IBM Patents
The International Business Machines Corporation provides IT infrastructure and services to enterprise customers.
IBM Patents by Type- IBM Patents Granted: IBM patents that have been granted by the United States Patent and Trademark Office (USPTO).
- IBM Patent Applications: IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120104505Abstract: A method is provided that includes forming a high-k dielectric etch stop layer over at least a first conductivity type semiconductor device on a first portion of a substrate and at least a second conductivity type semiconductor device on a second portion of the semiconductor device. A first stress-inducing layer is deposited over the first conductivity type semiconductor device and the second conductivity type semiconductor device. The portion of the first stress-inducing layer that is formed over the second conductivity type semiconductor device is then removed with an etch that is selective to the high-k dielectric etch stop layer to provide an exposed surface of second portion of the substrates that includes at least the second conductivity type semiconductor device. A second stress-inducing layer is then formed over the second conductivity type semiconductor device.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventor: William K. Henson
-
Publication number: 20120109789Abstract: Identifying one or more source units for one or more food items may include assigning a sequence of numbers to a plurality of source units received at a processing entity and assigning a sequence of numbers to a plurality of end product units processed from the plurality of source units at the processing entity. A production rate associated with the end product units may be determined from a bill of materials associated with the end product units. A probability distribution function may be generated using at least the production rate. The probability distribution function maps a range of the sequence numbers associated with the plurality of source units to a range of sequence numbers associated with the end product units. A conversion algorithm may be generated that uses the probability distribution function to determine a source unit associated with a selected end product unit.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Himanshu V. Bhatt, Rong Zeng Cao, Wei Ding, Xiang Yang He, Shun Jiang, Juhnyoung Lee, Feng Li, Shih-Gong Li, Tie Liu, Feng Chun Wang, Hao Zhang
-
Publication number: 20120110207Abstract: Internet Protocol Version 6 (IPv6) was described in RFC 2460 in 1998 and was designed to succeed Internet Protocol Version 4. In 2005, RFC 4007 was published. RFC 4007 specifies the architectural characteristics and usage of IPv6 addresses with different zones. Some applications (“legacy applications”) were not designed to support the implementations described in RFC 4007. Therefore, the legacy applications may accept IPV6 addresses as input, but may not accept zone identifiers. Embodiments include conveying an IPv6 link-local unicast address with an embedded zone identifier to a legacy application.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventor: Seth D. Jennings
-
Publication number: 20120110164Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeffrey A. Frey, Hiren R. Shah, Peter B. Yocom
-
Publication number: 20120110526Abstract: A method and an apparatus for tracking uncertain signals in the simulation of chip design are provided. The method comprises: generating a directed graph which contains sequential logic devices and IO devices from the netlist of chip design, wherein the directed graph illustrates the signal association among the sequential logic devices and IO devices; obtaining the signals related with the sequential logic devices and IO devices from the simulation results, wherein the signals contain a plurality of uncertain signals; and back tracing at least a part of the plurality of uncertain signals along the directed graph to determine the device which firstly generates an uncertain signal. The corresponding apparatus is also provided. With the above method and apparatus, uncertain signals can be traced and their source can be determined, which improves the debugging efficiency.Type: ApplicationFiled: October 25, 2011Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Liang Chen, Yufei Li, Yong Feng Pan, Jian Yang
-
Publication number: 20120108015Abstract: Underfill flow guide structures and methods of using the same are provided with a module. In particular the underfill flow guide structures are integrated with a substrate and are configured to prevent air entrapment from occurring during capillary underfill processes.Type: ApplicationFiled: January 10, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Timothy H. Daubenspeck, Jeffrey P. Gambino, Christopher D. Muzzy, Marie-Claude Paquet, Wolfgang Sauter, Timothy D. Sullivan
-
Publication number: 20120106003Abstract: A magnetic tape head according to one embodiment includes a first section having a tape bearing surface (TBS) and portions that are recessed from the TBS; a thin film section coupled to the first section, the thin film section comprising transducers for at least one of reading from and writing to a magnetic tape, and a lubricating layer above at least the first section. Additional systems and methods are also disclosed.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Robert G. Biskeborn, Jason Liang, Calvin S. Lo
-
Publication number: 20120110086Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Friedemann Baitinger, Jeffrey A. Frey, Joseph M. Gdaniec, Peter B. Yocom
-
Publication number: 20120109908Abstract: Techniques are described for estimating and managing memory compression for query processing. Embodiments of the invention may generally include receiving a query to be executed, ascertaining indicatory data about the retrieved data, and selectively compressing a portion of the data in memory according to the indicatory data. In one embodiment, the amount of compression performed during each query execution is recorded and outputted to assist in adjusting the selective compression process.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric L. Barsness, Paul S. Nelsestuen, John M. Santosuosso
-
Publication number: 20120110549Abstract: An illustrative embodiment of a computer-implemented process for detecting code breakage using source code change history receives a point in time within an identified range of time to form a selected time, receives a set of source files associated with the a selected time, receives a set of history files associated with the received set of source files and initializes a workspace in a sandbox using the set of source files and the set of history files. The computer-implemented process incrementally executes the received set of source files from the selected time forward, determines whether a code break occurs and responsive to a determination that the code break occurs, presents a list of files. The computer-implemented process receives an identified file from the list of files to form a suspect file, and receives a correction for the suspect file.Type: ApplicationFiled: June 6, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven John Earl Gutz, Thomas Anthony MacDougall, Mohammed Mostafa
-
Publication number: 20120103566Abstract: Methods of preventing overheating of computer equipment in a cabinet when a supply coolant to a cooler in the cabinet fails. An example embodiment is a data center that includes a plurality of cabinets and at least two coolant supply lines. The cabinets are configured to house computer equipment and the coolant supply lines provide coolant for the cabinets. Moreover, the cabinets are arranged in at least one row of adjacent cabinets such that each row of adjacent cabinets receives coolant from alternating coolant supply lines.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Madhusudan K. Iyengar, Roger R. Schmidt
-
Publication number: 20120110271Abstract: Various systems and processes may be used to speed up multi-threaded execution. In certain implementations, a system and process may include the ability to write results of a first group of execution units associated with a first register file into the first register file using a first write port of the first register file and write results of a second group of execution units associated with a second register file into the second register file using a first write port of the second register file. The system, apparatus, and process may also include the ability to connect, in a shared register file mode, results of the second group of execution units to a second write port of the first register file and connect, in a split register file mode, results of a part of the first group of execution units to the second write port of the first register file.Type: ApplicationFiled: June 27, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Maarten J. Boersma, Markus Kaltenbach, Jens Leenstra, Tim Niggemeier, Philipp Oehler, Philipp Panitz
-
Publication number: 20120110451Abstract: A method of providing help information for an application program includes capturing, with a computing device, an operation performed for completing a task; recording the operation in correspondence to the task; and indicating the operation in an application program interface for a user to perform the same operation in response to the user's designation of the task.Type: ApplicationFiled: October 13, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiang Yang He, Shun Jiang, Tie Liu, Hao Zhang
-
Publication number: 20120110153Abstract: Administering incident pools including creating a pool of incidents, the pool having a predetermined initial period of time; assigning each received incident to the pool; assigning, by the incident analyzer, to each incident a predetermined minimum time for inclusion in a pool; extending for one or more of the incidents the predetermined initial period of time of the pool by a particular period of time assigned to the incident; determining whether conditions have been met to close the pool; and if conditions have been met to close the pool determining for each incident in the pool whether the incident has been in the pool for its predetermined minimum time for inclusion in a pool; and if the incident has not been in the pool for its predetermined minimum time, evicting the incident from the closed pool and including the incident in a next pool.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark G. Atkins, James E. Carey, Matthew W. Markland, Philip J. Sanders
-
Publication number: 20120110294Abstract: A method of memory management includes allocating a portion of a memory as a memory heap including a plurality of segments, each segment having a segment size; performing one or more memory allocations for objects in the memory heap; creating a free list array and class-size array in a metadata section of the memory heap, the class-size array being created such that each element of the size-class array is related a particular one of the plurality of segments and the free list array being created such that each element of the free list array is related to a different size class; and initializing the heap when it is determined that the heap may be destroyed, initializing including clearing the free list array.Type: ApplicationFiled: January 6, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hiroshi Inoue, Hideaki Komatsu
-
Publication number: 20120110047Abstract: A method for scheduling a data processing job includes receiving the data processing job formed of a plurality of computing units, combining the plurality of computing units into a plurality of sets of tasks, each set including tasks of about equal estimated size, and different sets having different sized tasks, and assigning the tasks to a plurality of processors using a dynamic longest processing time (DLPT) scheme.Type: ApplicationFiled: November 15, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Kirsten W. Hildrum, Rohit M. Khandekar, Vibhore Kumar, Sujay S. Parekh, Deepak Rajan, Joel L. Wolf, Kun-Lung Wu
-
Publication number: 20120105446Abstract: A clairvoyance method for 3D scene is disclosed, including the steps of acquiring parameters associated with a clairvoyance camera and parameters associated with a clairvoyance viewport; determining a 3D scene to be rendered according to the parameters associated with the clairvoyance camera; rendering the determined 3D scene to obtain a 2D image presented in the clairvoyance viewport; and composing the 2D image presented in the clairvoyance viewport and a 2D image presented in a general scene viewport. With the method of the present invention, the covered 3D scene can be made clairvoyant to be viewed in a user-controllable way, and further an object can be selected in the clairvoyant 3D scene for manipulation, without manipulating the covering object. Thus, one or more embodiments of the present invention have advantages of simple and easy operation and high efficiency.Type: ApplicationFiled: October 28, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bao Hua Cao, Qi Cheng Li, Jian Wang, Yi Min Wang, Zi Yu Zhu
-
Publication number: 20120110276Abstract: Migration management is provided for a shared memory logical partition migrating from a source system to a target system. The management approach includes managing migration of the logical partition from the source system to the target system by: transferring a portion of logical partition state information for the migrating logical partition from the source system to the target system by copying at the source system contents of a logical page of the migrating logical partition into a state record buffer for forwarding to the target system; forwarding the state record buffer to the target system; and determining whether the migrating logical partition is suspended at the source system, and if not, copying at the target system contents of the state record buffer to paging storage of the target system, the paging storage being external to physical memory managed by a hypervisor of the target system.Type: ApplicationFiled: January 6, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stuart Z. Jacobs, David A. Larson, Wade B. Ouren, Kenneth C. Vossen
-
Publication number: 20120109881Abstract: A method for information service identification during service modeling of a service oriented architecture (SOA) architected computing system includes loading a business process defined by different business services in memory of a service modeling tool executing in a host computing platform. The method further includes identifying different information elements directed for access by the business services and determining a set of information transactions for the identified different information elements. The method yet further includes generalizing the set of information transactions into a candidate list of information services. The method even yet further includes selecting from amongst the candidate list a selection of information services for incorporation into the business process. Finally, the method includes refining the business services of the business process to invoke the selection of information services to access the identified different information elements.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Abdul Allam, Asit Dan, Claus T. Jensen
-
Publication number: 20120110472Abstract: A request to navigate to a Uniform Resource Identifier (URI) can be received within a cobrowsing session. The cobrowsing session can be associated with a unique session identifier of a cobrowsing application. The cobrowsing application can be part of a collaboration software. An annotation previously associated with the URI from a historic cobrowsing session can be retrieved. Content associated with the URI can be obtained and presented within an interface associated with the cobrowsing session. The annotation can be presented within the content associated with the URI of the interface.Type: ApplicationFiled: October 27, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: DUSTIN K. AMRHEIN, ERIK J. BURCKART, ANDREW IVORY, AARON K. SHOOK
-
Publication number: 20120110044Abstract: Methods and systems for managing storage of data in a cloud by receiving a request, wherein the request includes information to store data within a cloud, environment comprising a plurality of data storages coupled to each other over a network; routing the data to be stored within a specific location of storage within the cloud environment by checking for any regulatory compliance. Other embodiments are also disclosed.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Abhinay R. NAGPAL, Sandeep R. PATIL, Sri RAMANATHAN, Matthew B. TREVATHAN
-
Publication number: 20120110073Abstract: A plurality of mashups created by a plurality of mashup authors indicated as being in a community relevant to a mashup based, at least in part, on social network data are identified in response to indication of a mashup building operation. Frequencies of a plurality of mashup configurations used by the plurality of mashup authors in the plurality of mashups are determined according to data about the plurality of mashups. A set of one or more recommendations that are associated with a set of one or more of the plurality of mashup configurations is generated for the mashup.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Al Chakra, John K. Gerken, Ruthie D. Lyle, Mark Maresh, Eric A. Stegner
-
Publication number: 20120110288Abstract: Various embodiments for defragmentation of a storage volume in a computing storage environment by a processor device are provided. A volume table of contents (VTOC) is serialized for a volume scan operation. At least one dummy data set in the storage volume is allocated, to be subsequently filled with actual data pursuant to a degragmentation operation. The serialization of the VTOC is released, allowing access to the storage volume. Input/output (I/O) operations are allowed to occur.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Douglas L. LEHR, Franklin E. McCUNE, David C. REED, Max D. SMITH
-
Publication number: 20120103935Abstract: A method for processing a structure. The structure is formed and includes a substrate, a substructure having a sidewall and disposed on the substrate, a first polymer structure disposed on the substrate, and a second polymer structure disposed on the substrate such that the first polymer structure is disposed between the sidewall and the second polymer structure. An aspect ratio of the first polymer structure, the second polymer structure, or both is reduced in a reducing step. One polymer structure (i.e., the first polymer structure or the second polymer structure) is selectively removed from the structure such that a remaining polymer structure (i.e., the second polymer structure or the first polymer structure) remains disposed on the external surface of the substrate after the one polymer structure has been selectively removed, wherein the aspect ratio of the remaining polymer structure was reduced in the reducing step.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicants: JSR CORPORATION, INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joy Cheng, Hayato Namai, Daniel P. Sanders
-
Publication number: 20120110585Abstract: A method for optimizing energy consumption in a data-processing system comprising a set of data-processing units is disclosed. In one embodiment, such a method includes indicating a set of data-processing jobs to be executed on a data-processing system during a production period. An ambient temperature expected for each data-processing unit during the production period is estimated. The method calculates an execution scheme for the data-processing jobs on the data-processing system. The execution scheme optimizes the energy consumed by the data-processing system to execute the data-processing jobs based on the ambient temperature of the data-processing units. The method then executes the data-processing jobs on the data processing system according to the execution scheme. A corresponding apparatus and computer program product are also disclosed.Type: ApplicationFiled: September 4, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Davide Cosentino, Scot MacLellan, Ivan Orlandi, Ignazio Trovato
-
Publication number: 20120106235Abstract: A method and embedded dynamic random access memory (EDRAM) circuit for implementing a physically unclonable function (PUF), and a design structure on which the subject circuit resides are provided. An embedded dynamic random access memory (EDRAM) circuit includes a first EDRAM memory cell including a memory cell true storage capacitor and a second EDRAM memory cell including a memory cell complement storage capacitor. The memory cell true storage capacitor and the memory cell complement storage capacitor include, for example, trench capacitors or metal insulator metal capacitors (MIM caps). A random variation of memory cell capacitance is used to implement the physically unclonable function. Each memory cell is connected to differential inputs to a sense amplifier. The first and second EDRAM memory cells are written to zero and then the first and second EDRAM memory cells are differentially sensed and the difference is amplified to consistently read the same random data.Type: ApplicationFiled: November 3, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Todd Alan Christensen, John Edwards Sheets, II
-
Publication number: 20120110434Abstract: A method, system, and computer usable program product for automated document governance in a data processing environment are provided in the illustrative embodiments. A set of structured documents is received at an application executing in a computer in the data processing environment. A structure is recognized, parts of which structure are present in the documents in the set. A set of similarities in the documents in the set is summarized according to the recognized structure. A summarized information from the summarizing is presented such that a document governance action can be performed on a subset of the set of documents using the summarized information.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramakrishna Janardhana Gorthi, Oriana Jeannette Love, David Walsh Palmieri, Jeffrey Tobias Robke
-
Publication number: 20120109972Abstract: A vectorization process is employed in which chemical identifier strings are converted into respective vectors. These vectors may then be searched to identify molecules that are identical or similar to each other. The dimensions of the vector space can be defined by sequences of symbols that make up the chemical identifier strings. The International Chemical Identifier (InChI) string defined by the International Union of Pure and Applied Chemistry (IUPAC) is particularly well suited for these methods.Type: ApplicationFiled: December 21, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Kane Boyer, GREGORY BREYTA, TAPAS KANUNGO, JEFFREY THOMAS KREULEN, JAMES J. RHODES
-
Publication number: 20120109622Abstract: An efficient facility for determining resource usage, such as a processor time used by tasks. The determination is performed on behalf of user applications that do not require a call to operating system services. The facility includes an instruction that determines elapsed time and reports it to the user as a single unit of operation.Type: ApplicationFiled: January 10, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Dan F. Greiner
-
Publication number: 20120109880Abstract: An illustrative embodiment of a computer-implemented method for using organizational awareness in locating business intelligence receives an identity of an individual in an organizational hierarchy of users to form an identified individual and identifies people related to the identified individual in the organizational hierarchy of users using a people information database and relationship criteria to form related people. The computer-implemented method further identifies documents associated with the related people to form identified documents, inspects gathered information of the identified documents using a subset of relationship criteria to form inspected information and creates a list of suggested documents based at least on the inspected information.Type: ApplicationFiled: July 18, 2011Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: David Dewar, Jason Hiltz-Laforge, Matthew J. Postle-Hacon
-
Publication number: 20120110092Abstract: A computer system can implement a mechanism for email thread monitoring and automatic forwarding of related email messages. In one embodiment, a first email message is provided from an email application of a computer system to a plurality of email addresses. An indication is detected, at the email application, that a first email address of the plurality of email addresses is to be provided a copy of subsequent email messages associated with the first email message. Subsequent email messages received at, and transmitted by, the email application are monitored to determine whether one or more of the subsequent email messages are associated with the first email message. In response to determining that a second email message from the subsequent email messages is associated with the first email message, a copy of the second email message is automatically provided to the first email address of the plurality of email addresses.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica K. Murillo, Johnny M. Shieh
-
Publication number: 20120108024Abstract: A field effect transistor (FET) includes a drain formed of a first material, a source formed of the first material, a channel formed by a nanostructure coupling the source to the drain, and a gate formed between the source and the drain and surrounding the nanostructure.Type: ApplicationFiled: January 6, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Josephine B. Chang, Michael A. Guillorn, Eric A. Joseph
-
Publication number: 20120109844Abstract: A system and method for cost-based migration planning includes determining cost factors and constraints associated with at least one of migrating and transforming a plurality of components. A cost-based model is constructed using the cost factors and constraints. The cost-based model is applied to groupings of the plurality of components to provide a cost-based determination grouping scheme in accordance with the constraints. The grouping scheme is output to provide migration waves for migrating or transforming the plurality of components.Type: ApplicationFiled: November 3, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Murthy Devarakonda, Nikolai A. Joukov, Birgit M. Pfitzmann, Lawrence H. Thompson
-
Publication number: 20120104496Abstract: At least one conductive via structure is formed from an interconnect-level metal line through a middle-of-line (MOL) dielectric layer, a shallow trench isolation structure in a top semiconductor layer, and a buried insulator layer to a bottom semiconductor layer. The shallow trench isolation structure laterally abuts at least two field effect transistors that function as a radio frequency (RF) switch. The at least one conductive via structure and the at interconnect-level metal line may provide a low resistance electrical path from the induced charge layer in a bottom semiconductor layer to electrical ground, discharging the electrical charge in the induced charge layer. The discharge of the charge in the induced charge layer thus reduces capacitive coupling between the semiconductor devices and the bottom semiconductor layer, and thus secondary coupling between components electrically disconnected by the RF switch is reduced.Type: ApplicationFiled: January 9, 2012Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Alan B. Botula, Alvin J. Joseph, Edward J. Nowak, Yun Shi, James A. Slinkman
-
Publication number: 20120110143Abstract: In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon.Type: ApplicationFiled: November 3, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20120104200Abstract: A mounting system, in one embodiment, includes two support ears, each support ear adapted for securing an electronic component to a rack. Each support ear includes a planar portion which includes at least one hole for receiving one or more fasteners for coupling to a side of the electronic component and a portion extending perpendicular to the planar portion having a frontal area. The perpendicular portion includes at least one pin positioned on a side opposite the frontal area for engaging with at least one hole in the rack, the at least one pin extending normal to the perpendicular portion in a direction about parallel to a plane of the planar portion, and a first fastener positioned on the side opposite the frontal area for coupling to the rack, the first fastener extending normal to the perpendicular portion in the direction about parallel to the plane of the planar portion.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: William J. Grady, IV, Jason E. Minyard
-
Publication number: 20120103402Abstract: An apparatus, system, and method are disclosed for providing optical power to a semiconductor chip. An active semiconductor layer of the semiconductor chip is disposed toward a front side of the semiconductor chip. The active semiconductor layer comprises one or more integrated circuit devices. A photovoltaic semiconductor layer of the semiconductor chip is disposed between the active semiconductor layer and a back side of the semiconductor chip. The back side of the semiconductor chip is opposite the front side of the semiconductor chip. The photovoltaic semiconductor layer converts electromagnetic radiation to electric power. One or more conductive pathways between the photovoltaic semiconductor layer and the active semiconductor layer provide the electric power from the photovoltaic semiconductor layer to the one or more integrated circuit devices of the active semiconductor layer.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Eric V. Kline
-
Publication number: 20120103821Abstract: Nanofluidic passages such as nanochannels and nanopores are closed or opened in a controlled manner through the use of a feedback system. An oxide layer is grown or removed within a passage in the presence of an electrolyte until the passage reaches selected dimensions or is closed. The change in dimensions of the nanofluidic passage is measured during fabrication. The ionic current level through the passage can be used to determine passage dimensions. Fluid flow through an array of fluidic elements can be controlled by selective oxidation of fluidic passages between elements.Type: ApplicationFiled: February 4, 2011Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Stefan Harrer, Stephen M. Rossnagel, Philip S. Waggoner
-
Publication number: 20120104090Abstract: A card-reader apparatus includes has a card interface for receiving data from a card presented to the card interface, a display, and a keypad having a plurality of keys for input of respective characters of user codes associated with cards presented to the card interface. The apparatus includes a controller for verifying a user code input for a card by processing the user code and the data received from the card by the card interface. The controller is adapted to generate a random mapping of user code characters to respective keys of the keypad, to control the display to indicate the mapping to a user, and to identify an input code character in accordance with the mapping. The apparatus is further adapted such that the mapping is displayed to the user with a limited viewing angle to inhibit unauthorized viewing.Type: ApplicationFiled: October 5, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Thomas R. Gross
-
Publication number: 20120110348Abstract: A system comprises a memory module configured to store signed page table data and a selected processing element coupled to the memory module. The selected processing element is one of a plurality of processing elements, which together comprise a portion of a multiprocessor system. The selected processing element is configured to authenticate page table management code and, based on authenticated page table management code, to sign page table data that is subsequently stored in the memory module, and to verify signed page table data that is read from the memory module.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: H. Peter Hofstee, Brian Flachs, Charles R. Johns
-
Publication number: 20120110372Abstract: A method includes receiving active application messages that are part of an active message stream in a subscribing client device from an active feed adapter. Each active application message is characterized by an active source stream identifier, an active source stream sequence number, and an active message sequence number. The method includes receiving, in response to a failover from the active feed adapter to a backup feed adapter, backup application messages in the subscribing client device from the backup feed adapter. Each backup application message is characterized by a backup source stream identifier, a backup source stream sequence number, and a backup message sequence number. The method includes administering, by the subscribing client device, the backup application messages in dependence upon the active stream source identifier, the active stream source sequence number, the backup stream source identifier, and the backup stream source sequence number.Type: ApplicationFiled: January 4, 2012Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Kenneth W. Borgendale, Eliezer Dekel, John L. Duigenan, Gidon Gershinsky, Alexander Krits, Nir Naaman, Foluso O. Okunseinde, Hilary A. Pike, Cornell G. Wright, JR.
-
Publication number: 20120106237Abstract: A technique for generating an adjustable boost voltage for a device includes charging, using first and second switches, a capacitor to a first voltage during a charging phase. The technique also includes stacking, using a third switch, a second voltage onto the first voltage across the capacitor in a boost phase to generate a boost voltage. In this case, the boost voltage is applied to a driver circuit of the device only during the boost phase and at least one of the first and second voltages is adjustable, thereby making the boost voltage adjustable.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: OSAMA DENGLER, ALEXANDER FRITSCH, WOLFGANG PENTH, JUERGEN PILLE
-
Publication number: 20120110533Abstract: A method, system and computer program product for implementing enhanced clock tree distributions to decouple across N-level hierarchical entities of an integrated circuit chip. Local clock tree distributions are constructed. Top clock tree distributions are constructed. Then constructing and routing a top clock tree is provided. The local clock tree distributions and the top clock tree distributions are independently constructed, each using an equivalent local clock distribution of high performance buffers to balance the clock block regions.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark R. Lasher, Daniel R. Menard, Phillip P. Normand
-
Publication number: 20120110302Abstract: A method, a system and a computer program product for effectively accelerating loop iterators using speculative execution of iterators. An Efficient Loop Iterator (ELI) utility detects initiation of a target program and initiates/spawns a speculative iterator thread at the start of the basic code block ahead of the code block that initiates a nested loop. The ELI utility assigns the iterator thread to a dedicated processor in a multi-processor system. The speculative thread runs/executes ahead of the execution of the nested loop and calculates indices in a corresponding multidimensional array. The iterator thread adds all the precomputed indices to a single queue. As a result, the ELI utility effectively enables a multidimensional loop to be replaced by a single dimensional loop. At the beginning of (or during) each iteration of the iterator, the ELI utility “dequeues” an entry from the queue to use the entry to access the array upon which the ELI utility iterates.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: IBM CorporationInventors: Ganesh Bikshandi, Dibyendu Das, Smruti Ranjan Sarangi
-
Publication number: 20120109606Abstract: A method of interactively achieving a Pareto-optimal design of systems is provided herein. The method includes the following stages: generating a system model containing elements that are associated with design parameters and design alternatives, as well as directives for calculating the system's measures of effectiveness (being the optimization objectives); exploring a plurality of design configurations all satisfying specified system constraints, meeting a Pareto optimal condition over the objective space, and representing different areas of the design and objective spaces; presenting a user with the determined set of design configurations; allowing the user to choose a range of interest, and repeating the exploring and presenting stages, wherein in each repetition, the exploring is carried out within a smaller sub-range, until the user makes a final selection of a design configuration.Type: ApplicationFiled: October 31, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Dolev Dotan, Amit Fisher, Michael Masin, Segev Wasserkrug
-
Publication number: 20120108017Abstract: Multiple types of gate stacks are formed on a doped semiconductor well. A high dielectric constant (high-k) gate dielectric is formed on the doped semiconductor well. A metal gate layer is formed in one device area, while the high-k gate dielectric is exposed in other device areas. Threshold voltage adjustment oxide layers having different thicknesses are formed in the other device areas. A conductive gate material layer is then formed over the threshold voltage adjustment oxide layers. One type of field effect transistors includes a gate dielectric including a high-k gate dielectric portion. Other types of field effect transistors include a gate dielectric including a high-k gate dielectric portion and a first threshold voltage adjustment oxide portions having different thicknesses. Field effect transistors having different threshold voltages are provided by employing different gate dielectric stacks and doped semiconductor wells having the same dopant concentration.Type: ApplicationFiled: January 10, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian J. Greene, Michael P. Chudzik, Shu-Jen Han, William K. Henson, Yue Liang, Edward P. Maciejewski, Myung-Hee Na, Edward J. Nowak, Xiaojun Yu
-
Publication number: 20120110524Abstract: A method of improving damascene wire uniformity without reducing performance. The method includes simultaneously forming a multiplicity of damascene wires and a multiplicity metal dummy shapes in a dielectric layer of a wiring level of an integrated circuit chip, the metal dummy shapes dispersed between damascene wires of the multiplicity of damascene wires; and removing or modifying those metal dummy shapes of the multiplicity of metal dummy shapes within exclusion regions around selected damascene wires of the multiplicity of damascene wires. Also a method of fabricating a photomask and a photomask for use in improving damascene wire uniformity without reducing performance.Type: ApplicationFiled: January 10, 2012Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Casey Jon Grant, Jude L. Hankey
-
Publication number: 20120109975Abstract: A method for clustering a plurality of data items stored in a computer includes calculating, with the computer, a plurality of components comprising kernels based on a distribution that gives similarity between the data items, wherein a non-negative mixture weight is assigned to each of the kernels; preparing a set of active components that are composed of subscripts of the mixture weights; applying operations to the set of active components; and determining whether the mixture weight has converged, and if not converged yet, reapplying the operations to the set of components, and if the mixture weight has converged, clustering the data items based on the mixture weight.Type: ApplicationFiled: October 12, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Rikiya Takahashi
-
Publication number: 20120109625Abstract: Verifying text translation in a program including obtaining a first program integrated information (PII) file and a second PII file of text in the program. An original page is generated by using the first PII file. Document object model (DOM) tree information of the original page is obtained. For each text unit in the original page: identification information corresponding to a first text unit in the first PII file is extracted; a second text unit is identified in the second PII file using the extracted identification information and a relationship between the identification information and the second text unit; and the first text unit is replaced in the DOM tree with the second text unit. A new page is generated using the text units from the second PII file.Type: ApplicationFiled: October 28, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ling Luo, Li Qiang Qi, Yan Min Sheng, Wei Ji Shi
-
Publication number: 20120109877Abstract: A method includes preparing a character string management table for managing character strings, a character string field, and a numerical field corresponding to the character string field in hierarchy structure data of a MOLAP, generating, in response to character string data being input into the character string field, a unique character string ID for a character string of the character string data and storing the character string ID into the numerical field, storing the character string ID and the character string data into the character string management table, calculating an aggregated value of the numerical fields by the numerical aggregation calculation of the MOLAP at a higher hierarchy layer of the hierarchy structure data, resolving the aggregated value into separate character string IDs at the higher hierarchy layer, and referring to the character string management table to obtain and display character string data corresponding to the resolved character string IDs.Type: ApplicationFiled: October 10, 2011Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shigeki Takeuchi, Yasuyuki Tominaga, Naomi Zenge