IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100072460Abstract: An electronic device and method of manufacturing the device. The device includes a semiconducting region, which can be a nanowire, a first contact electrically coupled to the semiconducting region, and at least one second contact capacitively coupled to the semiconducting region. At least a portion of the semiconducting region between the first contact and the second contact is covered with a dipole layer. The dipole layer can act as a local gate on the semiconducting region to enhance the electric properties of the device.Type: ApplicationFiled: September 22, 2009Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mikael T. Bjoerk, Joachim Knoch, Heike E. Riel, Walter Heinrich Riess, Heinz Schmid
-
Publication number: 20100077449Abstract: A method for assigning tenants of users to offering instances of an application or middleware includes representing a set of offerings as respective offering instances of the application or middleware available from a server, determining server resource capacity of the server, representing constraints associated with the tenants and the offering instances, generating a mapping of the tenants to the offering instances based on the server resource capacity and constraints, and assigning a tenant to an offering instance according to the mapping, wherein the offering instance is made accessible to the users of the assigned tenant.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: International Business MachinesInventors: Thomas Yu-Kiu Kwok, Ajay Mohindra
-
Publication number: 20100076951Abstract: A computer-implemented method for providing a meeting location recommendation comprises receiving user preferences specifying types of recommendations to be provided, including defining which types of user ratings of services from a social networking service to consider, wherein at least a portion of the services being rated have respective service locations; receiving a meeting location recommendation request, including a list of participants; initiating a request to the social networking service to retrieve a subset of the user ratings based at least in part on the user preferences of the participants; and returning to the participants a list of the services and corresponding service locations specified in the subset of the user ratings to enable the participants to negotiate one of the service locations to serve as an agreed to meeting location.Type: ApplicationFiled: September 11, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ruthie D. Lyle, Lisa Seacat DeLuca
-
Publication number: 20100077410Abstract: A method for using WebServices as a basis for implementing an application programming interface (API) of a high-level programming language between a service application and a client application is disclosed. Function parameters of an API function call represent a complex object structure (COS). The method includes serializing the COS into serialized payload data, encoding the serialized payload data to form a payload string that does not contain any XML-specific characters, and specifying the parameters of the API call in parts of an input message of a corresponding operation in a WSDL document. The method also includes transporting the payload string within the input message to the service application, decoding the payload string to yield the serialized payload data, and deserializing the serialized payload data to restore the COS representing the parameters of the API call. A system and computer program product for implementing the API on the basis of Web Services are also disclosed.Type: ApplicationFiled: September 9, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas Graser, Martin Reitz
-
Publication number: 20100073373Abstract: A system and method is provided for modeling an application and, more particularly, to a system and method for providing a maturity model of an application (e.g., web 2.0 maturity model). The system is implemented in a computer infrastructure and includes a computer executable code tangibly embodied on a computer readable medium and operable to graphically compare at least a current state of a plurality of technology areas based on a normalized score for each of the plurality of technology areas.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Groff, Sri Ramanathan, Judy J. Robb, James R. Rudd, Robert J. Torres, Matthew B. Trevathan
-
Publication number: 20100077313Abstract: Providing tracking information about events in a virtual world using a computer is presented including: causing the computer to provide a re-usable code portion, the re-usable code portion configured with a unique identifier and an address of an external data storage; causing the computer to configure at least a set of events to be tracked for sending information about tracked events to the external data storage; causing the computer to associate the re-usable code portion with a virtual object to be tracked in the virtual world. In some embodiments, methods are presented wherein the causing the computer to associate the re-usable code portion with the virtual object comprises causing the computer to integrate the re-usable code portion on a source code level into the virtual object.Type: ApplicationFiled: January 14, 2009Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Oliver Draese, Benno Staebler, Torsten Steinbach, Knut Stolze
-
Publication number: 20100077071Abstract: A method and system for maintaining a connection in a communication network is provided. One implementation involves activating a first network interface for obtaining a first network address for communication over the network; monitoring the network and determining a first lease time for the first network address; activating a second network interface for obtaining a second network address for communication over the network upon approaching end of the lease time, thereby maintaining communication over the network via the second network address; and deactivating the first network interface.Type: ApplicationFiled: September 19, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Luigi Gaudio, Andrea Naglieri, Jacopo T. Santaiti
-
Publication number: 20100075261Abstract: Processes for fabricating a contact grid for a photovoltaic cell generally includes providing a photovoltaic cell having an antireflective coating disposed on a sun facing side, the photovoltaic cell comprising a silicon substrate having a p-n junction; soft stamping a pattern of a UV sensitive photoresist and/or polymer onto the antireflective coating; exposing the UV sensitive photoresist and/or polymer to ultraviolet radiation to cure the UV sensitive photoresist and/or polymer; etching the pattern to form openings in the antireflective coating that define the contact grid; stripping the UV sensitive photoresist and/or polymer; and depositing a conductive metal into the openings defined by the pattern. The metal based paste can be aluminum based, which can be annealed at a relatively low temperature.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence A. Clevenger, Harold J. Hovel, Rainer K. Krause, Kevin M. Prettyman
-
Publication number: 20100074118Abstract: A method and system detect a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to the recipient over a communication path. Upon detection of the failed communication, the method initiates a first inquiry process from the sender. This first inquiry process tests how far a first test communication transmission can travel from the sender to the recipient along the communication path. Similarly, upon detection of the failed communication, the method initiates a second inquiry process from the recipient. The second inquiry process tests how far a second test communication transmission can travel from the recipient to the sender along the communication path. The method combines the results of the first inquiry process and the results of the second inquiry process to determine which of the nodes in the communication path are not successfully forwarding test communications to identify at least one possibly faulty node.Type: ApplicationFiled: September 19, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Martin J. Gale, Clare Owens, Peter Johnson, Jason Edmeades
-
Publication number: 20100077380Abstract: A method of generating a tool for merging customizations made to a first version of a software artifact when migrating to a second version includes instantiating a mapping element for each top-level element in a first code set that does not have a complementary element in a second code set; requesting and receiving merge instructions for each top-level element for which merge instructions are not provided in the corresponding mapping element; determining whether the merge instructions for each top-level element for which merge instructions are provided require that customizations be merged into the second code set; determining whether the merge instructions for each top-level element set that requires customizations to be merged are valid; requesting and receiving merge instructions for each top-level element for which the merge instructions are not valid; and storing the merge instructions received for each top-level element in the corresponding mapping element.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce R. Baker, Walfrey Ng, Chenfei Song, Yu Yuan
-
Publication number: 20100077386Abstract: A method for cross-platform porting of applications includes extracting one or more platform independent models from an existing one or more composite applications running on a given source platform. These platform independent models are then transformed into implementation artifacts on another, target platform, thereby effectively porting the composite application from one platform to another. The generated implementation artifacts on the target platform leverage existing assets in the target environment, which makes these generated artifacts “contextually-aware”.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rama Kalyani T. Akkiraju, Manisha Dattatraya Bhandar, Pankaj Dhoolia, Nilay Ghosh, Tilak Mitra, Rakesh Mohan, Dipankar Saha, Wei Zhao
-
Publication number: 20100077328Abstract: A widget adjustment event can be detected for a widget that is part of a model that is presented on a canvas of a user interface. On-canvas objects proximate to the widget can be adjusted. The on-canvas objects can include other widgets. The adjustments can be performed relative to a layout position of the widget after the widget adjustment event has occurred. Additional on-canvas objects further from the widget can the adjusted on-canvas objects can then be adjusted as necessary due to new positions of the adjusted on-canvas objects.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: DANIEL C. BERG, BRAD L. BLANCETT, MICHAEL D. ELDER, CHAD M. HOLLIDAY, NARINDER MAKIN, JOHN E. SWANKE
-
Publication number: 20100071423Abstract: An article of manufacture, such as a laptop computer, comprising a housing, a processor disposed within the housing, a computer readable medium disposed within the housing and in communication with the processor, a lock mechanism disposed within the housing, wherein the lock mechanism can be moved between a locked configuration and an unlocked configuration, and computer readable program code encoded in the computer readable medium and useable with the processor, the computer readable program code comprising a series of computer readable program steps to effect moving the lock mechanism between the locked configuration and the unlocked configuration.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: DAVID FRANKLIN DEHAAN, RANDY CLARK INCH, CARLOS JACOBO LUJAN
-
Publication number: 20100076760Abstract: The invention discloses a system and method for filling out a form from a dialog between a caller and a call center agent. The caller and the caller center agent can have the dialog in the form of telephone conversation, instant messaging chat or email exchange. The system and method provides a list of named entities specific to the call center operation and uses a translation and transcription minor to filter relevant elements from the dialog between the caller and the call center agent. The relevant elements filtered from the dialog are subsequently displayed on the call center agent's computer screen to fill out application forms automatically or through drag and drop operations by the call center agent.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Carl Joseph Kraenzel, Baiju Dhirajlal Mandalia, David M. Lubensky
-
Publication number: 20100077516Abstract: Tips including a platinum silicide at an apex of a single crystal silicon tip are provided herein. Also, techniques for creating a tip are provided. The techniques include depositing an amount of platinum (Pt) on a single crystal silicon tip, annealing the platinum and single crystal silicon tip to form a platinum silicide, and selectively etching the platinum with respect to the formed platinum silicide.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Harish Bhaskaran, Michel Despont, Ute Drechsler, Abu Sebastian
-
Publication number: 20100077428Abstract: The present invention discloses a method and apparatus which processes video media with associated meta data, and filters the meta data according to viewer interests. Meta data which relates to viewer interests is presented to the viewer.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: NICOLE M. ARNOLD, LYDIA M. DO, ZAMIR G. GONZALEZ, JANE H. JENKINS, HEIDI L. LAGARES-VAZQUEZ
-
Publication number: 20100076970Abstract: Embodiments of the invention provide techniques for providing information describing locations to users of an immersive virtual environment. In one embodiment, patterns of locations visited by various users of the virtual environment may be stored in a searchable data structure(s). Further, characteristics of the location visits may be used to determine whether a given location visit was favorable for each user. Subsequently, locations visited by a current user may be matched to one of the stored patterns of locations. The matching pattern may then be used to provide favorability information describing other locations available to the current user. The favorability information may be presented to the user as graphical indications visible within the user's view of the virtual environment.Type: ApplicationFiled: September 11, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cary L. Bates, Paul R. Day
-
Publication number: 20100076804Abstract: Calendar entries can be added indicating a proposed change to a calendar event to electronic calendars of all event attendees when the proposed change is pending approval. This puts the attendees on notice of a possible change in a time or place of the calendar event so that these attendees can choose not to schedule conflicting calendar events while the proposed change is pending.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: ANGELA RICHARDS JONES
-
Publication number: 20100074420Abstract: A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated.Type: ApplicationFiled: October 1, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic J. Bauchot, Gerard Marmigere, Joaquin Picon, Pierre Secondo
-
Publication number: 20100072263Abstract: A method for forming alloy deposits at selected areas on a receiving substrate includes the steps of: providing an alloy carrier including at least a first decal including a first plurality of openings and a second decal including a second plurality of openings, the first and second decals being arranged such that each of the first plurality of openings is in alignment with a corresponding one of the second plurality of openings; filling the first and second plurality of openings with molten alloy; cooling the molten alloy to thereby form at least first and second plugs, the first plug having a first surface and a second surface substantially parallel to one another, the second plug having a third surface and a fourth surface substantially parallel to one another; removing at least one of the first and second decals to at least partially expose the first and second plugs; aligning the alloy carrier with the receiving substrate so that the first and second plugs correspond to the selected areas on the receivinType: ApplicationFiled: November 30, 2009Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Peter Alfred Gruber, Paul Alfred Lauro, Jae-Woong Nah
-
Publication number: 20100077034Abstract: A mechanism for modifying a chat distance associated with an environmental chat based on the avatar population density of an area of a virtual universe associated with the environmental chat. An initial environmental chat distance may be determined based on the avatar population density, i.e., the number of avatars, in the area of the virtual universe associated with the environmental chat. The environmental chat distance may be modified in response to a change in the number of avatars in the area of the virtual universe associated with the environmental chat. The environmental chat distance may be modified such that the environmental chat distance is inversely proportional to the detected number of avatars in the virtual universe area associated with the environmental chat.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Christopher S. Alkov, Travis M. Grigsby, Lisa Seacat Deluca
-
Publication number: 20100077128Abstract: Embodiments of the present invention address deficiencies of the art in respect to virtualization and provide a novel and non-obvious method, system and computer program product for monitoring and managing memory used in a virtualized computing environment. In this regard, a method for monitoring and managing memory used by a virtual machine in a virtualized computing environment can include counting page fault occurrences in a guest operating system (OS) executing in the VM, pinning additional physical memory to the VM along with initiating a hot-add event to the guest OS executing in the VM, responsive to exceeding a page fault allowance threshold in order to mitigate system degradation in the VM based on page fault occurrences.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin S. Stansell, Edward V. Zorek, SR.
-
Publication number: 20100077340Abstract: Supporting a visualization of an object model in which multiple dependencies exist between each of a plurality of objects by limiting one or more object instances in the object model and filtering one or more attributes associated with one or more of the object instances. The limiting and filtering is performed by utilizing a plurality of windows, panels, or sub-windows to display a corresponding list of one or more objects for a dimension, along with one or more attributes associated with each of the one or more objects; and updating a second window, panel, or sub-window in response to receiving a selection of an item from a first window, panel, or sub-window according to a relationship defined in the object model, wherein the updating is performed in a hierarchical manner.Type: ApplicationFiled: September 19, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul B. French, Mark J. Lucas, Kieran Moynihan
-
Publication number: 20100075610Abstract: A system and method is provided for reducing latency when providing user location information services. The system is implemented in a computer infrastructure which comprises computer executable code tangibly embodied on a computer readable medium. The executable code is operable to trigger a location based service to obtain user location information prior to the user registering for location services.Type: ApplicationFiled: September 19, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark D. DENNARD, Lasith G. Perera, Sri Ramanathan, William P. Shaouy, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100077181Abstract: A system and method for issuing load-dependent instructions in an issue queue in a processing unit. A load miss queue is provided. The load miss queue comprises a physical address field, an issue queue position field, a valid identifier field, a source identifier field, and a data type field. A load instruction that misses a first level cache is dispatched, and both the physical address field and the data type field are set. A load-dependent instruction is identified. In response to indentifying the load-dependent instruction, each of the issue queue position field, valid identifier field, and source identifier field are set. If the issue queue position field refers to a flushed instruction, the valid identifier field is cleared. The load instruction is recycled, and a value of the valid identifier field is determined. The load-dependent instruction is then selected for issue on a next processing cycle independent of an age of the load-dependent instruction.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher M. Abernathy, Mary D. Brown, William E. Burky, Todd A. Venton
-
Publication number: 20100077305Abstract: A system and method to enhance user accessibility in a virtual universe and, in particular, to enhance user accessibility by providing information and/or actions to users participating in the virtual universe. The system comprises an assignment engine configured to assign an accessibility unit to an item within a virtual universe and a detection engine configured to detect a triggering event, which triggers the accessibility unit. The system also comprises an accessibility action engine configured to provide at least one of information and an action to a user when the accessibility unit is triggered.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rick A. HAMILTON, II, Dimitri Kanevsky, Michael D. Kendzierski, Clifford A. Pickover
-
Publication number: 20100077398Abstract: An apparatus for optimizing a transaction comprising an initial sequence of computer operations, the apparatus includes a processing unit which identifies one or more idempotent operations comprised within the initial sequence, and which reorders the initial sequence to form a reordered sequence comprising a first sub-sequence of the computer operations followed by a second sub-sequence of the computer operations, the second sub-sequence comprising only the one or more idempotent operations.Type: ApplicationFiled: November 29, 2009Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Eitan Farchi, Shachar Fienblit, Amiram Hayardeny, Rivka Matosevich, Ifat Nuriel, Sheli Rahav, Dalit Tzafrir
-
Publication number: 20100073402Abstract: A method for rectangular cropping including the steps of: (i) providing a sequence of images on a graphical interface device; (ii) analyzing each pixel in the first image included in the sequence of images; (iii) locating a boundary between the background of the first image and the border of the first image; (iv) determining the degree off true horizontal of the first image; (v) rotating the first image based on the determining step; (vi) applying a cropping operation to the first image; and (vii) automatically applying the cropping operation to each other image in the sequence of images.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David J. Delia, Wayne M. Delia
-
Publication number: 20100077378Abstract: The present invention provides a method and system for virtualizing a code library. The method comprises providing a description of at least one function in said code library. The description includes properties of any parameter and of any data structure required by said function. Code for a stub library for a client computer from which a library function may be called remotely is then generated. The stub library is operable to construct, in accordance with said description, a transportable data message for calling a function of said code library, the construction including determining properties of any parameter required by said called function and obtaining the argument value referred to by any pass-by-reference parameter. Code for a skeleton library, for a host computer on which said code library is hosted, is also generated. The skeleton library is operable to invoke execution of said called function in response to receipt of said transportable data message.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brendan Maguire, Kay Muller, Mark Purcell, Alexander Tarasov, Robert V. Tucker
-
Publication number: 20100071876Abstract: A cold plate apparatus is provided which includes a tube formed of a first metal, a casted heat sink member formed of a second metal surrounding a heat transfer region of the tube, and an alloy layer disposed between the tube and the heat sink member. The tube has its first and second ends, with the heat transfer region being disposed between its ends. The first and second ends of the tube extend from the heat sink member, and a metallurgical bond exists between the tube and heat sink member in the heat transfer region of the tube. The alloy layer formed during casting of the heat sink member by the first metal and second metal reacting peritectically, and with the thickness of the alloy layer minimized during casting of the heat sink member to enhance the heat transfer characteristic of the metallurgical bond.Type: ApplicationFiled: November 5, 2009Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bret W. LEHMAN, Roger R. SCHMIDT, Prabjit SINGH
-
Publication number: 20100077067Abstract: Method for redirecting outbound VLAN traffic away from an inactive external port of a switch. A first switch monitors the active or inactive status of a designated external port. A host computer periodically queries the first switch requesting the status of the designated external port. The first switch replies to the query indicating the current status of the designated external port. If the external port is inactive, the host computer redirects data traffic away from the inactive designated external port to an alternate external port without deactivating the designated internal port. Preferably, the designated internal port continues to be used for secure internal LAN communications, such as between a host computer and a management entity. When the designated external port is again active, data traffic is returned to the designated external port.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventor: Norman C. Strole
-
Publication number: 20100077142Abstract: Preparation of a snapshot for data storage includes receiving a first command to prepare to create a snapshot of a set of data stored on at least one source storage volume in a data storage system. The data storage system is prepared to expedite creation of the snapshot in response to the first command. A second command to create the snapshot is received subsequent to the first command. The snapshot is created, in response to the second command, by copying the set of data onto at least one target storage volume at an event time.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Shachar Fienblit, Sheli Rahav
-
Publication number: 20100077153Abstract: Computer implemented method, system and computer usable program code for cache management. A cache is provided, wherein the cache is viewed as a sorted array of data elements, wherein a top position of the array is a most recently used position of the array and a bottom position of the array is a least recently used position of the array. A memory access sequence is provided, and a training operation is performed with respect to a memory access of the memory access sequence to determine a type of memory access operation to be performed with respect to the memory access. Responsive to a result of the training operation, a cache replacement operation is performed using the determined memory access operation with respect to the memory access.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roch Georges Archambault, Shimin Cui, Chen Ding, Yaoqing Gao, Xiaoming Gu, Raul Esteban Silvera, Chengliang Zhang
-
Publication number: 20100076940Abstract: Techniques for providing maximal concurrency while ensuring no deadlock in a tree structure are provided. The techniques include accessing a minimum number of one or more nodes to perform an operation.Type: ApplicationFiled: September 9, 2008Publication date: March 25, 2010Applicants: International Business Machines Corporation, The University of MassachusettsInventors: Rajesh Ramkrishna Bordawekar, John Eliot Moss
-
Publication number: 20100077223Abstract: To prevent an input password from being stolen by an invalid authentication device. An authentication device 10 for authenticating an inputter based on an input password accepted from the inputter is provided with a first input part 110 for allowing a first part of the input password to be inputted; a confirmation information output part 120 for outputting confirmation information known to the valid inputter in advance when the first part 10 is valid, the confirmation information indicating to the user that the authentication device is valid; a second input part 130 for allowing a second part following the first part of the input password to be inputted; and a determination part 140 for determining that the inputter is valid when the first part and the second part are valid.Type: ApplicationFiled: August 19, 2009Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hiroshi Maruyama, Taiga Nakamura
-
Publication number: 20100076798Abstract: A user interface accepts a model of a proposed system solution for a service assurance system. A Dimensioning Engine receives the solution and determines dimensions for the solution. The dimensions specify any of: a quantity of CPUs, a rating for the quantity of CPUs, an amount of disk storage, a memory requirement, or a CPU processing parameter. A Dimensioning Model Manager stores data from equipment and product vendors to determine the solution by taking into account specific characteristics of an equipment or a product to be used in the service assurance system. A Dimensioning Monitor (DM) monitors the model of the solution against events occurring in the service assurance system. The DM transmits an alert if the service assurance system underperforms or overperforms with reference to the model. The DM determines changes to the model into line with a current set of operational conditions, or updates the dimensions.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Paul B. French
-
Publication number: 20100077093Abstract: A protocol converter includes a computer-readable storage medium that includes operational instructions that, when executed by a processor, allows communications between a first node and a second node which use different communications protocols. In a particular embodiment, the computer-readable storage medium includes operational instructions to use a first facility to receive first data from a first node, where the first data complies with a first protocol, and where the first facility supports at least one of a first link layer and a first line layer communications protocol. The computer-readable storage medium includes operational instructions that spawn a utility in response to receiving the first data. The computer-readable storage medium also includes operational instructions that use the utility to translate the first data into second data in a second protocol and that use a second facility to send the second data to a second node.Type: ApplicationFiled: September 28, 2009Publication date: March 25, 2010Applicants: Sterling Commerce Inc., International Business Machines CorporationInventor: John K. Hadland
-
Publication number: 20100077258Abstract: Disclosed is a computer implemented method, computer program product, and apparatus for generating diagnostic data for a thread. A service processor may begin by executing the computer usable program code to allocate a first thread to a monitoring function. The service processor determines if a second thread is running, wherein the second thread is associated with an operation. The service processor obtains an object pointer from a list of running threads, wherein the object pointer references a time data structure associated with the second thread, the time data structure comprising a maximum running time interval and a check time. The service processor calculates the check time as a maximum running time interval added to an initially sampled timestamp. The service processor determines if a current time exceeds the check time. In addition, the service processor generates an error log, responsive to a determination that the current time exceeds the check time.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Van H. Lee, David D. Sanner, Thi N. Tran
-
Publication number: 20100076948Abstract: A system and associated method for handling a search request and a corresponding search result. A client program interactively receives the search request from a user pursuant to an input configuration that defines a time period within which the user can continue typing a search term. The client program submits the search request to a server program that returns the corresponding search result having a respective suggestion for each extended search term. The client program displays the corresponding search result pursuant to an output configuration that defines a manageable number of suggestions to be displayed and a visual cue that the corresponding search result is partially displayed and that can be selected for full display of the corresponding search result.Type: ApplicationFiled: September 9, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Martin James Smithson, David Wynne Williams
-
Publication number: 20100077169Abstract: A method for performing data set migration includes receiving a request to migrate data sets, finding the systems with the data sets open, establishing at least one I/O intercept, copying the data set, mirroring changes to the data set, updating control information in the systems with the data sets open, and terminating the at least one I/O intercept.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Richard G. Pace
-
Publication number: 20100077255Abstract: A method for forward recovery of a catalog of a data storage system, comprising providing a recovery catalog and SMF records. In reverse chronological order, the (i)th entry of the record is checked for a data set change command. If none, the next entry is examined. Otherwise, the (j)th data set is identified and checked for inclusion in the recovery catalog. If it already is, the next entry is selected. If not, a data set location record is added. This process is repeated for each entry in the SMF record. Next, a (h)th data set on the (k)th volume is selected and checked for inclusion in the recovery catalog. If that (h)th data set has been added to the recovery catalog, a next data set is selected. Otherwise, a data set location record for the (h)th data set is added. The process is repeated for each data set on each volume.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Douglas Lee Lehr, Franklin Emmert McCune, David Charles Reed, Max Douglas Smith
-
Publication number: 20100077029Abstract: A method, system, and program is provided for automatically searching and injecting a multi-person chat history into a chat session, and allowing users to inject a multi-person chat history into a new chat session.Type: ApplicationFiled: September 24, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Aaron K. Shook, Andrew Ivory, Erik J. Burckart
-
Publication number: 20100077401Abstract: Computing resource DNA associated with a computing resource of a computing system can be received. The computing resource DNA can include one or more computing resource DNA elements representing identifying characteristics of the computing resource. A set of one or more potential matches for the received computing resource DNA can be ascertained from a set of reference data. When one or more potential matches exist, a confidence factor can be calculated for each potential match. The set of potential matches can then be refined. An optimum match for the computing resource DNA can be determined from the set of refined potential matches. The computing resource DNA can then be identified as a representation of the computing resource associated with the optimum match.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHARLES D. BRANT, ESTHER M. BURWELL, ROBERT L. ORR, TROY M. VOLIN, DOUGLAS A. WOOD
-
Publication number: 20100077039Abstract: The invention provides a system and a method for automatically switching from a local storage to a remote storage for recording a broadcast video stream, the switching being triggered by the fact that the local storage is almost full, and for automatically switching from a local storage to a remote storage for playing a broadcast video stream in a delayed manner, the switching being triggered by the fact that the video frames in the local storage are exhausted.Type: ApplicationFiled: September 16, 2009Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jean-Luc Collet, Francois-Xavier Drouet, Gerard Marmigere, Carole Truntschka
-
MASS ELECTRONIC QUESTION FILTERING AND ENHANCEMENT SYSTEM FOR AUDIO BROADCASTS AND VOICE CONFERENCES
Publication number: 20100076747Abstract: A system for providing electronic filtering and enhancement for audio broadcasts and voice conferences. The system can comprise one or more computing devices configured to record one or more spoken segments, wherein the one or more spoken segments are comprised of utterances. The system can also include one or more electronic data processors configured to process, manage, and store the one or more spoken segments and data, wherein the at least one electronic data processor is communicatively linked to the one or more computing devices. The system can further include a speech-to-text module configured to execute on the one or more electronic data processors, wherein the speech-to-text module converts the one or more spoken segments into a plurality of text segments. Additionally, the system can include a database module configured to execute on the one or more electronic data processors, wherein the database module stores the plurality of text segments in a queue.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James P. Appleyard, Keeley L. Weisbard, Shiju Mathai -
Publication number: 20100077318Abstract: A mechanism for modifying a chat distance associated with an environmental chat based on a determined chat amount within a time window of a predetermined amount of time in an area of a virtual universe associated with the environmental chat. An initial environmental chat distance may be determined based on the determined chat amount within an initial time window in the virtual universe area associated with the environmental chat. The initial environmental chat distance may be modified in response to a change in the chat amount within a subsequent time window.Type: ApplicationFiled: September 22, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Christopher S. Alkov, Travis M. Grigsby, Lisa Seacat Deluca
-
Publication number: 20100073800Abstract: Provided are a method, servo channel, and tape drive for recovering servo information from a synchronous servo channel. An interpolator reads samples of a servo signal obtained from a servo reader at a rate of one servo sample per clock interval, to produce up to M interpolated servo samples per clock interval. A first buffer buffers interpolation time instants at which the interpolator generates interpolated servo samples. The interpolated servo samples are buffered in a second buffer and the interpolated servo samples are outputted from the second buffer to a correlator to produce correlation signal samples.Type: ApplicationFiled: September 23, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Giovanni Cherubini, Robert Allen Hutchins, Jens Jelitto
-
Publication number: 20100075289Abstract: A method and system for automated customization of original content for one or more users, is provided. One implementation involves obtaining behavior information for a user, profiling the user based on the user behavior information, determining a preferred learning style for the user based on the user profiling, and customizing the original content based on the preferred learning style for the user. Profiling the user may involve analyzing the user behavior information using one or more profiling patterns for profiling the user to determine scores for different behavior categories for the user. Customizing the original content may involve determining a preferred learning style for the user based on the user profiling further includes selecting a customization scheme from a scheme repository, based on said scores for different behavior categories for the user, and applying the selected customization scheme to the original content to generated customized content for the user.Type: ApplicationFiled: September 19, 2008Publication date: March 25, 2010Applicant: International Business Machines CorporationInventors: Ahmed E.I. Maher, Mohamed M.M.M. Kattaya, Amr F. Yassin
-
Publication number: 20100073375Abstract: A candidate graph crossing point counter can be initialized. Level pairs can be sorted in descending order according to a number of connections between the level pairs. Evaluation of the candidate graph can progress according to the order of the level pairs so that those pairs likely to have the greatest number of connections are processed first. While the candidate graph crossing point counter is at an intermediate value and before a crossing point total is calculated for the candidate graph, it can be determined that the intermediate value is at least as great as a crossing point total of a best current graph for the directional graph. Calculation of the candidate graph crossing point total can be halted at the intermediate value. The candidate graph can be discarded from a possibility of being a minimized graph during a determination of a graph drawing for the directional graph.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ROBERT J. BREEDS, PHILIP R. TAUNTON
-
Publication number: 20100077177Abstract: One embodiment of the invention provides a processor. The processor generally includes a first and second processor core, each having a plurality of pipelined execution units for executing an issue group of multiple instructions and scheduling logic configured to issue a first issue group of instructions to the first processor core for execution and a second issue group of instructions to the second processor core for execution when the processor is in a first mode of operation and configured to issue one or more vector instructions for concurrent execution on the first and second processor cores when the processor is in a second mode of operation.Type: ApplicationFiled: September 19, 2008Publication date: March 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: David A. Luick