Patents by Inventor Jakob C. Lang

Jakob C. Lang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160048404
    Abstract: Suspending multiple virtual machines executed simultaneously a hypervisor a data processing system, including: sending, by a control instance, a request to the hypervisor to suspend virtual machines at a given future first point in time; the hypervisor determining if its virtual machines can be suspended at the first point in time, and, if the suspending is possible, returning a suspend handle to the control instance and storing the suspend handle, otherwise returning an invalid handle; when receiving a suspend handle from the hypervisor in return to the request to suspend virtual machines, the control instance sending a suspend command to the hypervisor, wherein the respective suspend handle is provided to the corresponding hypervisor; the hypervisor determining if the received suspend handle is equal to its stored handle and, if yes, suspending its virtual machines at the first point in time.
    Type: Application
    Filed: June 11, 2015
    Publication date: February 18, 2016
    Inventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
  • Publication number: 20160021217
    Abstract: Routing communication in a data processing system. Communication is routed from a communication client having no own communication stack through a first own communication stack of a first communication bridge, and through a second own communication stack of a second communication bridge. Routing between the communication client and the first and the second communication bridges uses a communication mechanism that does not include an own communication stack. One of the first or the second communication bridges is configured to act as a master communication bridge, and the other of the second or the first communication bridges is configured to act as a slave communication bridge.
    Type: Application
    Filed: July 15, 2015
    Publication date: January 21, 2016
    Inventors: Jakob C. Lang, Andreas Maier, Angel Nunez Mencias, Rene Trumpp
  • Publication number: 20150331717
    Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.
    Type: Application
    Filed: May 14, 2014
    Publication date: November 19, 2015
    Applicant: International Business Machines Corporation
    Inventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Patent number: 9176804
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Grant
    Filed: June 27, 2013
    Date of Patent: November 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Patent number: 9176805
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: November 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Patent number: 9164846
    Abstract: In one aspect, a technique for restarting a software system on a computer platform after an unintentional software system shutdown. The technique includes, for instance, generating a core dump file on the computer platform when the software system shuts down unintentionally, restarting the software system, using a library for copying software system related data from the core dump file to the software system, and continuing execution of the software system.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: October 20, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
  • Publication number: 20150134790
    Abstract: An entitlement system includes at least two computing devices and a management controller which all include a trusted platform module. Each of the trusted platform modules include a non-volatile storage for storing entitlement records. A management unit of each computing device includes configuration means to enable and disable computing resources of the respective computing device based on entitlement records. The management controller receives ensemble entitlement records in encrypted form and distributes sub-entitlement records in a second encrypted form to the management units of the computing devices.
    Type: Application
    Filed: October 28, 2014
    Publication date: May 14, 2015
    Inventors: Christine Axnix, Jakob C. Lang
  • Patent number: 9013403
    Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: April 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer
  • Publication number: 20150088838
    Abstract: A method of securely deleting data from a data storage device is described. The method includes the steps of receiving a secure delete command to securely delete a file. A data block of the file to securely delete is identified. A pointer to the data block is stored in a deletion buffer. It is then determined whether the secure delete command has a highest priority over other data storage device commands. In response to the secure delete command having the highest priority, the secure delete command to the data block is performed.
    Type: Application
    Filed: September 25, 2013
    Publication date: March 26, 2015
    Applicant: International Business Machines Corporation
    Inventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
  • Publication number: 20150088858
    Abstract: A method of securely deleting data from a data storage device is described. The method includes the steps of receiving a secure delete command to securely delete a file. A data block of the file to securely delete is identified. A pointer to the data block is stored in a deletion buffer. It is then determined whether the secure delete command has a highest priority over other data storage device commands. In response to the secure delete command having the highest priority, the secure delete command to the data block is performed.
    Type: Application
    Filed: June 12, 2014
    Publication date: March 26, 2015
    Inventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
  • Publication number: 20150006963
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Application
    Filed: September 24, 2013
    Publication date: January 1, 2015
    Applicant: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Publication number: 20150006822
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Application
    Filed: June 27, 2013
    Publication date: January 1, 2015
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Publication number: 20140344603
    Abstract: Remotely awakening an electronic device, in which an apparatus includes a power supply to supply external power; a receiver for an electromagnetic signal; a capacitor connected to the receiver; a switching circuit connected to the capacitor; a controller, being part of the electronic device, connected to receive power from the switching circuit and to provide a keep awake signal to the switching circuit. The switching circuit to connect the controller with the capacitor when the capacitor is loaded with a predefined amount of power via the receiver, and responsive to the keep awake signal to disconnect the controller from the capacitor and to connect the controller with the power supply afterwards. The controller performs an initialization phase in response to receiving power and enables the keep awake signal after completing the initialization phase.
    Type: Application
    Filed: May 15, 2014
    Publication date: November 20, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victor Rafael Escobar Olmos, Jakob C. Lang, Tomas Libal, Angel Nunez Mencias, Fabian Romanowski, Sven Sterbling
  • Publication number: 20140282537
    Abstract: The invention relates to a method for managing virtual machine image disk usage comprising a disk image emulator for a virtual machine provided by a hypervisor, comprising the steps of providing at least a first disk image comprising a sequence of data blocks for accumulating write operations to the first disk image, providing at least a second disk image comprising a sequence of data blocks for permanently storing disk image data, and providing a disk cleaning process for transferring disk image data from the first disk image to the second disk image and deleting unused data blocks in the first and/or the second disk image.
    Type: Application
    Filed: March 6, 2014
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dirk Bolte, Marco Kraemer, Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
  • Publication number: 20140164189
    Abstract: Approving a group purchase request for a group of articles. A sub-group of articles is selected, wherein a unique article approval index is assigned to each of the articles and a highest article approval index is determined among the unique article approval indexes of the articles of the group, wherein the article of the group is selected into the sub-group if the article of the group complies with at least one of following article selection criteria: the unique article approval index of the article of the group is above a predetermined approval index threshold and the unique approval index of the article of the group is equal to the highest article approval index; approving the group purchase request for the group if the group purchase request for the sub-group is approved; and rejecting the group purchase request for the group if the group purchase request for the sub-group is rejected.
    Type: Application
    Filed: November 6, 2013
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victor Rafael Escobar Olmos, Jakob C. Lang, Tomas Libal, Angel Nunez Mencias, Fabian Romanowski, Sven Sterbling
  • Publication number: 20140149799
    Abstract: Creating an operating system dump. A main memory of a computer system is divided into at least three contiguous memory areas, comprising a primary memory area, a secondary memory area and a data memory area. A first instance of an OS (operating system) is booted into the main memory, a second instance of the operating system is loaded into the secondary memory area using the active first instance of the operating system, execution of the first active instance of the OS is stopped if a critical execution error occurs, and the computer system is re-started using the loaded second instance of the operating system which becomes the active instance of the OS. A dump of the primary memory area is created, and a third instance of the operating system is loaded into the primary memory area.
    Type: Application
    Filed: November 26, 2013
    Publication date: May 29, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Reinhard Buendgen, Michael Holzheu, Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus, Martin Schwidefsky
  • Publication number: 20140089922
    Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.
    Type: Application
    Filed: September 19, 2013
    Publication date: March 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
  • Publication number: 20130346797
    Abstract: In one aspect, a technique for restarting a software system on a computer platform after an unintentional software system shutdown. The technique includes, for instance, generating a core dump file on the computer platform when the software system shuts down unintentionally, restarting the software system, using a library for copying software system related data from the core dump file to the software system, and continuing execution of the software system.
    Type: Application
    Filed: April 30, 2013
    Publication date: December 26, 2013
    Applicant: International Business Machines Corporation
    Inventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
  • Publication number: 20120326979
    Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer