IBM Patents
The International Business Machines Corporation provides IT infrastructure and services to enterprise customers.
IBM Patents by Type- IBM Patents Granted: IBM patents that have been granted by the United States Patent and Trademark Office (USPTO).
- IBM Patent Applications: IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Patent number: 7006336Abstract: A magnetic head for thermally-assisted writing of data to a disk is disclosed. In one illustrative example, the magnetic head includes a write head element and a heating element which is a resistive infared radiator. The heating element is coupled to at least one via pad which is exposed on an outer surface of the magnetic head. This via pad may be the same pad utilized for the write head element or for a read sensor. The heating element is formed beneath or within the pole tip such that it is able to transfer heat to a portion of the disk before the write head element can write data to it Advantageously, the heater facilitates the writing of data to high coercivity media.Type: GrantFiled: August 6, 2002Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: Kevin Robert Coffey, Jeffrey Scott Lille, Andrew Ching Tam
-
Patent number: 7006985Abstract: The seller of computer components who has developed the process for configuring computer systems or networks provides a configuration process comprising a prompting system or computer purchasers to make a sequence of interactive data entries, each of said entries relative to the data processing needs of the purchaser of one of said computer systems, allocating said computer components to said computer systems based upon said user entries which are indicative of the system needs solution of that purchaser, and tracking the quantities of said computer components thereby allocated to computer systems sold by said seller to said purchasers.Type: GrantFiled: March 31, 1999Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: Jeffrey Randell Dean, Jeffrey Langdon Howard, Ingrid Milagros Rodriguez
-
Patent number: 7005744Abstract: A structure and method are provided for a conductor line stack of an integrated circuit. The conductor line stack includes a layer of a first material such as heavily doped polysilicon or a metal silicide. A layer of a second material such as a metal is formed over the layer of first material, the layer of second material having an upper portion and a lower portion. A pair of first spacers is disposed on sidewalls of the upper portion, wherein the lower portion has width defined by a combined width of the upper portion and the pair of first spacers. A pair of second spacers is formed on sidewalls of the first spacers, the lower portion and the layer of first material. The conductor line stack structure is well adapted for formation of a borderless bitline contact in contact therewith.Type: GrantFiled: September 22, 2003Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: Xiangdong Chen, Li Wang
-
Patent number: 7007054Abstract: Faster discrete cosine transforms that use scaled terms are disclosed. Prior to application of a transform, equations are arranged into collections. Each collection is scaled by dividing each of the discrete cosine transform constants in the collection by one of the discrete cosine transform constants from the collection. Each of the scaled discrete cosine transform constants are then represented with approximated sums of powers-of-2. During the execution phase the block of input data is obtained. A series of predetermined sums and shifts is performed on the data. The output results are saved.Type: GrantFiled: October 23, 2000Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: Michael Thomas Brady, Jennifer Quirin Trelewicz, Joan LaVerne Mitchell
-
Patent number: 7007125Abstract: A technique and mechanism for reducing memory latency asymmetry in a multiprocessor system by replacing one (or more) processors with a bypass or pass-through device. Using the pass-through mechanism, the reduced number of processors in the system enables all of the remaining processors to connect to each other directly using the interconnect links. The reduction in processor count improves symmetry and reduces overall latency thereby potentially improving performance of certain applications despite having fewer processors. In one specific implementation, the pass through device is used to connect two HyperTransport links together where each of the links is connected to a processor at the other end.Type: GrantFiled: June 24, 2003Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: John Howard Barker, Beeman Noel Fallwell, Jr.
-
Patent number: 7007228Abstract: A system and method for searching, accessing, retrieving, representing and browsing geographic or location related information from the Web (i.e.: HTML documents that describe physical places), including a geographic distribution of places where selectable types of resources are located or certain types of services provided. A user may select any one of the automatically mapped locations and browse the information for this location. Documents accessible through the Web are tagged with the cartographic coordinates of the physical location referenced in the document and, optionally, with attributes of this physical location. Also provided is a method for searching and retrieving the tagged documents from a computer system by queries specifying parameters such as the cartographic coordinates of a reference location, the size of the geographic area to search around this reference location, and/or attributes of the locations to search inside that geographic area.Type: GrantFiled: March 13, 2000Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventor: Fernando Incertis Carro
-
Patent number: 7007200Abstract: An example of a solution provided here comprises analyzing an incident, responding to said incident, and customizing the response, based on the result of the analysis. Another example of a solution comprises accessing a knowledge base, comparing a current incident to known incidents in said knowledge base, and if a match is found, retrieving information from said knowledge base, said information being relevant to the current incident. Methods for handling errors, systems for executing such methods, and instructions on a computer-usable medium, for executing such methods, are provided.Type: GrantFiled: July 11, 2002Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventor: Hany A. Salem
-
Patent number: 7007251Abstract: Database mining, analysis and optimization techniques in conjunction with the model-based functional coverage analysis are used to turn raw verification and coverage data into design intelligence (DI) and verification intelligence (VI). The required data and attributes are automatically extracted from verification, simulation and coverage analysis databases. Design finite state machine extraction, design functional event extraction, and automatic coverage model generation and optimization techniques are applied to the design HDL description. Coverage model tuning and optimization directives, as well as test spec tuning and optimization directives are generated based on the analysis and mining of various verification, simulation, and coverage databases. An integrated web-based interface portlet is used for access, analysis and management of the resulting databases, generated reports and verification directives.Type: GrantFiled: November 12, 2003Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventor: Amir Hekmatpour
-
Patent number: 7007006Abstract: The invention herein provides method and apparatus, including software for determining a set of materialized views or indices of the contents or a subset of the contents of a database in a data processing system to be created for one or more users of the database. The method and apparatus provide method and means for evaluating a workload presented by a user to the database; evaluating the data processing system characteristics; evaluating the database characteristics; and, using the above evaluations for recommending a set of suitable materialized views or indices to the user.Type: GrantFiled: June 21, 2002Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: Daniel C. Zilio, Gary G. Valentin, Guy M. Lohman, Calisto P. Zuzarte, Roberta J. Cochrane, Hamid Pirahesh, Markos Zaharioudakis, Kit Man Cheung, Kevin S. Beyer, David E. Simmen, Ting Y. Leung, Samuel S. Lightstone
-
Patent number: 7007183Abstract: A power-aware, logically partitioned data processing system and corresponding method of use include a set of physical resources and a hypervisor. The hypervisor creates partitions and allocates at least some of the physical resources to the partitions. The system further includes means for reducing the power consumption of any physical resources not allocated to a partition. The hypervisor may allocate physical resources to the partitions to maximize the number of unallocated physical resources. The physical resources may include processors and the hypervisor may allocate a fractional portion of at least one processor to a partition. In this embodiment, the system may reduce power consumption by scaling the supply voltage or clocking frequency to the fractionally allocated processor. The resources may include memory modules and the hypervisor may dynamically reduce the allocated memory and power consumption by minimizing the number of memory modules needed to support the memory allocated to the partitions.Type: GrantFiled: December 9, 2002Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventor: Freeman Leigh Rawson, III
-
Patent number: 7006254Abstract: A method (and system) of embedding data into an image, includes producing an extended image using a halftoning algorithm on a collection of images, and projecting the extended image onto its first coordinates.Type: GrantFiled: May 3, 2001Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventor: Chai Wah Wu
-
Publication number: 20060041569Abstract: A system and a method for the deferral and incremental performance of integrity processing for data rolled into a table of a data warehouse and for the deferral and incremental performance of maintenance on data rolled out of a table of the data warehouse while permitting general users online access to other data contained in the table. The rolled in and rolled out data are contained within specific data partitions of the table. Each data partition in the table has an associated distinguishable partition ID. Each data partition can also have associated attributes corresponding to containing rolled-in and rolled-out data respectively. Table operation mechanisms are arranged such that general users of the table do not access rolled in data in a partition for which integrity processing has not yet been performed and do not access rolled out data.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Kevin Beck, Paul Brett, Jeffrey Goss, Dieu La, Catherine McArthur, William O'Connell
-
Publication number: 20060039612Abstract: Selection devices, methods and systems for selecting, among a plurality of elements, a nearest neighbor set which is a set of elements each having a relation to a predetermined reference element, a degree of the relation meeting a predetermined condition. A selection device includes: a nearest neighbor set candidate selection unit for selecting, among the plurality of elements, a set of elements determined that the set of elements have stronger relations to the reference element, as each of a plurality of nearest neighbor set candidates, which are a plurality of different candidates for the nearest neighbor set; and a nearest neighbor set selection unit for selecting, as the nearest neighbor set, a set of elements having relations, degrees of which meet the predetermined condition, to the reference element, among a union of the plurality of nearest neighbor set candidates.Type: ApplicationFiled: May 10, 2005Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Jun Sakuma, Michael Houle
-
Publication number: 20060041880Abstract: A method, apparatus, system, and signal-bearing medium that, in an embodiment, determine the classes that are needed during a first invocation of an application and preload those classes during a subsequent invocation of the application. In various embodiments, the classes may be preloaded if they are within a specified package, if they were needed greater than a threshold number of times, if the class path did not change between the first invocation and the subsequent invocation, or if the jar files the contain the classes are in a class path. In this way, an embodiment of the invention may increase the performance of class preloading.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian Martin, Daniel Moravec, Thomas Musta, Eric Norman
-
Publication number: 20060041440Abstract: An improved solution for managing a project comprising one or more shared artifacts is described. In particular, an interactive event can be detected on a user system, and a notice of the interactive event can be generated. The notice can be provided to one or more other user systems that are currently accessing the project. A user interface at the other user system(s) can automatically surface information on the interactive event to a user.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Li-Te Cheng, Werner Geyer, Susanne Hupfer, John Patterson, Steven Ross, Martin Wattenberg
-
Publication number: 20060041626Abstract: The disclosed invention is an improvement to a demand-based messaging system that enables multiple message recipients to coordinate responses to the message. The improved messaging system comprises a messaging program that provides an interface through which a recipient can indicate an intent to reply to the message.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Yen-Fu Chen, John Handy-Bosma, Mei Selvage, Keith Walker
-
Publication number: 20060040188Abstract: A method of designing an alternating phase shifting mask for projecting an image of an integrated circuit design having a plurality of spaced segments of critical dimension. The method initially identifies a phase universe boundary, such that the phase universe comprises a contiguous region of the integrated circuit layout wherein critical dimension segments within the phase universe are beyond a maximum phase interaction distance from any critical dimension segments outside the phase universe in accordance with predetermined design rules. The method then divides the phase universe into phase regions separated by the integrated circuit layout and any extensions of the critical dimension segments so that the phase regions are binary colorable within the phase universe.Type: ApplicationFiled: August 18, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Lars Liebmann, Carlos Fonseca
-
Publication number: 20060041878Abstract: Methods, systems, and products are disclosed for implementing a generic kernel extension framework that operate generally to allow one kernel extension to register a function callable by other kernel extensions. A kernel extension can be loaded even if a function it potentially could need is not available. If in fact the running kernel extension does eventually request a function that no other kernel extension has registered to provide, it is failed gracefully with a return error code. The client kernel extension can still function normally, assuming the desired service is non-critical. Example services in the non-critical category may include, for example, advanced error handling functions, statistical functions, reporting functions, and so on, including many others as will occur to those of skill in the art.Type: ApplicationFiled: August 18, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andre Albot, Robert Kovacs, Michael Lyons, James Pafumi, Wojciech Stryjewski
-
Publication number: 20060041867Abstract: A method, apparatus and computer program product are provided for implementing compiled breakpoint analysis. A debugger user interface is displayed for defining breakpoint properties. Responsive to a predefined user selection, a conditional breakpoint and condition are exported to be compiled for debug. When a source module is compiled for debug, the conditional breakpoint is inserted into the program executable for a user-selected line. When debugging the program executable, the compiled conditional breakpoint is identified. A compiled breakpoint table is used to set a conditional breakpoint on the user-selected line and to identify statement numbers for the true and false legs of a compiled condition.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cary Bates, Victor Gettler
-
Publication number: 20060039110Abstract: A structure for cooling an electronic component includes a heat sink attached to the component, an inner air duct extending into a central portion of the heat sink, and an outer air duct extending into an outer portion of the heat sink. In inner fan, within the inner air duct, moves air in one direction, while an outer fan, in the outer air duct, moves air in the other direction. The fans may be built as separate rotors, or as separate portions of a single rotor.Type: ApplicationFiled: August 18, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Jimmy Foster, Michael June, Albert Makley, Jason Matteson
-
Publication number: 20060038167Abstract: A method and structure for an integrated circuit comprising a first transistor and an embedded carbon nanotube field effect transistor (CNT FET) proximate to the first transistor, wherein the CNT FET is dimensioned smaller than the first transistor. The CNT FET is adapted to sense signals from the first transistor, wherein the signals comprise any of temperature, voltage, current, electric field, and magnetic field signals. Moreover, the CNT FET is adapted to measure stress and strain in the integrated circuit, wherein the stress and strain comprise any of mechanical and thermal stress and strain. Additionally, the CNT FET is adapted to detect defective circuits within the integrated circuit.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Hakey, Mark Masters, Leah Pastel, David Vallett
-
Publication number: 20060041846Abstract: A method of organizing a plurality of windows for display to a user is described. The windows are displayed in a cascade stack. One of the windows is selected as an active window and is displayed in a preferred display state such as a maximized window, a window having a predefined window size or a window at a predetermined location in the display. Once the user no longer wishes to use the active window, the window is returned to the cascade stack in a position dependent on the particular cascade mode selected by the user.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Eric Masselle, Patrick McGowan
-
Publication number: 20060041756Abstract: Disclosed is a method of authorizing access to an item that maintains a lockout count and blocks access to the item if the lockout count exceeds a predetermined value. One feature is that the invention “variably” increments the lockout count if the presented password fails to exactly match the stored password. In this process the invention increments the lockout count different amounts depending upon how closely the presented password matches the stored password. The invention also provides a methodology that allocates a plurality of the same passwords to a plurality of users who share the same userid. The invention allows continuous operation of the item being accessed by providing that each of the passwords has a different expiration date. Also, when dealing with situations where a plurality of users who share the same userid also share the same password, the invention maps information associated with the users to the password in a data file and periodically updates the data file.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINE CORPORATIONInventors: Guru Ashok, Raymond Dunki-Jacobs, Robert Milne, Rahul Nahar, Ashit Shah, Shreesh Tandel, Muthuswamy Venkatachalam
-
Publication number: 20060041391Abstract: Techniques for protein structure analysis are provided. In one aspect, a method of analyzing a multi-domain protein structure comprises the following steps. For at least one domain, a hydrophobic dipole, e.g., defined as a first-order hydrophobic moment of the domain, is calculated. A score representing the orientation of the hydrophobic dipole of the at least one domain relative to a hydrophobic dipole of one or more other domains of the multi-domain protein structure is then calculated.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Prasanna Athma, Ajay Royyuru, Benjamin Silverman, Ruhong Zhou
-
Publication number: 20060041932Abstract: Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.Type: ApplicationFiled: August 23, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Daryl Cromer, Richard Cheston, Steven Goodman, Howard Locker, Randall Springfield
-
Publication number: 20060041823Abstract: A method, apparatus, and article of manufacture containing instructions for processing multiple point-in-time consistent data sets. The method consists of creating multiple point-in-time data sets associated with a backup appliance which is associated with backup storage. Upon the transfer of a first update from a primary storage controller to the backup appliance, a determination is made whether the update affects data stored in the backup storage has been unchanged following the creation of the respective data sets. If the update does affect data which is unchanged following the creation of a data set, the current, non-updated data is read from the backup storage. A copy of the current, non-updated data thus read from the backup storage is stored in a storage location which can be one of the data sets or an independent memory location. In addition, pointers are associated with the remaining applicable data sets and directed to the copy at its storage location.Type: ApplicationFiled: August 3, 2004Publication date: February 23, 2006Applicant: International Business Machines (IBM) CorporationInventors: John Wolfgang, Kenneth Day, Philip Doatmas, Kenneth Boyd
-
Publication number: 20060041625Abstract: A process of segmenting a single email so that portions of it may be directed to or away from select recipients is disclosed. The sender highlights portions of the email and right clicks (or key command, button, or menu item) and selects an option to select recipients. The operator interface then provides the sender with the option of selecting recipients from their address book or the server's address book. To speed the process along, the sender may select those already on the To, Cc, or Bcc distribution lists. The sender then selects whether those chosen will receive the highlighted portion or if they will be excluded from receiving it. Lastly, the sender will have the option of providing text that is unique to each of the selected groups.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Yen-Fu Chen, John Handy-Bosma, Mei Selvage, Keith Walker
-
Publication number: 20060039457Abstract: A low power DSL modem transmitter, suitable for incorporation in integrated DSLAM server line cards, transmits full power physical frames which include a control channel and a data field when data is available for transmission and physical frames having only a control channel or a control channel and a low power synchronization field when data is not available for transmission. And a method for controlling the total power dissipated in the integrated DSLAM by selectively restricting the flow of data packets to the DSLs.Type: ApplicationFiled: September 28, 2005Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Gordon Davis, Jeffrey Derby, Evangelos Eleftheriou, Sedat Oelcer, Malcolm Ware
-
Publication number: 20060041792Abstract: A file validator technique for identifying a test specification to be used for testing validity of a file element associated with a file is provided. The test specification is a member in one of a set of test specifications embedded in the file validator and a set of test specifications not embedded in the file validator. According to the technique, a file element is selected, a pointer associated with the selected file element is selected, and a pointer is used to select the test specification associated with the selected file element, the selected test specification being selectable from one of the set of test specifications embedded in the file validator and the set of test specifications not embedded in the file validator.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Ernest Mah, Lawrence Mandel, Craig Salter
-
Publication number: 20060041579Abstract: Provides structured-document processing device for detecting a relationship of approximateness between structured documents effectively. State-transition-diagram information storing means stores information concerning a state transition diagram where source nodes of a source structured document transit in order of occurrence from the head thereof. Extracting means extracting, a pair consisting of a new node and a corresponding source node in accordance with order of occurrence. Matching means determining whether the source and new nodes in the selection pair have matchingness, on the basis of their descriptions. Node qualifying means qualifying the source node as a node to be used for the new node. Transition-history information generating means generates, as transition-history information, information concerning a transition history regarding the node to be used.Type: ApplicationFiled: June 8, 2005Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Hisashi Miyashita, Michiaki Tatsubori, Toshiro Takase, Satoshi Makino, Kent Tamura, Yuichi Nakamura
-
Publication number: 20060041758Abstract: A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display.Type: ApplicationFiled: October 22, 2005Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James Dunn, Edith Stern, Barry Willner
-
Publication number: 20060040513Abstract: A method of fabricating a dielectric film comprising atoms of Si, C, O and H (hereinafter SiCOH) that has improved insulating properties as compared with prior art dielectric films, including prior art SiCOH dielectric films that are not subjected to the inventive deep ultra-violet (DUV) is disclosed. The improved properties include reduced current leakage which is achieved without adversely affecting (increasing) the dielectric constant of the SiCOH dielectric film. In accordance with the present invention, a SiCOH dielectric film exhibiting reduced current leakage and improved reliability is obtained by subjecting an as deposited SiCOH dielectric film to a DUV laser anneal. The DUV laser anneal step of the present invention likely removes the weakly bonded C from the film, thus improving leakage current.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alessandro Callegari, Stephan Cohen, Fuad Doany
-
Publication number: 20060038170Abstract: The present invention relates to methods and apparatus for producing an electronic device, such as an organic light-emitting diode (OLED), having an electrode with enhanced injection properties. An example method according to the invention comprises the steps of providing an electrode, depositing a first layer of molecular charge transfer material on the electrode, and cross-linking the molecular charge transfer material. With the method according to the invention, an OLED with higher light efficiency, lower operating voltage, and longer lifetime can be produced. The present invention further relates to an electronic device having an electrode with enhanced injection properties.Type: ApplicationFiled: August 16, 2005Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Thomas Brunschwiler, Siegfried Karg, Walter Riess
-
Publication number: 20060038444Abstract: A communication system, which includes a microelectronics chip including a power distribution network; a transmitter operatively configured to generate a communication signal and provide the communication signal to the power distribution network; and a receiver operatively configured to receive the communication signal from the power distribution network. A method is also provided for transmitting a communication signal via a power distribution network of a microelectronics chip.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Serafino Bueti, Adam Courchesne, Kai Feng, Kenneth Goodnow, Gregory Mann, Scott Vento
-
Publication number: 20060041780Abstract: Tracks of meta data are cleared in a storage server by allocating task control blocks for executing associated tasks in parallel. Throttling and recycling of task control blocks is provided to efficiently use memory and processing resources. Under the control of a master task, task control blocks are allocated to different hierarchical levels of storage resources in the storage server, such as a logical subsystem level and a subordinate volume level. The task control blocks are not deallocated from memory until there are no further tasks to process.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Angelique Budaya, Aaron Mahar, James Springer
-
Publication number: 20060041754Abstract: A method, system and apparatus for detecting and preventing content distribution site impersonation. In this regard, a method for detecting and preventing content distribution site spoofing can include the steps of loading a markup language document and a corresponding digital signature for processing and ensuring that the digital signature originates from a pre-specified source of the markup language document incorporated within the markup language document. The method further can include the steps of dynamically computing a hash value for the markup language document and comparing the dynamically computed hash value to a hash value encrypted within the digital signature. Finally, the method can include the step of detecting content distribution site spoofing either if the digital signature does not originate from the pre-specified source, or if the dynamically computed hash value does not match the hash value encrypted within the digital signature.Type: ApplicationFiled: August 23, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: John Hind, Marcia Stockton
-
Publication number: 20060041834Abstract: The invention that meets the needs identified above is a web browser plug-in or feature comprising a modification program (MP), a configuration program (CP), a sorting program (SP), algorithms and rules, that interacts with a web browser to analyze a web page for tables, and to insert controls. The analysis consists of interrogating incoming hypertext markup language (HTML) for table structure <table>, <tr>, <th> and <td> tags, and incoming text for delimiters. The configuration program introduces controls into the text for each column and row delimeter that met a criteria for being sortable. In addition, the configuration program introduces controls into the HTML for each column and row tag that met a criteria for being sortable. The configuration program links the controls to a sorting algorithm so that when activated, the appropriate sorting algorithm will act on the row or column associated with the control. The controls are injected before the web browser renders the web page.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Yen-Fu Chen, John Handy-Bosma, Keith Walker
-
Publication number: 20060038684Abstract: The present invention is a method system that detects the altering of the contents of a package. This system comprises a Radio Frequency Identification (RFID) tag that is affixed to a package. This RFID can receive, store and transmit information received related to the package contents. A pressure sensitive material is positioned in the package such that this material can sense the weight of the package contents. When the weight of the package contents changes, the RFID tag will receive a signal directly or indirectly from the pressure sensitive material. This weight change is recorded in the RFID. When a RFID reader energizes the RFID, this current package weight is transmitted to the RFID tag reader. The RFID tag reader can then determine if the weight transmitted by the RFID tag is the original package weight or a new package weight. A new package weight would indicate some altering of the original package contents.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventor: Sandip Lahiri
-
Publication number: 20060041628Abstract: A system and method for separating inter-organizational email from the intra-organizational processing of that email are described. An email message is received by an email client program executing at a client computing system. A route operation is selected for the email message. A routing slip is generated in response to the route operation. The routing slip includes an electronic representation of the email message and can be sent to other members of an organization bearing this representation. Each recipient of the routing slip can access the email message through the electronic representation. Information that becomes part of the routing slip remains separate from the contents of the email message. To reply to the email message, an unroute operation restores the email message from the routing slip. A reply to the email message can then be sent without any of the information in the routing slip appearing the reply.Type: ApplicationFiled: August 23, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventor: Michael Muller
-
Publication number: 20060041624Abstract: A method and system for generating an individualized electronic message is described. The method includes receiving at an electronic message server a source message and generating a plurality of individualized electronic messages based upon an association between respective body portions of the source message and intended recipient groups. The source message includes a first body portion having a first group identifier and a second body portion having a second group identifier.Type: ApplicationFiled: August 18, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Ruthie Lyle, Veronique Moses, Andrew Schirmer
-
Publication number: 20060041883Abstract: A method for deploying software in a computer system includes providing a deployment maintenance mechanism (DMM) which includes drivers for hardware. A deployment mechanism which includes an image with drivers for hardware and which identifies hardware associated with the computer, along with a native operating system, are also provided. For hardware detected by the deployment mechanism and not having an associated driver in the image, a driver from the DMM is copied into the deployment mechanism using the native operating system. The native operating system is then re-booted to deploy drivers for hardware associated with the computer.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Howell Chambers, Kevin Henegar, David Karner, Andrew Mueller
-
Publication number: 20060039203Abstract: A register file apparatus and method incorporating read-after-write blocking using detection cells provides improved read access times in high performance register files. One or more detection cells identical to the register file cells and located in the register file array are used to control the read operation in the register file by configuring the detection cells to either alternate value at each write or change to a particular value after a write and then detecting when the write has completed by detecting the state change of an active detection cell. The state change detection can be used to delay the leading edge of a read strobe or may be used in the access control logic to delay generation of a next read strobe. The register file thus provides a scalable design that does not have to be tuned for each application and that tracks over voltage and clock skew variation.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Sam Chu, Peter Klim, Michael Lee, Jose Paredes
-
Publication number: 20060040504Abstract: A photoresist trimming gas compound is provided which will selectively remove a resist foot or scum from the lower portions of sidewalls of a photoresist. Additionally, the trimmer compound hardens or toughens an upper surface of the photoresist thereby strengthening the photoresist. The trimmer compound includes O2 and at least one other gaseous oxide and is typically utilized in a dry etching process after a trench has been formed in a photoresist The other oxide gases, in addition to the O2 may include CO2, SO2 and NO2.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shaun Crawford, Cuc Huynh, A. Reid, Adam Smith, Thomas Wagner
-
Publication number: 20060041619Abstract: A system and method for creating an on-demand virtual drive from dedicated storage on a plurality of partners in a peer-to-peer network using an agent installed on each of the partners. The agent has a contributing program and a requesting program. The contributing program creates a first storage unit and a second storage unit, formatting the second storage unit so that it is not visible to the operating system of the partner and transmitting the size of the second storage unit to the other partners. The requesting partner creates a virtual drive using space on selected partner's second drives, and directs data blocks in and out of the virtual drive. A rules engine incorporating RAID algorithms governs the selection of the partners and allocation of available space.Type: ApplicationFiled: August 19, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Carl Gusler, Rick Hamilton, James Seaman, Timothy Waters
-
Publication number: 20060038682Abstract: A test fixture for evaluating an RF identification system and related methods for evaluating an RF tag and/or an RF antenna, are disclosed. The test fixture provides predefined RF tag positions that can be used to test: read position, distance and antenna capability and adjustments. By placing an actual RF tag in each of the predefined positions, a read of the tag information can be performed. A three dimensional plot can then be established for the sensitivity field of the antenna. By placing the RF tag in various positions and orientations, the antenna can be adjusted until an optimum field is produced. The invention can also be used to determine RF tag performance within the optimized field.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ray Reyes, David Schmoke, Edward Sherwood
-
Publication number: 20060039179Abstract: An integrated circuit, such as a memory macro, includes multiple power rails supporting first and second voltage differentials, with the second voltage differential being smaller than the first voltage differential. Signal lines in the integrated circuit are driven with the small voltage swing, which is generated by small swing circuits. The integrated circuit further includes regeneration circuits, which are receiving small voltage swing inputs and are outputting first, or full voltage swings. The application of the small voltage swing to the signal lines saves power in the integrated circuit. A wide bandwidth, full-wordline I/O, memory integrated circuit has simultaneously operable connection paths between essentially all the memory cells that are attached to the same wordline and the corresponding I/O terminals, and it has a single ended data-line structure.Type: ApplicationFiled: October 12, 2005Publication date: February 23, 2006Applicant: International Business machines CorporationInventors: Wing Luk, Robert Dennard, Stephen Kosonocky
-
Publication number: 20060040476Abstract: The present invention provides a method of fabricating a patterned silicon-on-insulator substrate which includes dual depth SOI regions or both SOI and non-SOI regions within the same substrate. The method of the present invention includes forming a silicon mask having at least one opening on a surface of Si-containing material, recessing the Si-containing material through the at least one opening using an etching process to provide a structure having at least one recess region and a non-recessed region, and forming a first buried insulating region in the non-recessed region and a second buried insulating region in the recessed region. In accordance with the present invention, the first buried insulating region in the non-recessed region is located above the second buried isolation region in the recessed region. A lift-off step can be employed to remove the first buried insulating region and the material that lies above to provide a substrate containing both SOI and non-SOI regions.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Devendra Sadana, Dominic Schepis, Michael Steigerwalt
-
Publication number: 20060039093Abstract: An ESD protection power clamp for suppressing ESD events. A clamping transistor having power source connections connected across the power supply terminals of an integrated circuit is connected to clamp the voltage during an ESD event. An RC timing circuit defines a time interval where ESD voltage for triggering the FET out of conduction. An inverter circuit connects the RC and timing circuit to the clamping FET. A dynamic feedback transistor is connected in series with one stage of the inverter and the power supply. During an ESD event, the feedback transistor delays the time for disabling the FET transistor, providing increased immunity against mistriggering of the clamping transistor, and forces the circuit to reset following the mistrigger event.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert Gauthier, Jr., Junjun Li
-
Publication number: 20060041788Abstract: A method, apparatus, system, and signal-bearing medium that, in an embodiment, prohibit breakpoints from being set within a protected range. In an embodiment, a protected range may be an atomic operation synchronization code range, either based on instructions generated by a compiler or based on source statements that are compiler directives. When a command, such as an add breakpoint command is received, the address of the breakpoint is compared to the protected range, and if the address is within the protected range, the breakpoint is not set. In another embodiment, if the address is within the protected range, the breakpoint is set before the start or after the end of the protected range. In this way, the problems of endless loops may be obviated.Type: ApplicationFiled: August 17, 2004Publication date: February 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Brock, Gregory Chaney, Kevin Erickson
-
Publication number: 20060041664Abstract: Computer networks are provided with a resource efficient ability to generate link performance statistics. To calculate the average link utilization per I/O operation, a first counter accumulates the number of I/O operations processed by a link and a second counter accumulates the time required by the link to complete each I/O operation. The second value is then divided by the first value. The number of operations per second for a link may be computed by dividing the first number by a predetermined period of time and the average number of operations using the link may be computed by dividing the second number by the predetermined period of time. A third counter may be employed to accumulate the number of bytes transferred by a link during each I/O operation. Then, average size of an I/O operation may be computed by dividing the third number by the first number and the average bandwidth per link operation may be computed by dividing the third number by the predetermined period of time.Type: ApplicationFiled: August 4, 2004Publication date: February 23, 2006Applicant: International Business Machines (IBM) CorporationInventors: Matthew Kalos, Michael Benhase, James Chen, Patricia Lu