IBM Patents
The International Business Machines Corporation provides IT infrastructure and services to enterprise customers.
IBM Patents by Type- IBM Patents Granted: IBM patents that have been granted by the United States Patent and Trademark Office (USPTO).
- IBM Patent Applications: IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120061023Abstract: A method and apparatus are provided for implementing interleaved-dielectric joining of multi-layer laminates. First and second multi-layer laminates are provided, each having with a laminated portion and an unlaminated portion. The first and second multi-layer laminates are joined together at the unlaminated portions by interleaving a plurality of dielectric layers of the first and second multi-layer laminates. Respective conductors carried by adjacent dielectric layers are connected. The interleaved unlaminated portions are laminated together with heat and pressure, to create a larger laminate of the joined first and second multi-layer laminates.Type: ApplicationFiled: September 9, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Philip R. Germann, Mark J. Jeanson
-
Publication number: 20120066654Abstract: Spare cells are placed in an IC design using stability values associated with logic cones of the design. A desired spare cell utilization rate is assigned to a cone based on its stability value, and an actual spare cell utilization rate for the cone bounding box is calculated. If the actual utilization rate is less than the desired utilization rate, additional spare cells are inserted as needed to attain the desired utilization rate. The stability value is provided by a logic or circuit designer, or derived from historical information regarding the logic cone in a previous design iteration. Spare cells are placed for each logic cone in the design until a global spare cell utilization target is exceeded. The spare cell placement method can be an integrated part of a placement directed synthesis which is followed by early mode padding and design routing.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeremy T. Hopkins, Julie A. Rosser, Samuel I. Ward
-
Publication number: 20120066760Abstract: A method comprises determining a set of one or more authorizations associated with a role of a user responsive to the user entering a command with a parameter, wherein the command with the parameter is to be implemented via a first virtual partition that is configured to control access to a plurality of virtual input/output (I/O) devices by a plurality of other virtual partitions. The first virtual partition and the plurality of other virtual partitions are instantiated on a same system. The method includes determining that the role is authorized to execute the command based on the set of one or more authorizations. The method also includes determining that the role is authorized to execute the command with the parameter responsive to determining that the role is authorized to perform the command. The method includes executing the command with the parameter via the virtual partition.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Ray W. Anderson, Saurabh Desai, George M. Koikara, Ponnuvel Palaniyappan
-
Publication number: 20120066184Abstract: Techniques are described for speculatively executing operations on data in a data stream in parallel in a manner that increases the efficiency of the stream-based application. In addition to executing operations in parallel, embodiments of the invention may determine whether certain results produced by the parallel operations are valid results and discard any results determined to be invalid.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric L. Barsness, John M. Santosuosso
-
Publication number: 20120066615Abstract: Methods and systems for determining a relevancy of an electronic message, and for graphically indicating the relevancy to a user are disclosed. A method may include receiving an electronic message, such as an email, at an electronic messaging system. The method may also include determining a relevance level of the electronic message to a user based on one or both of a number of primary addressees and a number of secondary addressees identified in the electronic message. Further, the method may include displaying graphical indicia based on the relevance level.Type: ApplicationFiled: September 9, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas S. Brugler, Vincent C. Conzola, Randall A. Craig, Todd M. Eischeid, Mark E. Molander
-
Publication number: 20120063449Abstract: A network device can implement configurable socket aggregation to enable segmentation offload in the network device. In one embodiment, it is determined, at the network device, to create a network socket for an application of the network device to initiate a network connection for the application. Socket aggregation parameters are determined for the network socket associated with the application. The network socket is defined based, at least in part, on the socket aggregation parameters. A plurality of packets received from the application associated with the network socket are aggregated. It is determined, based on said aggregating the plurality of packets, whether at least one aggregation limit associated with the socket aggregation parameters is reached. An aggregate packet is provided to a network adapter of the network device to perform segmentation offload in response to said determining that at least one aggregation limit associated with the socket aggregation parameters is reached.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Maria J. Frederic, Nikhil Hegde, Sivakumar Krishnasamy, Vishal R. Mansur
-
Publication number: 20120066483Abstract: A computing device includes: an instruction cache storing primary execution unit instructions and auxiliary execution unit instructions in a sequential order; a primary execution unit configured to receive and execute the primary execution unit instructions from the instruction cache; an auxiliary execution unit configured to receive and execute only the auxiliary execution unit instructions from the instruction cache in a manner independent from and asynchronous to the primary execution unit; and completion circuitry configured to coordinate completion of the primary execution unit instructions by the primary execution unit and the auxiliary execution unit instructions according to the sequential order.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bechara F. Boury, Michael Bryan Mitchell, Paul Michael Steinmetz, Kenichi Tsuchiya
-
Publication number: 20120065974Abstract: Method, system, and computer program product are provided for Joint Factor Analysis (JFA) scoring in speech processing systems. The method includes: carrying out an enrolment session offline to enrol a speaker model in a speech processing system using JFA, including: extracting speaker factors from the enrolment session; estimating first components of channel factors from the enrolment session. The method further includes: carrying out a test session including: calculating second components of channel factors strongly dependent on the test session; and generating a score based on speaker factors, channel factors, and test session Gaussian mixture model sufficient statistics to provide a log-likelihood ratio for a test session.Type: ApplicationFiled: November 16, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aronowitz Hagai, Barkan Oren
-
Publication number: 20120066657Abstract: Disclose are embodiments of an integrated circuit design method based on a combination of manufacturability, test coverage and, optionally, diagnostic coverage. Design-for manufacturability (DFM) modifications to the layout of an integrated circuit can be made in light of test coverage. Alternatively, test coverage of an integrated circuit can be established in light of DFM modifications. Alternatively, an iterative process can be performed, where DFM modifications to the layout of an integrated circuit are made in light of test coverage and then test coverage is altered in light of the DFM modifications. Alternatively, DFM modifications to the layout of an integrated circuit can be made in light of test coverage and also diagnostic coverage. In any case, after making DFM modifications and establishing test coverage, any unmodified and untested nodes (and, optionally, any unmodified and undiagnosable tested nodes) in the integrated circuit can be identified and tagged for subsequent in-line inspection.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Kerry Bernstein, James A. Culp, Leah M.P. Pastel, Kirk D. Peterson, Norman J. Rohrer
-
Publication number: 20120066145Abstract: Modeling the governance process of reviewing service artifacts associated with a service in the SOA and generating, in dependence upon the modeled governance process, one or more automation modules, each automation module including a module of computer program instructions that, when executed by a computer processor, supports performance of one or more steps of the modeled governance process, where the modeled governance process includes preparing one or more service artifacts associated with the service for review, submitting the service artifacts for review, and reviewing the service artifacts.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Subrata Adhikary, Abdul Allam, Harish Bharti, William A. Brown
-
Publication number: 20120066671Abstract: Modeling a governance process of creating a new version of a service in a governed SOA and generating, in dependence upon the modeled governance process, automation modules that include modules of computer program instructions that, when executed by a computer processor, support performance of one or more steps of the modeled governance process and where the modeled governance process includes reviewing requested updates to a deployed service; determining, in dependence upon the requested updates and a specification of a present version of the deployed service, whether a new version of the deployed service is required; if a new version of the deployed service is required, determining whether the present version of the deployed service will be subsumed by the new version; and if the present version of the deployed service will be subsumed by the new version, retiring the present version of the deployed service.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Subrata Adhikary, Abdul Allam, Harish Bharti, William A. Brown
-
Publication number: 20120066228Abstract: Provided are techniques for receiving a request to create a current baseline with a baseline identifier and selecting data elements that are to be included in the current baseline. For each of the data elements, for a version of the data element to be included in the current baseline, a reference to the version of the data element is added to the current baseline and a baseline index element for the version of the data element is maintained by one of creating a new baseline index element or updating an existing baseline index element.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David P. CHARBONEAU, Simon K. JOHNSTON, Philippe P. MULET
-
Publication number: 20120066209Abstract: Embodiments of the invention are related to a method and system for identifying linked electronic mails by receiving a query from a user, wherein the query comprises at least a segment of an electronic mail; and based on the segment received, rendering to the user at least one of related subsets or a related supersets of electronic mails related to the received segment, wherein the related subsets and related supersets are threads of the segment received and arranged in a hierarchical manner.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Danish Contractor, Manjula Golla Hosurmath, Sachindra Joshi, Kenney Ng
-
Publication number: 20120066147Abstract: Modeling a governance process of optimizing a portfolio of services in a governed SOA and generating, in dependence upon the modeled governance process, one or more automation modules, each automation module including a module of computer program instructions that supports performance of one or more steps of the modeled governance process, where the modeled governance process includes determining whether a collection of service artifacts matches one or more service artifacts stored in a service registry; if no service artifacts stored in the service registry match the collection of service artifacts, initiating creation of a service in accordance with the collection of service artifacts; if one or more service artifacts stored in the service registry match the collection of service artifacts: selecting, in dependence upon predefined action selection criteria, a service administration action to perform; obtaining approval of the selected service administration action; and initiating the selected service adminiType: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Subrata Adhikary, Abdul Allam, Harish Bharti, William A. Brown
-
Publication number: 20120066547Abstract: A method for problem determination and resolution in an information technology (IT) system includes receiving a problem ticket, searching a database for a plurality of problem features based on data included in the problem ticket, extracting the plurality of problem features from the database, and generating a problem signature corresponding to the problem ticket, wherein the problem signature comprises at least one non-textual feature extracted from the plurality of problem features.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Allen M. Gilbert, Laura Zaihua Luan, Daniela Rosu, Christopher Ward
-
Publication number: 20120066284Abstract: Send-side matching of data communications messages in a distributed computing system comprising a plurality of compute nodes organized for collective operations, including: issuing by a receiving node to source nodes a receive message that specifies receipt of a single message to be sent from any source node, the receive message including message matching information, a specification of a hardware-level mutual exclusion device, and an identification of a receive buffer; matching by two or more of the source nodes the receive message with pending send messages in the two or more source nodes; operating by one of the source nodes having a matching send message the mutual exclusion device, excluding messages from other source nodes with matching send messages and identifying to the receiving node the source node operating the mutual exclusion device; and sending to the receiving node from the source node operating the mutual exclusion device a matched pending message.Type: ApplicationFiled: September 14, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHARLES J. ARCHER, MICHAEL A. BLOCKSOME, JOSEPH D. RATTERMAN, BRIAN E. SMITH
-
Publication number: 20120066372Abstract: An event notification system for distributed processing systems provides remote and local node event notification in systems that require local registration of an event consumer in order produce an event notifications. To provide notification of an event occurring on a remote node, either event consumers on all nodes in the cluster register locally to receive event notifications and specify that the event is a cluster event, in which case the nodes send notification of their locally-occurring events to all nodes, or remote registrations are accepted at nodes and if a local consumer for the event is not present, a listener thread registers as an event consumer. The listener thread sends the event notifications to the remote nodes registered as consumers for the event by observing communication between the event producer and the local consumer, or receiving the event notifications directly if there is no local consumer.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cheryl L. Jennings, Rajeev Mishra, Trishali Nayar, Lance W. Russell
-
Publication number: 20120063458Abstract: A method and apparatus allow multiple virtual machines to share the same IP address on an external network address space. The virtual machines reside on one or more physical host computer systems. A virtual network manager handles network traffic from a physical interface on the host computer and forwards network data to the appropriate virtual machine based on a destination port number. Data packets on the external network each have a destination and source port number. The virtual network manager uses a port range table that associates each virtual machine with a range of destination port numbers for incoming data packets. Each of the virtual machines is assigned a unique destination port range in the port range table and incoming data traffic on the external network is routed to the receiving virtual machines based on the destination port number in the data packet.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeffrey Klink, Mikhail Shoykher
-
Publication number: 20120061762Abstract: Asymmetric FET devices, and a method for fabricating such asymmetric devices on a fin structure is disclosed. The fabrication method includes disposing over the fin a high-k dielectric layer followed by a threshold-modifying layer, performing an ion bombardment at a tilted angle which removes the threshold-modifying layer over one of the fin's side-surfaces. The completed FET devices will be asymmetric due to the threshold-modifying layer being present only in one of two devices on the side of the fin. In an alternate embodiment further asymmetries are introduced, again using tilted ion implantation, resulting in differing gate-conductor materials for the two FinFET devices on each side of the fin.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kangguo Cheng, Bruce B. Doris, Ying Zhang
-
Modeling A Governance Process Of Establishing A Subscription To A Deployed Service In A Governed SOA
Publication number: 20120066663Abstract: Modeling a governance process of establishing a subscription to a deployed service in a governed Service Oriented Architecture (‘SOA’) and generating, in dependence upon the modeled governance process, one or more automation modules, each automation module comprising a module of computer program instructions that, when executed by a computer processor, supports performance of one or more steps of the modeled governance process, where the modeled governance process includes collecting available service artifacts associated with a deployed service; determining whether the deployed service meets predefined functional requirements; if the deployed service meets the predefined functional requirements, determining whether the deployed service meets predefined non-functional requirements if the deployed service meets the predefined non-functional requirements, creating a subscription request; requesting approval of the subscription request; and if approval is received, creating a subscription to the deployed serviceType: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Subrata Adhikary, Abdul Allam, Harish Bharti, William A. Brown -
Publication number: 20120065758Abstract: A method of sorting laminates includes characterizing first shapes of laminates from measurements taken of each, assembling the laminates to derive a first relationship between the first shapes and yield loss, characterizing second shapes of the laminates from a reduced number of the measurements to derive a second relationship between the second shapes and yield loss, analyzing a change in the derived relationships to determine a least number of the measurements necessary for achieving the yield loss and sorting supplied laminates in accordance with a characterized shape of each, which is obtained from the least number of the measurements taken for each supplied laminate.Type: ApplicationFiled: September 8, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sylvain Pharand, Rejean Paul Levesque, Isabelle Paquin, Denis Plouffe, Matthieu Lirette-Gelinas
-
Publication number: 20120064694Abstract: A method of forming a deep trench structure for a semiconductor device includes forming a mask layer over a semiconductor substrate. An opening in the mask layer is formed by patterning the mask layer, and a deep trench is formed in the semiconductor substrate using the patterned opening in the mask layer. A sacrificial fill material is formed over the mask layer and into the deep trench. A first portion of the sacrificial fill material is recessed from the deep trench and a first dopant implant forms a first doped region in the semiconductor substrate. A second portion of the sacrificial fill material is recessed from the deep trench and a second dopant implant forms a second doped region in the semiconductor substrate, wherein the second doped region is formed underneath the first doped region such that the second doped region and the first doped region are contiguous with each other.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Roger A. BOOTH, JR., Kangguo CHENG, Joseph ERVIN, Chengwen PEI, Ravi M. TODI, Geng WANG, Yanli ZHANG
-
Publication number: 20120066431Abstract: Embodiments include a method comprising detecting addition of a new nonvolatile machine-readable medium to a data storage pool of nonvolatile machine-readable media. The method includes preventing from being performed a first operation of a file system that requires a first parameter that identifies a logical indication of a location within the nonvolatile machine-readable media for the file system, until logical indications of locations within the new nonvolatile machine-readable medium for the file system have been stored in the data storage pool. The method includes allowing to be performed, prior to logical indications of locations within the new nonvolatile machine-readable medium being stored in the data storage pool, a second operation of the file system that does not require a second parameter that identifies a logical indication of a location within the nonvolatile machine-readable media, wherein the second operation causes data to be written into the new nonvolatile machine-readable medium.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: David K. Bradford, David J. Craft, Manoj N. Kumar, Grover H. Neuman, Frank L. Nichols, III, Andrew N. Solomon
-
Publication number: 20120066692Abstract: Distributing a computing operation among processes and for gathering results of the computing operation from the plurality of processes. An exemplary method includes the operations of pairing a plurality of processes such that each process has a maximum of one interaction partner, selecting half of the data located at a process, dividing the selected half of the data into a plurality of data segments, transmitting a first data segment resulting from the dividing operation from the process to the interaction partner of the process, receiving a second data segment at the process from the interaction partner, concurrently with the transferring and receiving operations, performing a computing operation on a third data segment previously received from a previous interaction partner and a fourth data segment from the data segments, and iterating over the transmitting, receiving and computing operations until all the data segments have been exchanged.Type: ApplicationFiled: October 9, 2011Publication date: March 15, 2012Applicant: International Business Machines CorporationInventor: Bin Jia
-
Publication number: 20120063593Abstract: A method, apparatus, and a computer readable storage medium having computer readable instructions to carry out the steps of the method for anonymous access to a database. Each record of the database has different access control permissions (e.g. attributes, roles, or rights). The method allows users to access the database record while the database does not learn who queries a record. The database does not know which record is being queried: (i) the access control list of that record or (ii) whether a user's attempt to access a record had been successful. The user can only obtain a single record per query and only those records for which he has the correct permissions. The user does not learn any other information about the database structure and the access control lists other than whether he was granted access to the queried record, and if so, the content of the record.Type: ApplicationFiled: September 9, 2011Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Maria Dubovitskaya, Gregory Neven, Greg Zaverucha
-
Publication number: 20120061848Abstract: A patterned adhesive layer including holes is employed to attach a coreless substrate layer to a stiffner. The patterned adhesive layer is confined to kerf regions, which are subsequently removed during singulation. Each hole in the patterned adhesive layer has an area that is greater than the area of a bottomside interconnect footprint of the coreless substrate. The patterned adhesive layer may include a permanent adhesive that is thermally curable or ultraviolet-curable. The composition of the stiffner can be tailored so that the thermal coefficient of expansion of the stiffner provides tensile stress to the coreless substrate layer at room temperature and at the bonding temperature. The tensile stress applied to the coreless substrate layer prevents or reduces warpage of the coreless substrate layer during bonding. Upon dicing, bonded stacks of a semiconductor chip and a coreless substrate can be provided without adhesive thereupon.Type: ApplicationFiled: September 9, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Edmund Blackshear
-
Publication number: 20120066278Abstract: Management of a file hierarchy for a clustered file system can be distributed across nodes of the cluster. A cluster file hierarchy is accessed to determine location of a file in response to a request to write to a file. A first node maintains the cluster file hierarchy. It is determined that management of a fileset object, which represents a fileset that includes the file, has been delegated to a second node based, at least in part, on said accessing the cluster file hierarchy. A node file hierarchy maintained by the second node is accessed responsive to determining the delegation. The cluster file hierarchy represents filesets of the clustered file system and the node hierarchy represents a subset of one or more of the filesets. Location of the file is determined based, at least in part, on said accessing the node file hierarchy.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Janet E. Adkins, Joon Chang, David J. Craft, Gokul B. Kandiraju, Manoj N. Kumar
-
Publication number: 20120061250Abstract: Techniques for electrodepositing zinc (Zn)-containing films are provided. In one aspect, a method of preparing a Zn electroplating solution is provided. The method includes the following steps. The solution is formed from a mixture of at least one zinc salt, a sulfonic acid and a solvent. The sulfonic acid is quenched with a base. A pH of the solution is adjusted to be either less than about 3.5 or greater than about 8.0. The pH of the solution can be adjusted by adding additional sulfonic acid to the solution to adjust the pH of the solution to be less than about 3.5 or by adding a second base to the solution to adjust the pH of the solution to be greater than about 8.0. A Zn electroplating solution and an electroplating method are also provided.Type: ApplicationFiled: September 9, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Shafaat Ahmed, Hariklia Deligianni
-
Publication number: 20120066182Abstract: Some embodiments of the inventive subject matter allow a redirect-on-write file system to continue processing file transactions while writing a snapshot to persistent storage. Thus, embodiments do not block file transactions while flushing snapshots to persistent storage. To avoid blocking, some embodiments the file system can maintain two snapshot generations. The first snapshot generation is the snapshot being written to persistent storage. The second snapshot generation may reside in main memory, and store data for file transactions occurring after the file system began writing the first snapshot generation.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Joon Chang, David J. Craft, Gokul B. Kandiraju, Manoj N. Kumar
-
Publication number: 20120066214Abstract: A method, system and computer program product provides a first characteristic associated with a first data set and a single data value, and a second characteristic associated with a second data set; and calculates at least one of: 1) the similarity of the first data set with the second data set based on the first and second characteristics, 2) the similarity of the first data set with the single data value based on the first characteristic and the single data value, 3) confidence indicating how well the first characteristic reflects properties of the first data set based on the first characteristic, and 4) confidence indicating how well the similarity of the first data set with the single data value reflects properties of the single data value based on the first characteristic and the single data value.Type: ApplicationFiled: June 30, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sebastian Nelke, Martin A. Oberhofer, Yannick Saillet, Jens Seifert
-
Publication number: 20120061247Abstract: Techniques for electrodepositing selenium (Se)-containing films are provided. In one aspect, a method of preparing a Se electroplating solution is provided. The method includes the following steps. The solution is formed from a mixture of selenium oxide; an acid selected from the group consisting of alkane sulfonic acid, alkene sulfonic acid, aryl sulfonic acid, heterocyclic sulfonic acid, aromatic sulfonic acid and perchloric acid; and a solvent. A pH of the solution is then adjusted to from about 2.0 to about 3.0. The pH of the solution can be adjusted to from about 2.0 to about 3.0 by adding a base (e.g., sodium hydroxide) to the solution. A Se electroplating solution, an electroplating method and a method for fabricating a photovoltaic device are also provided.Type: ApplicationFiled: September 9, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Shafaat Ahmed, Hariklia Deligianni
-
Publication number: 20120066290Abstract: A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI).Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeffrey D. Amsterdam, Brian W. Jensen, Brian M. O'Connell, Keith R. Walker
-
Publication number: 20120061838Abstract: A method of forming a barrier layer for metal interconnects of an integrated circuit device includes forming a first cap layer over a top surface of a conductive line of the integrated circuit device in a manner that facilitates a controllable dose of oxygen provided to the top surface of the conductive line, the conductive line comprising a metal formed over a seed layer that is an impurity alloy of the metal; and annealing the integrated circuit device so as to combine diffused impurity atoms of the seed layer with the controllable dose of oxygen, thereby forming an impurity oxide layer at an interface between the first cap layer and the top surface of the conductive line.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Daniel C. Edelstein, Takeshi Nogami, Hosadurga K. Shobha
-
Publication number: 20120061684Abstract: In an embodiment, a method of fabricating a transistor device comprises: providing a semiconductor topography comprising a gate conductor disposed above a semiconductor substrate between a pair of dielectric spacers; anisotropically etching exposed regions of the semiconductor substrate on opposite sides of the dielectric spacers to form recessed regions in the substrate; oxidizing exposed surfaces of the substrate in the recessed regions to form an oxide thereon; removing the oxide from bottoms of the recessed regions while retaining the oxide upon sidewalls of the recessed regions; and isotropically etching the substrate such that the recessed regions undercut the pair of dielectric spacers.Type: ApplicationFiled: November 21, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John C. Arnold, Xuefeng Hua, Rangarajan Jagannathan, Stefan Schmitz
-
Publication number: 20120061759Abstract: A MOSFET device is formed on top of a semiconductor-on-insulator (SOI) substrate having a semiconductor layer with a thickness ranging from 3 nm to 20 nm. A stair-shape raised extension, a raised source region and a raised drain region (S/D) are formed on top of the SOI substrate. The thinner raised extension region abuts at a thin gate sidewall spacer, lowering the extension resistance without significantly increasing the parasitic resistance. A single epitaxial growth forms the thinner raised extension and the thicker raised S/D preferably simultaneously, reducing the fabrication cost as well as the contact resistance between the raised S/D and the extension. A method of forming the aforementioned MOSFET device is also provided.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Kangguo Cheng, Bruce B. Doris, Ali Khakifirooz, Ghavam Shahidi
-
Publication number: 20120066389Abstract: A method includes receiving a command to migrate a workload partition from a source machine to a target machine. The source machine and the target machine are communicatively coupled to a first subnetwork and a second subnetwork, respectively. The workload partition has a source network address defined by network addressing of the first subnetwork. The method also includes determining a socket connection providing network communication between the workload partition and a host. The method includes notifying the host that the workload partition is migrating from the source machine to the target machine, wherein in response to the notifying the host is on alert to receive, through a network tunnel communication, an identification of a target network address that is assigned to the workload partition after the workload partition is migrated to the target machine. The workload partition is migrated from the source machine to the target machine.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Nikhil Hegde, Prashant A. Paranjape
-
Publication number: 20120066395Abstract: A method for dynamically provisioning a machine with applications to assist with work is a cloud computing environment is described. In one embodiment, such a method includes identifying a machine available for provisioning with at least one application. The method identifies work associated with a cloud computing environment. Responsive to identifying the work, the method determines how the machine can most optimally assist with the work. The method then dynamically provisions the machine with at least one application selected to enable the machine to most optimally assist with the work. A corresponding apparatus and computer program product are also disclosed.Type: ApplicationFiled: August 22, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard Ellis, Matthew Leming, Timothy Ward
-
Publication number: 20120066333Abstract: Some embodiments of the inventive subject matter are directed to detecting a request to access a symbol via a special file that accesses kernel memory directly. The request can come from an application from a first instance of an operating system (OS) running a first version of the OS. A second instance of the OS, which manages the first OS, receives the request. The second instance of the OS includes a kernel shared between the first and second instances of the OS. The second instance of the OS runs a second version of the OS. Some embodiments are further directed to detecting data associated with the symbol, where the data is in a first data format that is compatible with the second version of the OS but is incompatible with the first version of the OS. Some embodiments are further directed to reformatting the data from the first data format to a second data format compatible with the second version of the OS.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Luke M. Browning, Mallesh K. Lepakshaiah, Kavitha Ramalingam
-
Publication number: 20120066512Abstract: When software is delivered to a customer, there are often programs or routines of programs that a software distributor intended to run under the credentials of a specific user other than the user who started the program. A secure method is proposed for software running in a process to acquire rights to issue restricted operations. A trusting entity trusts a process based on verifying ownership of code residing in the process. The trusted process is granted rights by the trusting entity to perform any or specific operations under the credentials of a specific user, not necessarily the current process user.Type: ApplicationFiled: September 9, 2011Publication date: March 15, 2012Applicants: SAP Gh, INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric Kass, Joachim Kern
-
Publication number: 20120066274Abstract: An original file of a versioned WPAR, that are incompatible with a global operating system, can be persistently replaced with a corresponding replacement file that is compatible with the global operating system. For this, the original file can be renamed and a symbolic link file can be created to reference the replacement file instead of the original file. A software maintenance program can also be persistently replaced to preserve the replacement file and to maintain compatibility with the global operating system regardless of new instances of the original file delivered by the software maintenance program. The replacement file that corresponds to the original file can be identified and renamed. In response to detecting a new version of the original file, the new version of the original file can be renamed. A reference to the new version of the original file can be updated to reference the replacement file.Type: ApplicationFiled: September 9, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventor: Marc J. Stephenson
-
Publication number: 20120066516Abstract: A processor, circuit and method provide for fast decryption of encrypted program instructions for execution by the processor. A programmable look-up coding is used to decode a field within the instructions. The decoded field for the instructions are recombined with the remaining portion of the same instructions to yield the decoded instructions. The programmable look-up coding can be programmed and controlled by a process executing at a higher privilege level than the program represented by the instructions, so that security against code-modifying attacks is enhanced.Type: ApplicationFiled: November 21, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gordon D. McIntosh, Edward John Silha
-
Publication number: 20120066191Abstract: Embodiments include a method comprising transmitting from a node of a plurality of nodes within a clustered file system provides concurrent file I/O access for files, to write access a region of a file. The method includes receiving an authorization to write access the region without a lock to preclude access of the region by other nodes, if at least one physical section in a machine-readable medium has been allocated for storage of the region by the server. The method includes receiving the authorization to write access the region with the lock to preclude access of the region by the other nodes, if the at least one physical section in the machine-readable medium has not been allocated for storage of the region by the server. Responsive to receiving the authorization to write access, metadata is transmitted for storage into the at least one physical section in the machine-readable medium.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Joon Chang, Robert K. Gjertsen, Ninad S. Palsule
-
Publication number: 20120066399Abstract: A new instance of a connection that is in the wait state can be established while mitigating connection identifier collisions. Based on a connection identifier in a connection request received at a server from a client, it is determined that a previous instance of a connection represented by the connection identifier is in a wait state. An acknowledgement message comprising wait state parameters associated with the connection identifier and original connection parameters associated with the previous instance of the connection in the wait state is provided from the server to the client. In response, the server receives a compliance message comprising updated wait state parameters and updated connection parameters from the client. The new instance of the connection represented by the connection identifier that previously represented the previous instance of the connection is established based, at least in part, on the updated wait state parameters and the updated connection parameters.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: David R. Marquardt, Prashant A. Paranjape
-
Publication number: 20120066190Abstract: In some embodiments, a file management unit located in the operating system detects a write operation that writes the data blocks within the consistency snapshot (in main memory) to the persistent storage. The file management unit can then determine that all transactions have been completed before the write operation begins. In some instances, the file management unit then attempts to write the data blocks within the consistency snapshot to the persistent storage. The file management unit can then receive a notification that the write operation did not successfully write the data blocks from the consistency snapshot to the persistent storage. In some embodiments, the write operation is not successful because there are fewer free data blocks in the persistent storage than needed for writing the data blocks within the consistency snapshot to persistent storage. The file management can then wait a period of time.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Janet E. Adkins, Matthew T. Brandyberry, David J. Craft, Manoj N. Kumar, Andrew N. Solomon
-
Publication number: 20120066146Abstract: Modeling a governance process of investigating service reuse in a governed SOA and generating, in dependence upon the modeled governance process, one or more automation modules, each automation module including a module of computer program instructions that, when executed by a computer processor, supports performance of one or more steps of the modeled governance process, where the modeled governance process includes receiving a specification of service requirements, interpreting the service requirements against a registry of deployed services including determining whether a deployed service meets the service requirements, and if a deployed service meets the requirements, initiating a subscription to the deployed service.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Subrata Adhikary, Abdul Allam, Harish Bharti, William A. Brown
-
Publication number: 20120066192Abstract: A method includes atomically reading a next field of a current element of the linked list to determine a first value that encodes a first pointer to the first element and a first indication of an owner of the first element. The first indication of the owner is stored in a first of a plurality of multi-field reservation data structures. The operation includes determining whether the next field of the current element still indicates the first value. The operation includes reading the first element of the linked list via the first pointer if the next field of the current element still indicates the first value. If the next field of the current element indicates a current value different than the first value, the first indication of the owner is removed from the first multi-field reservation data structure, and storing and determining with the second value is repeated.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: David A. Hepkin, Stephen B. Peckham
-
Publication number: 20120063094Abstract: Techniques provide improved thermal interface material application in an assembly associated with an integrated circuit package. For example, an apparatus comprises an integrated circuit module, a printed circuit board, and a heat transfer device. The integrated circuit module is mounted on a first surface of the printed circuit board. The printed circuit board has at least one thermal interface material application via formed therein in alignment with the integrated circuit module. The heat transfer device is mounted on a second surface of the printed circuit board and is thermally coupled to the integrated circuit module. The second surface of the printed circuit board is opposite to the first surface of the printed circuit board.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Michael A. Gaynes, Dong G. Kam, Duixian Liu, Scott K. Reynolds
-
Publication number: 20120066470Abstract: A method, and associated system, for allocating memory to a first pipeline that includes a sequence of filters. Each filter is configured to execute a process specific to each filter, receive input data, and generate output data. The output data from each filter, except the last filter in the sequence, serves as the input data to the next filter in the sequence. An optimum memory capacity is allocated to the first pipeline if possible. Otherwise, a guaranteed memory bandwidth is allocated to the first pipeline if possible. Otherwise, extra memory currently allocated to a second pipeline is currently released if the second pipeline not currently performing processing or subsequently released when the second pipeline subsequently completes performing processing that is currently being performed, followed by allocating the extra memory to the first pipeline.Type: ApplicationFiled: August 11, 2011Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atsushi Fukuda, Masakuni Okada, Kazuto Yamafuji, Takashi Yonezawa
-
Publication number: 20120066636Abstract: In general, embodiments of the present invention provide an approach to control computer-based interfaces from anywhere in a GUI (e.g. a window, a desktop, etc.) regardless of the fixed position of the instances. Specifically, using a pointing device or the like (e.g., by right clicking), a user can activate an instance control function that allows the user to open an instance, close an instance, and/or or switch between running instances. Along these lines, the instance control function can be activated by interacting with an icon, a window (e.g., corresponding a folder or a running instance), or a desktop. Once activated, the instance control function allows the user full control over instances.Type: ApplicationFiled: September 15, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hema J. Kaprani, Vinay V. Peshave, Anand G. Umbare, Dinesh G. Wadekar
-
Publication number: 20120066694Abstract: An event notification system for distributed processing systems provides reduction of queue space and event processing bandwidth associated with duplicate events such as a particular event that is duplicated and results in multiple event notifications propagated for multiple consumers. When a duplicate event notification is received at an input to an event notification queue, rather than queuing the duplicate event notification, a sequence number of the event notification already in the queue is updated to indicate to the event consumer, exactly how many duplicate events have been received. The timestamp of the updated event notification may also be set to the timestamp of the most recently received duplicate event notification.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cheryl L. Jennings, Rajeev Mishra, Trishali Nayar, Lance W. Russell