IBM Patents

The International Business Machines Corporation provides IT infrastructure and services to enterprise customers.

IBM Patents by Type
  • IBM Patents Granted: IBM patents that have been granted by the United States Patent and Trademark Office (USPTO).
  • IBM Patent Applications: IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
  • Publication number: 20150064855
    Abstract: An improved finFET and method of fabrication using a silicon-on-nothing process flow is disclosed. Nitride spacers protect the fin sides during formation of cavities underneath the fins for the silicon-on-nothing (SON) process. A flowable oxide fills the cavities to form an insulating dielectric layer under the fins.
    Type: Application
    Filed: October 31, 2014
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kangguo Cheng, Balasubramanian S. Haran, Shom Ponoth, Theodorus Eduardus Standaert, Tenko Yamashita
  • Publication number: 20150067865
    Abstract: Methods, products, apparatuses, and systems may manage a threat condition. A plurality of triggers may be identified over a period of time. Each of the triggers may be associated with a threat risk value. An accumulation value may be determined based on an aggregation of each threat risk value over the period of time. A set of progressive threshold values associated with a set of progressive threat conditions may be defined. A threat condition from the set of threat conditions may be established for the device based on the accumulation value. The threat condition may be managed, for example by defining an operational mode for the device, in response to the threat condition.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat Deluca, Lydia M. Do, Charles M. Kinard
  • Publication number: 20150061158
    Abstract: A method including forming a first solder bump on a chip, the first solder bump made of a first alloy, and forming a second solder bump on a chip, the second solder bump made of a second alloy, where the first alloy has a different alloy concentration and is different from the second alloy.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventor: Sylvain Pharand
  • Publication number: 20150067271
    Abstract: According to a method of cache management in a data storage system including a write cache and bulk storage media, a storage controller of the data storage system caches, in the write cache, write data of write input/output operations (IOPs) received at the storage controller. In response to a first performance-related metric for the data storage system satisfying a first threshold, the storage controller decreases a percentage of write IOPs for which write data is cached in the write cache of the data storage system and increases a percentage of write IOPs for which write data is stored directly in the bulk storage media in lieu of the write cache. In response to a second performance-related metric for the data storage system satisfying a second threshold, the storage controller increases the percentage of write IOPs for which write data is cached in the write cache of the data storage system.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHARLES J. CAMP, ROMAN PLETKA, ANDREW D. WALLS
  • Publication number: 20150067653
    Abstract: A computer program to be subjected to static analysis includes at least one framework, in turn including high-level code and at least one configuration file. A specification which describes run-time behavior of the program, including run-time behavior of the at least one framework including the high-level code and the at least one configuration file, is created from the computer program. Based on the specification, synthetic high-level code which accurately simulates the run-time behavior of the at least one framework including the high-level code and the at least one configuration file, without framework usage, is created. Static analysis of the computer program is carried out based on the synthetic high-level code.
    Type: Application
    Filed: August 28, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Salvatore A. Guarnieri, Marco Pistoia, Omer Tripp
  • Publication number: 20150062176
    Abstract: A system and a computer program product for displaying data in a graphical overlay. The method includes overlaying a first lens, including a first dataset, on a first region of the graphical overlay while a second lens, including a second dataset, overlaps the first lens. The first and second datasets are simultaneously displayed, and a correlation between the datasets is determined. Separation of the first and second lenses preserves a circumscribed region within each lens. The first dataset corresponds to first orientation position of the first lens. Rotation of the first lens to a second orientation position reconfigures the first dataset to provide a modified first dataset which corresponds to the second position. A rotational position may also be associated with points in time, a first position corresponding to a first point in time and the first dataset representing the first dataset at the first point in time.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jennifer L. Milam, Eric W. Leong, Pamela A. Nesbitt, Jonathan W. Stoecker
  • Publication number: 20150061815
    Abstract: A planar closed-magnetic-loop inductor and a method of fabricating the inductor are described. The inductor includes a first material comprising a cross-sectional shape including at least four segments, at least one of the at least four segments including a first edge and a second edge on opposite sides of an axial line through the at least one of the at least four segments. The first edge and the second edge are not parallel.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Robert E. Fontana, JR., William J. Gallagher, Philipp Herget, Eugene J. O'Sullivan, Lubomyr T. Romankiw, Naigang Wang, Bucknell C. Webb
  • Publication number: 20150061018
    Abstract: A structure includes a substrate having an insulator layer and a plurality of elongated semiconductor fin structures disposed on a surface of the insulator layer. The fin structures are disposed substantially parallel to one another. The structure further includes a plurality of elongated sacrificial gate structures each comprised of silicon nitride. The sacrificial gate structures are disposed substantially parallel to one another and orthogonal to the plurality of fin structures, where a portion of each of a plurality of adjacent fin structures is embedded within one of the sacrificial gate structures leaving other portions exposed between the sacrificial gate structures. The structure further includes a plurality of semiconductor source/drain (S/D) structures disposed over the exposed portions of the fin structures between the sacrificial gate structures. The embodiments eliminate a need to form a conventional spacer on the fin structures.
    Type: Application
    Filed: September 16, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventor: Effendi Leobandung
  • Publication number: 20150066386
    Abstract: The present disclosure relates to methods and systems for calculating a food additive. A first method includes identifying chemical compounds of an averse food ingredient, identifying chemical compounds of a flavorful food ingredient and calculating a set of chemical compounds for the food additive such that an olfactory perception of a mixture of the averse food ingredient, the flavorful food ingredient and the food additive is the same as an olfactory perception of only the flavorful food ingredient. A first device includes a database storing information identifying chemical compounds of an averse food ingredient and identifying chemical compounds of a flavorful food ingredient, and a processor for calculating a food additive such that an olfactory perception of flavors of a mixture of the averse food ingredient, the flavorful food ingredient and the food additive is the same as an olfactory perception of only the flavorful food ingredient.
    Type: Application
    Filed: October 22, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kush R. Varshney, Lav R. Varshney
  • Publication number: 20150067224
    Abstract: DMA translation table entries include a consecutive count (CC) field that indicates how many subsequent translation table entries point to successive real page numbers. A DMA address translation mechanism stores a value in the CC field when a translation table entry is stored, and updates the CC field in other affected translation table entries as well. When a translation table entry is read, and the CC field is non-zero, the DMA controller can use multiple RPNs from the access to the single translation table entry. Thus, if a translation table entry has a value of 2 in the CC field, the DMA address translation mechanism knows it can access the real page number (RPN) corresponding to the translation table entry, and also knows it can access the two subsequent RPNs without the need of reading the next two subsequent translation table entries.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Jesse P. Arroyo, Gregory M. Nordstrom, Srinivas Kotta, Eric N. Lais
  • Publication number: 20150064891
    Abstract: A method of fabricating stacked nanowire for a transistor gate and a stacked nanowire device are described. The method includes etching a fin as a vertical structure from a substrate and forming two or more pairs of spacers at vertically separated positions of the fin. The method also includes oxidizing to form the nanowires at the vertically separated positions of the fin.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kangguo Cheng, Bruce B. Doris, Pouya Hashemi, Ali Khakifirooz, Alexander Reznicek
  • Publication number: 20150067487
    Abstract: A method includes incorporating a local service within a user's device, accessing at least one external service via the user's device; starting a service request for the at least one external service from an input area of the user's device, causing the local service to determine at least one possible completion for the service request based on the input to the at least one external service, and providing the at least one possible completion to the input area of the user's device, wherein the local service consults at least one user context before providing the at least one possible completion to the input area of the user's device.
    Type: Application
    Filed: September 3, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Ramakrishnan Rajamony, William Evan Speight, Mark William Stephenson
  • Publication number: 20150059166
    Abstract: A chip attach frame is used to align pins of an integrated circuit chip with pads on a chip carrier. A frame block has a socket defining two alignment edges that form a reference corner. The chip is lowered into the socket, and the chip carrier is inclined while it supports the frame block and chip until the chip moves under force of gravity to the reference corner. Once located at the reference corner, the chip position is carefully adjusted by moving the frame block in the x- and y-directions until the pins are aligned with the pads. The frame block is spring biased against movement in the x- and y-directions, and the position of the frame block is adjusted using thumbscrews. A plunger mechanism can be used to secure the integrated circuit chip in forcible engagement with the chip carrier once the pins are aligned with the pads.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Martin Eckert, Otto Torreiter, Quintino L. Trianni
  • Publication number: 20150067404
    Abstract: Various embodiments monitor a distributed software system. In one embodiment, at least one monitoring policy associated with a distributed software system is selected. A policy type associated with the monitoring policy is identified. An installer is selected based on the policy type associated with the monitoring policy. Monitoring software is installed in a computing environment utilizing the installer. The monitoring software is configured to monitor the distributed software system based on the monitoring policy.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamar EILAM, Thomas GSCHWIND, Florian ROSENBERG, Andreas SCHADE
  • Publication number: 20150067761
    Abstract: An inventory manager optimizes the security and maintenance of a plurality of virtual machines and their workloads in a cloud environment and has: an inventory database, a workload compliance history of scanning workloads database, and a workload category database including security rules and compliance policies relating to workload category in a repository. The inventory manager identifies changes to characteristics of the workload of the plurality of virtual machines; alters the inventory database stored in the repository and maintained by the inventory manager, based on the identified changes to the characteristics of the workload of the plurality of virtual machines; and initiates security rules and compliance policies of the workload category database based on the identified changes to the characteristics of the workload of the plurality of virtual machines through a security tools program.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Steven A. Bade, Heather M. Hinton, Neil I. Readshaw
  • Publication number: 20150067260
    Abstract: A computer processor collects information for a dominant data access loop and reference code patterns based on data reference pattern analysis, and for pointer aliasing and data shape based on pointer escape analysis. The computer processor selects a candidate array for data splitting wherein the candidate array is referenced by a dominant data access loop. The computer processor determines a data splitting mode by which to split the data of the candidate array, based on the reference code patterns, the pointer aliasing, and the data shape information, and splits the data into two or more split arrays. The computer processor creates a software cache that includes a portion of the data of the two or more split arrays in a transposed format, and maintains the portion of the transposed data within the software cache and consults the software cache during an access of the split arrays.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Christopher M. Barton, Shimin Cui, Satish K. Sadasivam, Raul E. Silvera, Mahavi G. Valluri, Steven W. White
  • Publication number: 20150061010
    Abstract: Semiconductor structures are provided including a raised source region comprising, from bottom to top, a source-side phosphorus doped epitaxial semiconductor material portion and a source-side arsenic doped epitaxial semiconductor material portion and located on one side of a gate structure, and a raised drain region comprising from bottom to top, a drain-side phosphorus doped epitaxial semiconductor material portion and a drain-side arsenic doped epitaxial semiconductor material portion and located on another side of the gate structure.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kangguo Cheng, Bruce B. Doris, Ali Khakifirooz, Alexander Reznicek
  • Publication number: 20150064863
    Abstract: Embodiments of present invention provide a method of forming silicide contacts of transistors. The method includes forming a first set of epitaxial source/drain regions of a first set of transistors; forming a sacrificial epitaxial layer on top of the first set of epitaxial source/drain regions; forming a second set of epitaxial source/drain regions of a second set of transistors; converting a top portion of the second set of epitaxial source/drain regions into a metal silicide and the sacrificial epitaxial layer into a sacrificial silicide layer in a silicidation process wherein the first set of epitaxial source/drain regions underneath the sacrificial epitaxial layer is not affected by the silicidation process; removing selectively the sacrificial silicide layer; and converting a top portion of the first set of epitaxial source/drain regions into another metal silicide.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Praneet Adusumilli, Emre Alptekin, Kangguo Cheng, Shom Ponoth, Balasubramanian Pranatharthiharan
  • Publication number: 20150066420
    Abstract: Embodiments include determining, based on component temperature information of a thermal sensor associated with a component, that a temperature of the component of a computer system has surpassed a temperature threshold. A thermal sensor that is downstream from the component is identified, wherein the downstream thermal sensor is downstream from the component as defined by airflow through the computer system. Downstream temperature information as measured by the downstream sensor is determined. The downstream temperature information and the component temperature information are compared.
    Type: Application
    Filed: September 20, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventor: Arden L. Moore
  • Publication number: 20150067466
    Abstract: Classification and text analytics are used to evaluate passages, extract text, identify concepts, and provide displayable and searchable notations to assist document editors in identifying and evaluating conflicting or duplicate directives (also called policies or rules) within a large document.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barton W. Emanuel, Robert J. Nonnenkamp
  • Publication number: 20150060939
    Abstract: An electrostatic discharge protection circuit is disclosed. A method of manufacturing a semiconductor structure includes forming a semiconductor controlled rectifier including a first plurality of fingers between an n-well body contact and an anode in an n-well, and a second plurality of fingers between a p-well body contact and a cathode in a p-well.
    Type: Application
    Filed: August 28, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James P. DI SARRO, Robert J. GAUTHIER, JR., Tom C. LEE, Junjun LI, Souvick MITRA, Christopher S. PUTNAM
  • Publication number: 20150067845
    Abstract: A method for detecting abnormal behavior of users is disclosed. Processors identify from a log of user activity, a first number of actions performed by a user over a first time period that match a pattern of user activity for a task associated with one or more roles of the users. Processors also identify from the log of user activity, a second number of actions performed by the user over a second time period that match the pattern of user activity. Processors calculate an amount of deviation between the first number of actions and the second number of actions. The deviation identifies a difference between amounts of time spent in the one or more roles. Processors then determine whether the amount of deviation between the first number of actions and the second number of actions exceeds a threshold for abnormal behavior.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
  • Publication number: 20150067423
    Abstract: A method for creating an architecture to support Q-gating for launch-off-shift (LOS) scan testing using a plurality of flip-flops is provided. The method may include applying a common clock signal to each clock input of the plurality of flip-flops and applying a gated scan enable signal to each scan enable input of the plurality of flip-flops. The method may further include applying a global scan enable signal directly to each of a plurality of Q-gates corresponding to each of the plurality of flip-flops, wherein the global scan enable signal traverses a signal path that bypasses combinational logic located between any two flip-flops of the plurality of flip-flops.
    Type: Application
    Filed: August 28, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Raghu G. GopalaKrishnaSetty, Kshitij Kulshreshtha, Balaji Upputuri
  • Publication number: 20150066975
    Abstract: A view schema is generated from a view definition, wherein the view schema includes one or more relational views that are created by translating one or more object queries in the view definition into one or more relational queries. A report design schema is generated from the view definition by: creating one or more report tables that correspond to the one or more relational views of the view schema and extending the one or more report tables with one or more primary key constraints and one or more foreign key constraints. A reporting model is generated by reverse engineering the report design schema, wherein the reporting model includes the one or more primary key constraints and the one or more foreign key constraints. A report is generated using the reporting model, wherein the report includes the one or more primary key constraints and the one or more foreign key constraints.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Cassio S. DOS SANTOS, Kunjavihari M. KASHALIKAR, Jean-Claude Mamou, Kishore Patel, Rong Qu, Hong X. Zhang
  • Publication number: 20150067896
    Abstract: A method includes asserting a physical presence signal to a trusted platform module of a compute node in response to detecting a change in the physical connection of a hot pluggable device to a port of the compute node. The change in the physical connection of the hot pluggable device to the port is selected from physically connecting the hot pluggable device to the port, physically disconnecting the hot pluggable device from the port, and combinations thereof. Optionally, the compute node has a USB port and the hot pluggable device has a USB connector that is selectively physically connectable to the USB port. In one example, detecting a change in the physical connection of the hot pluggable device to the compute node includes detecting a voltage change on the USB port.
    Type: Application
    Filed: September 3, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Raghuswamyreddy Gundam, Newton P. Liu, Douglas W. Oliver, Nicholas A. Ramirez, Mehul M. Shah, Wingcheung Tam
  • Publication number: 20150062338
    Abstract: A video surveillance system ingests a video stream from a remotely located video capture device. An application programming interface (API) provides an interface for functions to interface between the video surveillance system and the remotely located video capture device. An analytics engine of the video surveillance system receives video sent through the API. The analytics engine compares an extracted metric from the video stream against at least one previously established value as part of assessing a previously established condition to generate either a TRUE or a FALSE result. When and only when a TRUE result is generated, is a notification action performed that conveys a notification over a network using internet protocol communications to a previously designated user.
    Type: Application
    Filed: November 13, 2014
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: PANDIAN MARIADOSS
  • Publication number: 20150061015
    Abstract: Semiconductor devices having non-merged fin extensions and methods for forming the same. Methods for forming semiconductor devices include forming fins on a substrate; forming a dummy gate over the fins, leaving a source and drain region exposed; etching the fins below a surface level of a surrounding insulator layer; and epitaxially growing fin extensions from the etched fins.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicants: Renesas Electronics Corporation, INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hong He, Shogo Mochizuki, Chiahsun Tseng, Chun-Chen Yeh, Yunpeng Yin
  • Publication number: 20150067835
    Abstract: An apparatus for detecting abnormal behavior of users is disclosed. The apparatus identifies from a log of user activity, a first number of actions performed by a user over a first time period that match a pattern of user activity for a task associated with one or more roles of the users. The apparatus also identifies from the log of user activity, a second number of actions performed by the user over a second time period that match the pattern of user activity. The apparatus calculates an amount of deviation between the first number of actions and the second number of actions. The deviation identifies a difference between amounts of time spent in the one or more roles. The apparatus then determines whether the amount of deviation between the first number of actions and the second number of actions exceeds a threshold for abnormal behavior.
    Type: Application
    Filed: September 20, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
  • Publication number: 20150067297
    Abstract: DMA translation table entries include a consecutive count (CC) field that indicates how many subsequent translation table entries point to successive real page numbers. A DMA address translation mechanism stores a value in the CC field when a translation table entry is stored, and updates the CC field in other affected translation table entries as well. When a translation table entry is read, and the CC field is non-zero, the DMA controller can use multiple RPNs from the access to the single translation table entry. Thus, if a translation table entry has a value of 2 in the CC field, the DMA address translation mechanism knows it can access the real page number (RPN) corresponding to the translation table entry, and also knows it can access the two subsequent RPNs without the need of reading the next two subsequent translation table entries.
    Type: Application
    Filed: April 14, 2014
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Jesse P. Arroyo, Gregory M. Nordstrom, Srinivas Kotta, Eric N. Lais
  • Publication number: 20150067120
    Abstract: A computer-implemented method, computer program product, and computer system for double IP address recovery. Double IP address is a situation of a same IP address for different hosts in a network, and the double IP address recovery resolves the double IP address. In the invention, the hosts exchanges rules and system state information. Each of the hosts determines its own action of the double IP address recovery based on the same rules and the system state information of the different hosts. Each of the hosts executes its own action, either to continue or to alter an IP address.
    Type: Application
    Filed: September 5, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Dirk Bolte, Yaroslav Chernov, Victor Gusev, Alexander Kuchin, Martin Kuenzel, Adolf Martens, Andrey Mishin, Dmitry Moor
  • Publication number: 20150067714
    Abstract: An indication from a user is detected by a first content viewing device to transfer an advertisement delivered to the first content viewing device as part of streamed audio and video (A/V) content to an alternative content viewing device. A determination is made, based upon user-specific advertising configuration information, as to whether the user is authorized to perform advertisement deferral during the streamed A/V content. The advertisement is configured as an incentivized deferred advertisement to be viewed by the user at a later time using the alternative content viewing device in response to determining that the user is authorized to perform advertisement deferral during the streamed A/V content. The configured incentivized deferred advertisement is transferred to the alternative content viewing device.
    Type: Application
    Filed: September 3, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Gregory J. Boss, Sheryl L. Comes, Rick A. Hamilton, II, Anne R. Sand
  • Publication number: 20150066439
    Abstract: Obtaining physical model data for CAD model generation with a process that includes: receiving a first acceleration-based path data set including acceleration data for an accelerometer device as it was traced over a first path along the surface of a physical object, converting the first acceleration-based path data set to a first position-based data set including position data for the accelerometer as it was traced over the first path along the surface of the physical object, and generating a three dimensional object model data set based, at least in part on the position data of the first position-based data set.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Christopher P. Jones, Jonathan Lenchner, Nathan Masters, Daniel A. Mazzella, James A. Oravec, Rodrigo A. Rey
  • Publication number: 20150063106
    Abstract: Methods and arrangements for managing variable-priority flows in a network. Requests for transmission of digital content are received from client devices, each request being associated with a priority, the requests including at least one lower-priority delayable request and at least one higher-priority request. A usable bandwidth for delivery of the requested digital content through the network is estimated and, within the estimated usable bandwidth, there is controlled at least one flow associated with the at least one lower-priority request in the presence of at least one flow for the at least one higher-priority request. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Umamaheswari C. Devi, Ravindranath Kokku, Vinay Kumar Kolar, Mukundan Madhavan
  • Publication number: 20150067222
    Abstract: A compute node includes a motherboard having a trusted platform module, and also includes a port for selectively coupling a hot pluggable device into communication with the motherboard. The compute node further includes a circuit coupled to the port for detecting a change in the physical connection of the hot pluggable device to the port and for asserting a physical presence signal to the trusted platform module in response to detecting a change in the physical connection of the hot pluggable device to the port. The change in the physical connection of the hot pluggable device to the port may include either physically connecting the hot pluggable device to the port, physically disconnecting the hot pluggable device from the port, or a combination thereof.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Raghuswamyreddy Gundam, Newton P. Liu, Douglas W. Oliver, Nicholas A. Ramirez, Mehul M. Shah, Wingcheung Tam
  • Publication number: 20150064362
    Abstract: A planar closed-magnetic-loop inductor and a method of fabricating the inductor are described. The inductor includes a first material comprising a cross-sectional shape including at least four segments, at least one of the at least four segments including a first edge and a second edge on opposite sides of an axial line through the at least one of the at least four segments. The first edge and the second edge are not parallel.
    Type: Application
    Filed: October 2, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Robert E. Fontana, JR., William J. Gallagher, Philipp Herget, Eugene J. O'Sullivan, Lubomyr T. Romankiw, Naigang Wang, Bucknell C. Webb
  • Publication number: 20150066596
    Abstract: A method for systematically determining a pricing strategy based on one or more of a business insight, a price perception model and a surprise model.
    Type: Application
    Filed: April 18, 2014
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Yi-Min Chee, Pavankumar Murali, Anshul Sheopuri, Wei Sun
  • Publication number: 20150063722
    Abstract: A method and non-transitory program for determining a plane in a depth image includes dividing a portion of a depth image into a plurality of areas, fitting a two-dimensional line to depth points in each of the plurality of areas, and combining two or more of the plurality of two-dimensional lines to form a three-dimensional plane estimate.
    Type: Application
    Filed: September 30, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventor: Jonathan H. Connell, II
  • Publication number: 20150067625
    Abstract: A datapath extraction tool uses machine-learning models to selectively classify clusters of cells in an integrated circuit design as either datapath logic or non-datapath logic based on cluster features. A support vector machine and a neural network can be used to build compact and run-time efficient models. A cluster is classified as datapath if both the support vector machine and the neural network indicate that it is datapath-like. The cluster features may include automorphism generators for the cell clusters, or physical information based on the cell locations from a previous (e.g., global) placement, such as a ratio of a total cell area for a given cluster to a half-perimeter of a bounding box for the given cluster.
    Type: Application
    Filed: September 3, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventor: Samuel I. Ward
  • Publication number: 20150064817
    Abstract: Embodiments of the present invention provide an electrically controlled optical fuse. The optical fuse is activated electronically instead of by the light source itself. An applied voltage causes the fuse temperature to rise, which induces a transformation of a phase changing material from transparent to opaque. A gettering layer absorbs excess atoms released during the transformation.
    Type: Application
    Filed: October 31, 2014
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kangguo Cheng, Raghavasimhan Sreenivasan
  • Publication number: 20150060275
    Abstract: A technique is provided for forming a nanodevice for sequencing. A bottom metal contact is disposed at a location in an insulator that is on a substrate. A nonconducting material is disposed on top of the bottom metal contact and the insulator. A carbon nanotube is disposed on top of the nonconducting material. Top metal contacts are disposed on top of the carbon nanotube at the location of the bottom metal contact, where the top metal contacts are formed at opposing ends of the carbon nanotube at the location. The carbon nanotube is suspended over the bottom metal contact at the location, by etching away the nonconducting material under the carbon nanotube to expose the bottom metal contact as a bottom of a trench, while leaving the nonconducting material immediately under the top metal contacts as walls of the trench.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Ali Afzali-Ardakani, Aaron D. Franklin, George S. Tulevski
  • Publication number: 20150067087
    Abstract: In one exemplary embodiment, a computer-implemented method includes receiving, at a remote direct memory access (RDMA) device, a plurality of RDMA requests referencing a plurality of virtual pages. Data transfers are scheduled for the plurality of virtual pages, wherein the scheduling occurs at the RDMA device. The number of the virtual pages that are currently pinned is limited for the RDMA requests based on a predetermined pinned page limit.
    Type: Application
    Filed: September 30, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Xavier R. Guerin, Xiaoqiao Meng, David P. Olshefski, John M. Tracey
  • Publication number: 20150066969
    Abstract: A method for data management. The method includes a computer selecting a first data record and a second data record. The computer determines whether the first data record and the second data record share a deterministic matching category. Responsive to determining the first data record does not share a deterministic matching category with the second data record, the computer determines whether the first data record and the second data record share a probabilistic matching category.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Subashree Natarajan, Ankur B. Shah
  • Publication number: 20150067122
    Abstract: A computer program product and computer system for double IP address recovery. Double IP address is a situation of a same IP address for different hosts in a network, and the double IP address recovery resolves the double IP address. In the invention, the hosts exchanges rules and system state information. Each of the hosts determines its own action of the double IP address recovery based on the same rules and the system state information of the different hosts. Each of the hosts executes its own action, either to continue or to alter an IP address.
    Type: Application
    Filed: December 11, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Dirk Bolte, Yaroslav Chernov, Victor Gusev, Alexander Kuchin, Martin Kuenzel, Adolf Martens, Andrey Mishin, Dmitry Moor
  • Publication number: 20150066882
    Abstract: A method for automated policy-driven transitioning of governed objects in a service registry is provided. The method includes receiving a request in a service registry executing in memory of a host server computing system to persist a governed object of a service registry. The method also includes identifying a policy to be applied to the governed object in response to the receipt of the request. The method yet further includes applying the policy to the governed object and determining whether or not the application of the policy has been successful. Finally, the method includes triggering a transition of the governed object from a contemporaneous state to a new state in the service registry if the application of the policy has been successful. In this way, governed objects of the service registry can be transitioned from one state to the other driven by policies in an automated way.
    Type: Application
    Filed: September 5, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventor: Devaprasad K. Nadgir
  • Publication number: 20150061076
    Abstract: At least one three dimensional semiconductor fin is formed from a top semiconductor material of a substrate. A dielectric material is formed along vertical sidewalls and an upper surface of the at least one three dimensional semiconductor fin. A polysilicon resistor is formed on exposed surfaces of the dielectric material and surrounding the at least one semiconductor fin. An interconnect dielectric material is formed above the polysilicon resistor. The interconnect dielectric material has at least one contact structure that extends through the interconnect dielectric to an upper surface of the polysilicon resistor.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kangguo Cheng, Bruce B. Doris, Ali Khakifirooz, Alexander Reznicek
  • Publication number: 20150066960
    Abstract: In defining database objects for storage in a storage hierarchy, frequencies of accesses of a plurality of database objects over a predetermined time period are observed. A mean and standard deviation for the plurality of database objects are computed based on the observed frequencies of accesses of the plurality of database objects. A z-score for a given database object is determined based on a comparison of the frequency of access for the given database with the mean and standard deviation computed for the plurality of database objects by the computing processor; and a level in the storage hierarchy corresponding to the z-score of the given database object is determined. The given database object may then be stored at the level in the storage hierarchy corresponding to the z-score of the given database object.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kevin L. BECK, Kevin J. CHERKAUER
  • Publication number: 20150067657
    Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include replacing, in one or more initial source code files, each reference to a first function configured to convey system messages with a respective reference to a second function configured to convey the system messages, thereby producing respective corresponding preprocessed source code files for the one or more initial source code files. The respective corresponding preprocessed source code files are then compiled, thereby creating an executable file. While executing the executable file, a call to the second function is received, wherein the call includes a text string. A name of one of the respective corresponding preprocessed source code files storing the call to the second function is identified, and based on the identified name and the text string, a computed destination is determined for the text string. Finally, the text string is conveyed to the computed destination.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Janice M. GIROUARD, Yehuda SHIRAN
  • Publication number: 20150067308
    Abstract: A system includes a multi-node chassis including a chassis management module, a plurality of compute nodes, and a physical presence manual actuator for transmitting a physical presence signal to each compute node in response to manual actuation. Each server has a firmware interface, a trusted platform module, and an AND gate. The firmware interface has a general purpose input output pin for providing an enabling signal in response to a user instruction to a firmware interface setup program that communicates with the firmware interface. The AND gate has a first input receiving the enabling signal, a second input receiving the physical presence signal, and an output coupled to the trusted platform module, wherein the AND gate for a selected compute node asserts physical presence to the trusted platform module of the selected compute node in response to receiving both the enabling signal and the physical presence signal.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Shiva R. Dasari, Raghuswamyreddy Gundam, Karthik Kolavasi, Newton P. Liu, Douglas W. Oliver, Nicholas A. Ramirez, Mehul M. Shah, Wingcheung Tam
  • Publication number: 20150061279
    Abstract: An anti-counterfeiting technique presents, to a test thermoreflective mark at a first temperature, a first electromagnetic wave. A first test reflective profile for the test thermoreflective mark associated with the first temperature is recorded. A second electromagnetic wave is presented to the test thermoreflective mark at a second temperature. A second test reflective profile for the test thermoreflective mark associated with the second temperature is recorded. The first test reflective profile is compared with a first control reflective profile that is associated with a genuine thermoreflective mark. The second test reflective profile is compared with a second control reflective profile that is associated with the genuine thermoreflective mark.
    Type: Application
    Filed: December 11, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Ethan E. Cruz, Michael W. Harper, Ryan M. Kruse, Arden L. Moore, Brian G. Veraa
  • Publication number: 20150067065
    Abstract: A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Blaine H. Dolph, Miku K. Jha, Sandeep R. Patil, Gandhi Sivakumar, Matthew B. Trevathan