Patents by Inventor Jakob C. Lang
Jakob C. Lang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160048404Abstract: Suspending multiple virtual machines executed simultaneously a hypervisor a data processing system, including: sending, by a control instance, a request to the hypervisor to suspend virtual machines at a given future first point in time; the hypervisor determining if its virtual machines can be suspended at the first point in time, and, if the suspending is possible, returning a suspend handle to the control instance and storing the suspend handle, otherwise returning an invalid handle; when receiving a suspend handle from the hypervisor in return to the request to suspend virtual machines, the control instance sending a suspend command to the hypervisor, wherein the respective suspend handle is provided to the corresponding hypervisor; the hypervisor determining if the received suspend handle is equal to its stored handle and, if yes, suspending its virtual machines at the first point in time.Type: ApplicationFiled: June 11, 2015Publication date: February 18, 2016Inventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Publication number: 20160021217Abstract: Routing communication in a data processing system. Communication is routed from a communication client having no own communication stack through a first own communication stack of a first communication bridge, and through a second own communication stack of a second communication bridge. Routing between the communication client and the first and the second communication bridges uses a communication mechanism that does not include an own communication stack. One of the first or the second communication bridges is configured to act as a master communication bridge, and the other of the second or the first communication bridges is configured to act as a slave communication bridge.Type: ApplicationFiled: July 15, 2015Publication date: January 21, 2016Inventors: Jakob C. Lang, Andreas Maier, Angel Nunez Mencias, Rene Trumpp
-
Publication number: 20150331717Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.Type: ApplicationFiled: May 14, 2014Publication date: November 19, 2015Applicant: International Business Machines CorporationInventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Patent number: 9176804Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: GrantFiled: June 27, 2013Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Patent number: 9176805Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: GrantFiled: September 24, 2013Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Patent number: 9164846Abstract: In one aspect, a technique for restarting a software system on a computer platform after an unintentional software system shutdown. The technique includes, for instance, generating a core dump file on the computer platform when the software system shuts down unintentionally, restarting the software system, using a library for copying software system related data from the core dump file to the software system, and continuing execution of the software system.Type: GrantFiled: April 30, 2013Date of Patent: October 20, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20150134790Abstract: An entitlement system includes at least two computing devices and a management controller which all include a trusted platform module. Each of the trusted platform modules include a non-volatile storage for storing entitlement records. A management unit of each computing device includes configuration means to enable and disable computing resources of the respective computing device based on entitlement records. The management controller receives ensemble entitlement records in encrypted form and distributes sub-entitlement records in a second encrypted form to the management units of the computing devices.Type: ApplicationFiled: October 28, 2014Publication date: May 14, 2015Inventors: Christine Axnix, Jakob C. Lang
-
Patent number: 9013403Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.Type: GrantFiled: June 15, 2012Date of Patent: April 21, 2015Assignee: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer
-
Publication number: 20150088838Abstract: A method of securely deleting data from a data storage device is described. The method includes the steps of receiving a secure delete command to securely delete a file. A data block of the file to securely delete is identified. A pointer to the data block is stored in a deletion buffer. It is then determined whether the secure delete command has a highest priority over other data storage device commands. In response to the secure delete command having the highest priority, the secure delete command to the data block is performed.Type: ApplicationFiled: September 25, 2013Publication date: March 26, 2015Applicant: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Publication number: 20150088858Abstract: A method of securely deleting data from a data storage device is described. The method includes the steps of receiving a secure delete command to securely delete a file. A data block of the file to securely delete is identified. A pointer to the data block is stored in a deletion buffer. It is then determined whether the secure delete command has a highest priority over other data storage device commands. In response to the secure delete command having the highest priority, the secure delete command to the data block is performed.Type: ApplicationFiled: June 12, 2014Publication date: March 26, 2015Inventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Publication number: 20150006963Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: ApplicationFiled: September 24, 2013Publication date: January 1, 2015Applicant: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Publication number: 20150006822Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Publication number: 20140344603Abstract: Remotely awakening an electronic device, in which an apparatus includes a power supply to supply external power; a receiver for an electromagnetic signal; a capacitor connected to the receiver; a switching circuit connected to the capacitor; a controller, being part of the electronic device, connected to receive power from the switching circuit and to provide a keep awake signal to the switching circuit. The switching circuit to connect the controller with the capacitor when the capacitor is loaded with a predefined amount of power via the receiver, and responsive to the keep awake signal to disconnect the controller from the capacitor and to connect the controller with the power supply afterwards. The controller performs an initialization phase in response to receiving power and enables the keep awake signal after completing the initialization phase.Type: ApplicationFiled: May 15, 2014Publication date: November 20, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor Rafael Escobar Olmos, Jakob C. Lang, Tomas Libal, Angel Nunez Mencias, Fabian Romanowski, Sven Sterbling
-
Publication number: 20140282537Abstract: The invention relates to a method for managing virtual machine image disk usage comprising a disk image emulator for a virtual machine provided by a hypervisor, comprising the steps of providing at least a first disk image comprising a sequence of data blocks for accumulating write operations to the first disk image, providing at least a second disk image comprising a sequence of data blocks for permanently storing disk image data, and providing a disk cleaning process for transferring disk image data from the first disk image to the second disk image and deleting unused data blocks in the first and/or the second disk image.Type: ApplicationFiled: March 6, 2014Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Dirk Bolte, Marco Kraemer, Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Publication number: 20140164189Abstract: Approving a group purchase request for a group of articles. A sub-group of articles is selected, wherein a unique article approval index is assigned to each of the articles and a highest article approval index is determined among the unique article approval indexes of the articles of the group, wherein the article of the group is selected into the sub-group if the article of the group complies with at least one of following article selection criteria: the unique article approval index of the article of the group is above a predetermined approval index threshold and the unique approval index of the article of the group is equal to the highest article approval index; approving the group purchase request for the group if the group purchase request for the sub-group is approved; and rejecting the group purchase request for the group if the group purchase request for the sub-group is rejected.Type: ApplicationFiled: November 6, 2013Publication date: June 12, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor Rafael Escobar Olmos, Jakob C. Lang, Tomas Libal, Angel Nunez Mencias, Fabian Romanowski, Sven Sterbling
-
Publication number: 20140149799Abstract: Creating an operating system dump. A main memory of a computer system is divided into at least three contiguous memory areas, comprising a primary memory area, a secondary memory area and a data memory area. A first instance of an OS (operating system) is booted into the main memory, a second instance of the operating system is loaded into the secondary memory area using the active first instance of the operating system, execution of the first active instance of the OS is stopped if a critical execution error occurs, and the computer system is re-started using the loaded second instance of the operating system which becomes the active instance of the OS. A dump of the primary memory area is created, and a third instance of the operating system is loaded into the primary memory area.Type: ApplicationFiled: November 26, 2013Publication date: May 29, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard Buendgen, Michael Holzheu, Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus, Martin Schwidefsky
-
Publication number: 20140089922Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: ApplicationFiled: September 19, 2013Publication date: March 27, 2014Applicant: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20130346797Abstract: In one aspect, a technique for restarting a software system on a computer platform after an unintentional software system shutdown. The technique includes, for instance, generating a core dump file on the computer platform when the software system shuts down unintentionally, restarting the software system, using a library for copying software system related data from the core dump file to the software system, and continuing execution of the software system.Type: ApplicationFiled: April 30, 2013Publication date: December 26, 2013Applicant: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20120326979Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.Type: ApplicationFiled: June 15, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer