier to identify a table and columns within the table; a navigation identifier to determine whether a navigation input by a user to navigate within a column of the table exceeds a threshold, wherein the threshold relates to an expectation of continued navigation input by the user; a filter to filter unique elements in the column into separate categories; and a display engine to present the into separate categories in an interactive display that overlays the table.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul R. Bastide, Matthew E. Broomhall, Robert E. Loredo
-
Publication number: 20120159332Abstract: A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.Type: ApplicationFiled: December 14, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SANDRO PICCININI, LUIGI PICHETTI, MARCO SECCHI, STEFANO SIDOTI
-
Publication number: 20120159400Abstract: A system for learned mouse affinities, including: a context listener to determine a context in which a user is operating, wherein the context listener also listens for an occurrence of a trigger event within the context; a mouse listener to recognize a mouse action by the user; and a mapping stored on a memory device, wherein the mapping includes mouse actions mapped to context actions, wherein the context actions correspond to the trigger event, wherein the context action is implemented in response to the mouse action according to the profile and after the occurrence of the trigger event.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Liam Harpur, Mark Kelly, John Rice
-
Publication number: 20120152448Abstract: Layered nanostructures are constructed by imprinting material with a mold, while selectively modifying and removing a portion of the mold. The mold, which includes a pattern of features, is modified so that the portion of the mold that includes the features is made chemically and/or physically distinct from the rest of the mold. That portion of the mold that includes the features is retained while the rest of the mold is removed. The retained portion of the mold provides mechanical support for any adjoining layer or layers.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: FAHHAD H. ALHARBI, JOHN D. BASS, HO-CHEOL KIM, ROBERT D. MILLER
-
Publication number: 20120153248Abstract: A switching circuit includes a plurality of three-terminal PCM switching devices connected between a voltage supply terminal and a sub-block of logic. Each of the switching devices includes a PCM disposed in contact between a first terminal and a second terminal, a heating device disposed in contact between the second terminal and a third terminal, the heating device positioned proximate the PCM, and configured to switch the conductivity of a transformable portion of the PCM between a lower resistance state and a higher resistance state; and an insulating layer configured to electrically isolate the heater from said PCM material, and the heater from the first terminal. The third terminal of a first of the PCM switching devices is coupled to a set/reset switch, and the third terminal of the remaining PCM switching devices is coupled to the second terminal of an adjacent PCM switching device in a cascade configuration.Type: ApplicationFiled: February 27, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lia Krusin-Elbaum, Dennis M. Newns, Matthew R. Wordeman
-
Publication number: 20120159245Abstract: Error handling is simplified for a self-virtualizing IO resource that utilizes a physical function adjunct partition for a physical function in the self-virtualizing IO resource to coordinate error recovery for the self-virtualizing IO resource, by restarting each virtual function adjunct partition associated with that physical function to avoid the need to coordinate error recovery within the logical partitions to which such virtual function adjunct partitions are assigned.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean T. Brownlow, Charles S. Graham, Andrew T. Koch, Adam C. Lange-Pearson, Kyle A. Lucke, Gregory M. Nordstrom, John R. Oberly, III
-
Publication number: 20120158572Abstract: A computer implemented method, a data processing system, and a computer readable storage medium having a computer program product encoded thereon for determining a probability of an action being performed by a party at risk of performing the action. Input information that is pertinent to determining whether the party is at risk of performing the action is received by a data processing system. The data processing system forms an incentive structure for the party based on the received input information, the incentive structure comprising a probability of the party performing the action, and determines an optimal probability of the party performing the action based on the formed incentive structure.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chitra Dorai, Eric R. Ray, Gary L. Seybold, Anshul Sheopuri
-
Publication number: 20120158418Abstract: A system and method to distribute disaster information to a customer. An information distribution apparatus for distributing disaster information to a customer terminal includes a disaster information storage for storing disaster-occurred district information for identifying a disaster-occurred district in which a disaster has occurred and a real disaster level corresponding to the disaster selected from a plurality of preset disaster levels; a customer information registration unit for registering customer district information; a distribution information management unit for deciding whether the disaster information is distributed to the customer by collating the disaster-occurred district with the customer district with respect to the disaster level; and an information distribution unit for distributing disaster information to the terminal according to a decision of the distribution information management unit.Type: ApplicationFiled: February 27, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Keiichi ICHIKAWA, Yukio OHTSUKI
-
Publication number: 20120159117Abstract: In an embodiment, an address watch is established on a memory address while the execution of a first thread of a program is halted. In response to a second thread modifying memory contents at the memory address, encountering the address watch and halting, a determination is made whether a first variable in the program that represents the memory address is displayed on a user interface for the first thread. If the first variable in the program that represents the memory address is displayed on the user interface for the first thread, the value of the first variable is read and displayed on the user interface of the first thread.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Cary L. Bates
-
Publication number: 20120155634Abstract: A system, method and program product for utilizing a steganographic process to hide data element in a carrier object. A system is disclosed that includes: a pivot object generator that generates a pivot object having a key hidden therein, wherein the key is hidden in the pivot object based on an inputted salt; and a carrier object generator that generates a carrier object having a data element hidden therein using a steganographic hiding system, wherein the steganographic hiding system requires utilization of the key to extract the data element from the carrier object.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, Christian Eggenberger-Wang, Peter K. Malkin, Marc P. Yvon
-
Publication number: 20120159365Abstract: In an embodiment, a command is received that designates a base shape. A navigation order of a plurality of shapes relative to the base shape is determined, where the plurality of shapes are adjacent to the base shape. The navigation order is presented by presenting identifiers of the plurality of shapes and an ordered sequence of the plurality of shapes. Focus is moved between the plurality of shapes in the navigation order after the navigation order is presented.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian J. Cragun, Makoto Kuwabara, James S. Taylor
-
Publication number: 20120159006Abstract: Provided are techniques for storing one or more storage rules for each of one or more storage locations, along with one or more actions to be taken for each storage rule that is violated, intercepting an I/O operation issued to the storage subsystem, and determining whether the I/O operation violates one or more of the storage rules. In response to determining that the I/O operation violates one or more of the storage rules, an application that issued the I/O operation is identified and each of the one or more actions associated with the one or more violated storage rules are performed.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gavin S. Johnson, Michael J. Koester, John R. Paveza, Carrie J. Van Noorden
-
Publication number: 20120158628Abstract: A technique for detecting missing rules (mr) with most general conditions in a rule project (1) having a given scope with a fixed number of objects of a given type, wherein each rule (r) is defined by at least one test (t) in respect to at least one condition of at least one attribute (age, value) of the object, the method comprising the steps of finding at least one missing case not covered by the rules (r), identifying a list of tests (t) that occur in the rules (r), generalizing the missing case into a family of missing cases (mc) in terms of the tests (t) occurring in the rules (r), generalizing the family of missing cases (mc) into a missing rule (mr), and generating missing rules (mr) with most general conditions.Type: ApplicationFiled: December 21, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Ulrich M. Junker
-
Publication number: 20120154179Abstract: A method for identifying a potential vehicle incident within a communication black spot. It is identified when a vehicle has entered a communication black spot. It is further identified when the vehicle has failed to exit the communication black spot within a determined time period. It is then determined whether it is likely that the vehicle has failed to exit the communication black spot within the determined time period due to being involved in an incident (or whether there is another reasonable explanation for a vehicle's failure to exit). If it is determined that it is likely that the vehicle has been involved in an incident within the communication black spot, a third party can be alerted (by a service provider) to the potential that an incident has occurred within the communication black spot.Type: ApplicationFiled: February 26, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Simon E. Burns, Nicholas C. Maynard, Alasdair Nottingham
-
Publication number: 20120159406Abstract: A task-based multi-process design synthesis methodology is reproducible, and relies on a plurality of child processes to assist a parent process in performing optimizations on an integrated circuit design. Objects from an integrated circuit design are grouped into subsets and assigned to child processes, with each child process performing a transform on each of the objects in the subset assigned to that child process and determining which of the objects in the subset are candidate objects for which performance of the transform has been successful. Each child process also undoes the transform performed for each object such that the same initial state of the integrated circuit design is used to perform each transform. In addition, the parent process tracks the results of performing the transform by each child process, and applies successful transforms in a controlled sequence.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony D. Drumm, Jagannathan Narasimhan, Lakshmi N. Reddy, Louise H. Trevillyan
-
Publication number: 20120153397Abstract: An FET device includes a plurality of Fin-FET devices. The fins of the Fin-FET devices are composed of a first material. The FET device includes a second material, which is epitaxially merging the fins. The fins are vertically recessed relative to an upper surface of the second material. The FET device furthermore includes a continuous silicide layer formed over the fins and over the second material, and a stress liner covering the device.Type: ApplicationFiled: February 25, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Kangguo Cheng, Bruce B. Doris, Ali Khakifirooz, Pranita Kulkarni, Ghavam G. Shahidi
-
Publication number: 20120158745Abstract: An apparatus and method are described for the discovery of semantics, relationships and mappings between data in different software applications, databases, files, reports, messages, or systems. In one aspect, semantics and relationships and mappings are identified between a first and a second data source. A binding condition is discovered between portions of data in the first and the second data source. The binding condition is used to discover correlations between portions of data in the first and the second data source. The binding condition and the correlations are used to discover a transformation function between portions of data in the first and the second data source.Type: ApplicationFiled: October 6, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander Gorelik, Lingling Yan
-
Publication number: 20120158860Abstract: Systems and methods of confirming an addressee of an email message include receiving an email message addressed to one or more forwarding addresses. At least one email address associated with each of the one or more forwarding addresses is obtained. A potential discrepancy in the email message is detected in response to the at least one obtained email address. Before sending the email message, an alert is issued to a sender of the email message. The alert provides a recommendation regarding whether to continue with sending the email message and identifies content associated with the email message that led to detecting the potential discrepancy.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Li Chen, Daniel P. Julin, Henri Fouotsop Meli, Govindaraj Sampathkumar
-
Publication number: 20120159502Abstract: Processes, devices, and articles of manufacture having provisions to monitor and track multi-core Central Processor Unit resource allocation and deallocation in real-time are provided. The allocation and deallocation may be tracked by two counters with the first counter incrementing up or down depending upon the allocation or deallocation at hand, and with the second counter being updated when the first counter value meets or exceeds a threshold value.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oleg Levin, Sonjeev Jahagirdar, Moshe E. Matsa
-
Publication number: 20120159510Abstract: Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aditya Kumar, Kevin Wendzel
-
Publication number: 20120159086Abstract: Methods, apparatuses, and computer program products are disclosed for cache management. Embodiments include receiving, by a cache controller, a request to insert a new cache line into a cache; determining, by the cache controller, whether the new cache line is associated with a forced injection; in response to determining that the new cache line is associated with a forced injection, accepting, by the cache controller, the insertion of the new cache line into the cache; and in response to determining that the new cache line is not associated with a forced injection, determining, by the cache controller, whether to accept the insertion of the new cache line based on a comparison of an address of the new cache line to a predefined range of addresses.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Praveen G. Karandikar, Eric F. Robinson, Mark J. Wolski
-
Publication number: 20120151748Abstract: Embodiments disclosed include methods of designing an inductor. The inductor can include a conductive line including at least one turn and an opening positioned within an interior of a region of the conductive line.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mete Erturk, John D. Gillis, Casey J. Grant, David Scagnelli, Anthony K. Stamper
-
Publication number: 20120159619Abstract: Mechanisms for evaluating downgrader code in application code with regard to one or more security guidelines are provided. Downgrader code in application code is identified, where the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code. Processes of the downgrader code are evaluated against security guidelines to determine if the processes violate the security guidelines. A notification is generated in response to the evaluation indicating that the processes of the downgrader code violate the security guidelines. The notification is output to a computing device for consideration.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan J. Berg, Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp
-
Publication number: 20120159087Abstract: Ensuring forward progress of token-required cache operations in a shared cache, including: snooping an instruction to execute a token-required cache operation; determining if a snoop machine is available and if the snoop machine is set to a reservation state; if the snoop machine is available and the snoop machine is in the reservation state, determining whether the instruction to execute the token-required cache operation owns a token or is a joint instruction; if the instruction is a joint instruction, instructing the operation to retry; if the instruction to execute the token-required cache operation owns a token, dispatching a cache controller; determining whether all required cache controllers of relevant compute nodes are available to execute the instruction; executing the instruction if the required cache controllers are available otherwise not executing the instruction.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Eric F. Robinson, Mark J. Wolski
-
Publication number: 20120158660Abstract: Methods, computer systems, and computer program products for deduplicating data in a computing environment are provided. A sequence of data is received. The sequence of data is formatted for back-up such that an order of the sequence of data is different than the order of an input sequence of the data. The sequence of data is stored in the same order as the input sequence of the data.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Michael HIRSCH
-
Publication number: 20120155864Abstract: Systems and methods for processing an optical signal are disclosed. The optical signal is converted to a voltage signal and the voltage signal is amplified. In addition, a signal strength and/or a signal quality parameter is monitored and an indication of the signal strength and/or a signal quality parameter is generated. Further, a gain and/or an operating bandwidth on the conversion or the amplification can be adjusted based on the indication to reduce power consumption of an optical receiver.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Petar K. Pepeljugoski, Alexander V. Rylyakov, Clint L. Schow, Mehmet Soyuer
-
Publication number: 20120159003Abstract: In one embodiment, a system includes logic adapted for receiving a command from a first system, logic adapted for determining which resources are required to process the command, logic adapted for checking for the required resources before receiving data associated with the command, logic adapted for receiving the data from the first system, logic adapted for checking for the required resources after receiving the data when the checking for the required resources before receiving data indicated that the required resources were not available before receiving the data, logic adapted for sending a status to the first system if the required resources are not available after receiving the data, and logic adapted for processing the command if the required resources are available either before receiving the data or after receiving the data. In more embodiments, a method and computer program product for processing a command are also presented.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Matthew R. Craig, Clint A. Hardy, Roger G. Hathorn, Bret W. Holley
-
Publication number: 20120156861Abstract: Methods for removing or reducing the thickness of a material layer remaining at Si-Si interfaces after silicon wafer bonding. The methods include an anneal which is performed at a temperature sufficient to dissolve oxide, yet not melt silicon.Type: ApplicationFiled: February 27, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Joel P. de Souza, John A. Ott, Alexander Reznicek, Devendra K. Sadana, Katherine L. Saenger
-
Publication number: 20120159069Abstract: A mechanism is provided for moving control of storage devices from one adapter pair to another. In a trunked disk array configuration, moving the storage devices from one disk array to another disk array begins by attaching the downstream ports of the two independent disk arrays together. The mechanism redefines one set of the ports as upstream ports and through switch zoning makes a set of devices available to the second disk array adapters. By controlling zoning access and performing discovery one device port at a time, the mechanism transfers access and ownership of the RAID group from one adapter pair to another.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Gary W. Batchelor, Brian J. Cagno, John C. Elliott, Enrique Q. Garcia
-
Publication number: 20120158617Abstract: Methods are provided for assisting in the organization of information accessed through a web browser. At least one item of information accessed through the web browser is captured and visually represented in a defined organizational area of a display. A relevance index is calculated for each item of information that is visually represented to a current web-browsing behavior. The relevance index is conveyed for each item of information to the current web-browsing behavior to a user of the web browser.Type: ApplicationFiled: February 27, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventor: David Gotz
-
Publication number: 20120158803Abstract: A virtual machine of an information handling system (IHS) initializes an operating system to provide partition file system memory management during application execution. The operating system employs multiple partitions that include one or more applications for execution within the virtual machine. A file system tool identifies write operations to a global file system and generates local and common file system information. The file system tool populates the local file systems that include delta local file systems and differential file systems with write operation data. The file system tool may generate stackable common delta file system information to store write operation data common to two or more partitions that employ executing applications. The file system tool may combine or separate stackable common delta file system information to provide improvements in virtual machine memory utilization.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Madhusudanan Kandasamy, Ramblias Varma, Balaji Viswanathan, Koustuv Dasgupta
-
Publication number: 20120158635Abstract: A state machine includes a rule selector. The rule selector receives input data, and one or more transition rules. The one or more transition rules including a next state. The state machine also includes a character classifier communicatively coupled to the rule selector. The character classifier includes a plurality of base classes. The character classifier receiving the input data, and sending one or more of the plurality of base classes to the rule selector in response to receiving the input data. The rule selector selects one of the one or more transition rules in response to determining that the input data and one of the plurality of base classes correspond to the transition rule. The current state of the state machine is then set to the next state of the selected one of the one or more transition rules.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Jan Van Lunteren
-
Publication number: 20120156857Abstract: Methods of forming a semiconductor structure including a semiconductor nanowire or epitaxial semiconductor material which extends from at least a surface of source region and the drain region are provided. The methods include converting an upper portion of the source region and the drain region and the semiconductor nanowire or epitaxial semiconductor material into a continuous metal semiconductor alloy. The continuous metal semiconductor alloy includes a lower portion that is contained within an upper surface of each of the source region and the drain region, and a vertical pillar portion extending upwardly from the lower portion.Type: ApplicationFiled: February 27, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guy Cohen, Christos D. Dimitrakopoulos, Alfred Grill
-
Publication number: 20120158871Abstract: Usability is improved by decreasing the number of notifications to be read in receiving mails including notifications of events. A notification of an event is sent. In one aspect, this comprises receiving, in response to occurrence of an event, a notification of the event; storing, when event data generated from the received notification matches a conditional expression in a profile associated with the event, the notification of the event in a queue associated with at least one of change management information corresponding to the event and a recipient of the change management information; and sending, when an earliest time out of transfer times set in respective notifications stored in the queue has come, all the notifications stored in the queue, to a client that is the recipient, as a single notification.Type: ApplicationFiled: November 30, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takehiko Amano, Yoshio Horiuchi, Ken Kumagai
-
Publication number: 20120159483Abstract: A mechanism is provided for searching a virtual resource in a large scale computing system environment. The virtual resource is deployed on at least one server. Each server is coupled to a sensor and communicates with the sensor. The sensors communicate with each other and consist of a communication network. Each sensor stores an identifier of a virtual resource deployed in a server connected with the sensor and the location information of the sensor itself. The mechanism receives a searching request for a virtual resource by the at least one sensor, the searching request containing an identifier of the virtual resource being searched; forwards the searching request in the communication network of the sensors; and returns a location information of a sensor storing the identifier of the virtual resource by the sensor itself.Type: ApplicationFiled: August 19, 2010Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Le He, Wu Yu Hui, Xing Jin, Qing Bo Wang, Yang Zhao, Zhi Le Zou
-
Publication number: 20120159448Abstract: The invention provides a method and system for testing a software component, by instrumenting the software component under test with a component able to modify the execution of the component under test and able to generate an event corresponding to the performed modification, and by verifying that the order and the content of the event received match a predefined sequence.Type: ApplicationFiled: February 21, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mauro Arcese, Pier Fortunato Bottan, Giorgio Corsetti
-
Publication number: 20120158316Abstract: A method that identifies common peaks among unidentified peaks in the data from different LC-MS or LC-MS/MS runs is provided. The method employs an algorithm, herein referred to as “Precision Peak Matching (PPM).” The different runs can be from different laboratories, instruments, and biological samples that result in a significant variability in the data. PPM allows estimation and control of precision, defined as the fraction of truly identical peptide pairs among all pairs retrieved, in the matching process. PPM finds the maximal number of peptide pairs at a prescribed precision, thereby allowing quantitative control over the trade off between the number of true pairs missed, and false pairs found. PPM finds common peptides from a database of LC-MS runs of heterogeneous origins, and at the specified precision. PPM fills a much-needed role in proteomics by extracting useful information from disparate LC-MS databases in a statistically rigorous and interpretable manner.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peicheng Du, Frank Suits
-
Publication number: 20120158698Abstract: In an embodiment, a first driver source specified by a first execution plan that implements a query is designated, and a second driver source specified by a second execution plan that implements the query is designated. A portion of the first execution plan and a portion of the second execution plan are executed. If a unique identifier of a first row returned by the executing the portion of the first execution plan does not match all unique identifiers of all rows from the second driver source that were saved to a result set by the executing the portion of the second execution plan, then the first row returned by the executing the portion of the first execution plan is added to the result set and the unique identifier of the first row that was returned by the executing the portion of the first execution plan is added to a unique identifier log.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert J. Bestgen, Robert V. Downer, Brian R. Muras
-
Publication number: 20120158199Abstract: Aspects of the present invention provide a solution for controlling electricity to a device. A sensor is associated with a device that is independently coupled to an electricity distribution network. The sensor senses electricity usage for the device. Based on the sensed electricity usage for the device, an electricity usage pattern is identified for the device. This electricity usage pattern is used to identify a classification of the device. Based on this device classification the supply of electricity to the device can be controlled as needed by the provider.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Laurence J. Plant
-
Publication number: 20120153962Abstract: A method of implementing electrostatic discharge (ESD) testing of an integrated circuit includes applying an ESD event to an exposed backside of a substrate of the integrated circuit, wherein the backside of the substrate is electrically isolated from circuit structures formed at a front-end-of-line (FEOL) region of the integrated circuit. The operation of the circuit structures is tested to determine whether the ESD event has caused damage to one or more of the circuit structures as a result of a breakdown in the electrical isolation between the circuit structures and the backside of the substrate.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert J. Finch, George A. May
-
Publication number: 20120159432Abstract: Development tools are disclosed that connect various artifacts in a database aware fashion. For example, the development environment may integrate SQL query builders across multiple application development interfaces (e.g., a source code editor, XML editor, database scripting tools, etc.), significantly improving developer productivity, reducing development cost and time. Thus, the process of consuming heterogeneous artifacts in an application (or creating them for consumption) becomes a very productive experience, eliminating the need to manually cut/paste information in multiple project files in many cases.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: AZADEH AHADIAN, TODD R. BENDER, STEPHEN A. BRODSKY, CLIFFORD D. CHU, ZEUS O. COURTOIS, REBECCA B. NIN, MICHAEL L. PAUSER, BRIAN G. PAYTON, SONALI SURANGE, HONGDI ZHANG