Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

International Business Machines Company patents


Recent patent applications related to International Business Machines Company. International Business Machines Company is listed as an Agent/Assignee. Note: International Business Machines Company may have other listings under different names/spellings. We're not affiliated with International Business Machines Company, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machines Company-related inventors


Coating metal foil with n-heterocyclic carbene compounds containing organic functionalities for improving metal-to-resin adhesion

A carbene-coated metal foil is produced by applying an n-heterocyclic carbene (nhc) compound to one or more surfaces of a metal foil (e.g., an electrodeposited copper foil having a surface that is smooth and non-oxidized). The nhc compound contains a matrix-reactive pendant group that includes at least one of a vinyl-, allyl-, acrylic-, methacrylic-, styrenic-, amine-, amide- and epoxy-containing moiety capable of reacting with a base polymer (e.g., a vinyl-containing resin such as a polyphenylene oxide/triallyl-isocyanurate (ppo/taic) composition). ... International Business Machines Company

Multi-stacked electronic device with defect-free solder connection

A method includes forming a multi-stacked electronic device having two or more electronic components, each of the electronic components includes a leadframe, the leadframes of each electronic component are physically joined together using a non-solder metal joining process to form a joint, and the joint is located outside a solder connection region.. . ... International Business Machines Company

Implementing reworkable strain relief packaging structure for electronic component interconnects

A method and structure are provided for implementing enhanced reworkable strain relief packaging for electronic component interconnects. A plurality of custom strain relief pads is provided with a component footprint wiring layout on a component carrier or a component. ... International Business Machines Company

Energy efficient location tracking on smart phones

A gps-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the gps-enabled cellular electronic device. ... International Business Machines Company

Security enabled predictive mobile data caching

An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing device, retrieving external data associated with network service availability, predicting a location the user is travelling to based on the personal user data retrieved, determining a data security risk profile associated with the location predicted, based on the personal user data and the external data retrieved, determining data to be prefetched in advance of a user request for the data, wherein the data is determined based on an analysis of the personal user data retrieved, the location predicted and the data security risk profile and prefetching the data determined in advance of the user request for the data.. . ... International Business Machines Company

Security enabled predictive mobile data caching

An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing device, retrieving external data associated with network service availability, predicting a location the user is travelling to based on the personal user data retrieved, determining a data security risk profile associated with the location predicted, based on the personal user data and the external data retrieved, determining data to be prefetched in advance of a user request for the data, wherein the data is determined based on an analysis of the personal user data retrieved, the location predicted and the data security risk profile and prefetching the data determined in advance of the user request for the data.. . ... International Business Machines Company

Dynamic video image management

Disclosed aspects relate to dynamic video image management. A set of dynamic image quality factors may be collected with respect to a dynamic video image. ... International Business Machines Company

Dynamic video image management

Disclosed aspects relate to dynamic video image management. A set of dynamic image quality factors may be collected with respect to a dynamic video image. ... International Business Machines Company

Dynamic video image management

Disclosed aspects relate to dynamic video image management. A set of dynamic image quality factors may be collected with respect to a dynamic video image. ... International Business Machines Company

Systems and methods to anonymize web browsing

A method includes sending one or more messages, from a computing device to a server, to cause the server to establish a connection with the computing device, to cause the server to identify a first set of anonymization characteristics, and to cause the server to instantiate a first instance of an access application within a first cloud container using the first set of anonymization characteristics. The method also includes receiving, by the computing device, second data from the server via the connection. ... International Business Machines Company

Dynamic distribution of persistent data

A dynamic data distribution system allows publication of data values for hierarchical keys (paths) and subscriptions to key (path) patterns which include wildcard characters. Permission to publish or subscribe is controlled by an access control list associated with each key. ... International Business Machines Company

Systems and methods to anonymize web browsing

A method includes, in response to a request from a computing device, establishing a connection between a server and the computing device. The method additionally includes identifying a first set of anonymization characteristics for a first instance of an access application. ... International Business Machines Company

Load-balancing input/output requests in clustered storage systems

A computer-implemented method for load-balancing client input/output (i/o) requests in a clustered storage system may include receiving a request by a first node of a clustered storage system from a client to initiate a session between the client and the first node. The request may specify a multi-channel communication session. ... International Business Machines Company

Self-recoverable multitenant distributed clustered systems

A mechanism is provided for automatically recovering one or more distributed cluster nodes on a host system. Responsive to the host system recovering, restoring, or restarting, a set of distributed clustered systems affected due to the reboot of the host system and details associated with each of the set of distributed clustered systems are identified. ... International Business Machines Company

06/14/18 / #20180167447

Self-recoverable multitenant distributed clustered systems

A mechanism is provided tor automatically recovering one or more distributed cluster nodes on a host system. Responsive to the host system recovering, restoring, or restarting, a set of distributed clustered systems affected due to the reboot of the host system and details associated with each of the set of distributed clustered systems are identified. ... International Business Machines Company

06/14/18 / #20180167411

Protecting against notification based phishing attacks

A method, system and computer program product are disclosed for protecting against notification based phishing attacks on a computing device. In an embodiment, the method comprises when the computing device receives a notification, identifying a pattern for the notification and identifying an application that triggered the notification; determining if the identified pattern matches any of a defined group of pre-specified patterns, each of the pre-specified patterns being associated with a specified application; when the identified pattern matches one of the pre-specified patterns, determining if the specified application associated with the matched pattern is the same as the application that triggered the notification; and when the specified application associated with the matched pattern is not the same as the application that triggered the notification, generating a message to alert a user of the computing device that the received notification may be a phishing attack.. ... International Business Machines Company

06/14/18 / #20180167408

Method and system to prevent ultrasound data leaks in mobile devices

A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an operating system on a mobile computing device, and includes: an app flow analysis system that generates and maintains runtime flow graphs for apps running on the mobile device and analyzes the runtime flow graphs to identify a set of apps having confidential data flow application programming interfaces (apis) in their execution paths; a detector that further evaluates the set of apps having confidential data flow apis to identify a subset of vulnerable apps also having ultrasound emitting apis; and a runtime correlation system that flags a vulnerable app as a potential data leak when a call to an ultrasound emitting api is detected from the vulnerable app. ... International Business Machines Company

06/14/18 / #20180167388

Distributed storage of authentication data

A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted enrollment template comprises an encrypted mathematical representation of historical biometric data of the user, and wherein the biometric sample comprises a current snapshot of the biometric data. The biometric server decrypts the encrypted enrollment template to an enrollment template using an enrollment template key. ... International Business Machines Company

06/14/18 / #20180167385

Method and apparatus to identify and authorize caller via ultrasound

A system for authenticating an identity of an end-user on an electronic device associated with a subscriber is provided. The system includes: a processor in communication with a server, the processor being configured to perform a method including: storing, at the server, a signal database registered to a client end-user, the processor being configured to retrieve, from the signal database, an ultrasound signature associated with the client end-user; establishing an active communication with the end-user on the electronic device to initiate an end-user voice call; identifying, using the end-user voice call, an ultrasound signature associated with the end-user; and dynamically verifying the ultrasound signature associated with the end-user with the ultrasound signature of the client-end user to validate the end-user voice call, while maintaining the active communication with the end-user.. ... International Business Machines Company

06/14/18 / #20180167358

Generating and managing names of instances

A method includes provisioning, by a cloud provisioning server, a first instance based on a template. The template belongs to a tenant, and the first instance includes one of an instantiated software and an instantiated computing service. ... International Business Machines Company

06/14/18 / #20180167310

Data flow configuration in hybrid system of silicon and micro-electro-mechanical-switch (mems) elements

Certain embodiments of the present disclosure provide a method for communicating data flows. The method generally includes receiving control flow information corresponding to a data flow for communication from a first device to a second device, and determining one or more characteristics of the data flow based on the control flow information. ... International Business Machines Company

06/14/18 / #20180167292

Rerouting data of a streaming application

A streams manager monitors performance of a streaming application and determines if operators are underperforming according to a threshold. When the performance needs to be improved, the streams manager automatically modifies the flow graph to offload or reroute a stream of data, or part of a stream of data, to a similar operator to more efficiently utilize streaming resources. ... International Business Machines Company

06/14/18 / #20180167291

Visualization of analysis results of contents

A method, system and computer program product for visualizing analysis results of contents. Contents collected from various kinds of communication tools are read into memory. ... International Business Machines Company

06/14/18 / #20180167290

Visualization of analysis results of contents

A method, system and computer program product for visualizing analysis results of contents. Contents collected from various kinds of communication tools are read into memory. ... International Business Machines Company

06/14/18 / #20180167284

Discovery of a set of nodes in a network

Methods and systems for discovery of a set of nodes in a network. The method comprises selecting a node amongst nodes in a group of nodes to be processed; and instructing to implement a discovery procedure for the selected node. ... International Business Machines Company

06/14/18 / #20180167273

Determining identities for executing cloud processing and approvers of the executing

A method includes configuring, by a cloud provisioning server, a first user identity to execute a provisioning to provision an instance. The instance to be provisioned includes one of an instantiated software resource and a computing service. ... International Business Machines Company

06/14/18 / #20180167270

Configuring and naming of cloud provisioning entities

A method includes configuring, by a cloud provisioning server, a first cloud domain. The first cloud domain and a second cloud domain use at least one of the same operating system and the same system resource pool. ... International Business Machines Company

06/14/18 / #20180167267

Performing actions that have been defined for provisioned instances

A method includes provisioning, by a cloud provisioning server, an instance of a software resource or service for an end user. The provisioning is based on a template for the software resource or service. ... International Business Machines Company

06/14/18 / #20180167217

Container-based operating system and method

In a distributed network hosting a shared pool of configurable computing resources there is provided one or more system instances of a blockchain. Each system instance comprises a virtual machine and a set of containers. ... International Business Machines Company

06/14/18 / #20180166631

Small molecule acceptors derived from renewable furan source

Embodiments described herein provide a precursor for synthesizing a number of molecules for use in organic photovoltaics. The precursor is diiodo-furopyran (dfp), such as dibromo-dfp (dbdfp), to be used to synthesize a number of different molecules for use in organic photovoltaics. ... International Business Machines Company

06/14/18 / #20180166586

Monolithically integrated thin-film device with a solar cell, an integrated battery, and a controller

A thin-film monolithically integrated solar module with a solar cell, an integrated energy storage device, and a controller may be provided. It may comprise a thin-film solar cell, having at least one solar diode, on a transparent substrate, a thin-film energy storage device, and an electronic controller comprising at least one thin-film transistor above the thin-film energy storage device. ... International Business Machines Company

06/14/18 / #20180166577

Gate-all-around fin device

A gate-all around fin double diffused metal oxide semiconductor (dmos) devices and methods of manufacture are disclosed. The method includes forming a plurality of fin structures from a substrate. ... International Business Machines Company

06/14/18 / #20180166563

Lateral bipolar junction transistor with controlled junction

A method of forming a lateral bipolar junction transistor (lbjt) that includes providing a germanium containing layer on a crystalline oxide layer, and patterning the germanium containing layer stopping on the crystalline oxide layer to form a base region. The method may further include forming emitter and collector extension regions on opposing sides of the base region using ion implantation, and epitaxially forming an emitter region and collector region on the crystalline oxide layer into contact with the emitter and collector extension regions. ... International Business Machines Company

06/14/18 / #20180166561

Contact structure and extension formation for iii-v nfet

Finfet devices including iii-v fin structures and silicon-based source/drain regions are formed on a semiconductor substrate. Silicon is diffused into the iii-v fin structures to form n-type junctions. ... International Business Machines Company

06/14/18 / #20180166456

Integration of floating gate memory and logic device in replacement gate flow

After forming a first sacrificial gate stack over a portion of a first semiconductor fin located in a logic device region of a substrate, and a second sacrificial gate stack over a portion of a second semiconductor fin located in a memory device region of the substrate, in which each of the first sacrificial gate stack and the second sacrificial gate stack includes, from bottom to top, a tunneling oxide portion, a floating gate electrode, a control oxide portion, a gate conductor and a gate cap, an entirety of the first sacrificial gate stack is removed to provide a first gate cavity, and only the gate cap and the gate conductor are removed from the second sacrificial gate stack to provide a second gate cavity. Next, a high-k gate dielectric and a gate electrode are formed within each of the first gate cavity and the second gate cavity.. ... International Business Machines Company

06/14/18 / #20180166398

Core-shell particles for anti-tampering applications

Devices and methods for resisting or preventing physical tampering of electronic components are described. A tamper resistant apparatus comprises a tampering sensor having a surface at which a first and second conductive portion are disposed. ... International Business Machines Company

06/14/18 / #20180166336

Self-aligned contact cap

A method for forming a semiconductor device includes recessing a gate conductor in a gate structure to form a first divot, forming a gate cap in the first divot and recessing a dielectric fill that encapsulates the gate structures to a position below a top of the gate cap. An extension layer is deposited over the dielectric fill and the top of the gate cap and is planarized to the top of the gate cap. ... International Business Machines Company

06/14/18 / #20180166278

Resist having tuned interface hardmask layer for euv exposure

A method is disclosed to prepare a substrate for photolithography. The method includes forming an underlayer over a surface of the substrate; depositing an interface hardmask layer on the underlayer using one of a vapor phase deposition process or an atomic layer deposition process; and forming a layer of extreme uv (euv) resist on the interface hardmask layer, where the interface hardmask layer is comprised of material having a composition and properties tuned to achieve a certain secondary electron yield from the interface hardmask layer. ... International Business Machines Company

06/14/18 / #20180166277

Resist having tuned interface hardmask layer for euv exposure

A method is disclosed to prepare a substrate for photolithography. The method includes forming an underlayer over a surface of the substrate; depositing an interface hardmask layer on the underlayer using one of a vapor phase deposition process or an atomic layer deposition process; and forming a layer of extreme uv (euv) resist on the interface hardmask layer, where the interface hardmask layer is comprised of material having a composition and properties tuned to achieve a certain secondary electron yield from the interface hardmask layer. ... International Business Machines Company

06/14/18 / #20180166098

Magnetic recording module having differing tunnel valve sensors

An apparatus according to one embodiment includes a module having an array of first read transducers each having a tunnel valve structure and a second read transducer coupled to the array of first read transducers, the second read transducer having a tunnel valve structure. The apparatus also includes a controller, and a cable coupling the read transducers to the controller, thereby forming a plurality of circuits extending from the controller, each circuit corresponding to one of the transducers. ... International Business Machines Company

06/14/18 / #20180166096

Magnetic recording module having tunnel valve sensors with dissimilar tunnel barrier resistivities

An apparatus according to one embodiment includes a first read transducer having a tunnel valve structure, and a second read transducer coupled to the first read transducer. The second read transducer has a tunnel valve structure as well, but the tunnel valve structure of the first read transducer has a different resistivity than the tunnel valve structure of the second read transducer. ... International Business Machines Company

06/14/18 / #20180166067

Using recurrent neural network for partitioning of audio data into segments that each correspond to a speech feature cluster identifier

Audio features, such as perceptual linear prediction (plp) features and time derivatives thereof, are extracted from frames of training audio data including speech by multiple speakers, and silence, such as by using linear discriminant analysis (lda). The frames are clustered into k-means clusters using distance measures, such as mahalanobis distance measures, of means and variances of the extracted audio features of the frames. ... International Business Machines Company

06/14/18 / #20180166066

Using long short-term memory recurrent neural network for speaker diarization segmentation

Speaker diarization is performed on audio data including speech by a first speaker, speech by a second speaker, and silence. The speaker diarization includes segmenting the audio data using a long short-term memory (lstm) recurrent neural network (rnn) to identify change points of the audio data that divide the audio data into segments. ... International Business Machines Company

06/14/18 / #20180165969

Method for prioritizing and transmitting data generated from an airplane during flight

A method, system, and computer product for transmitting data generated from an airplane includes collecting a plurality of flight data generated from the airplane, analyzing the plurality of flight data, generating a feedback signal based on an analyzed result on the plurality of flight data, selecting a first group of flight data from the plurality of flight data based on the feedback signal, changing a respective data resolution of each of the first group of flight data based on the feedback signal, providing each of the first group of flight data with the changed data resolution to a transmitting device, and transmitting, using the transmitting device, the first group of flight data with the changed data resolution.. . ... International Business Machines Company

06/14/18 / #20180165922

Alert processing

Controlling transmission of an alert to a user of a device providing audio. An event which is identified as an alert is detected, and it is determined that the alert is a notifiable alert. ... International Business Machines Company

06/14/18 / #20180165847

Interface for data analysis

A method, system and computer program product for generating instances of dashboards, each dashboard instance including a set of visualizations of analytical data, relating to a collection of data. User interaction data representative of a user's actions undertaken during data exploration of the collection of data is obtained. ... International Business Machines Company

06/14/18 / #20180165843

Interface for data analysis

A method, system and computer program product for generating instances of dashboards, each dashboard instance including a set of visualizations of analytical data, relating to a collection of data. User interaction data representative of a user's actions undertaken during data exploration of the collection of data is obtained. ... International Business Machines Company

06/14/18 / #20180165835

Tampering detection for digital images

A computing system for tampering detection for digital images is disclosed. The computing system uses a lti filter to filter time series data representing images in one or both of two videos and/or a still image of a live photo captured by a camera. ... International Business Machines Company

06/14/18 / #20180165724

Method and system for contextual business intelligence report generation and display

A method, system and computer program for generating a business intelligence report, comprising the steps of providing a user-operated device, whereby a user selects at least one keyword from an electronic document displayed on the user-operated device. The user then defines a contextual relationship between the keyword(s) and a business intelligence issue by way of annotations input by the user into the user-operated device. ... International Business Machines Company

06/14/18 / #20180165652

Assisting user in managing a calendar application

A method, system and computer program product for managing a calendar application. A need to optimize a calendar is identified. ... International Business Machines Company

06/14/18 / #20180165600

Dynamic message categorization for optimized message targeting

An automated dynamic message categorization system is provided and includes first, second and third processing units. The first processing unit is configured to generate a user interface (ui) and to present the ui to a user. ... International Business Machines Company

06/14/18 / #20180165580

Performance of time intensive question processing in a cognitive system

Mechanisms are provided for performing watched question processing. The mechanisms detect a change in content of electronic documents in a corpus of electronic documents, and retrieve a watched question from a watched question database. ... International Business Machines Company

06/14/18 / #20180165550

Signal classification using sparse representation

A system, method and computer program product is provided. An input signal for classification and a set of pre-classified signals are received, each comprising a vector representation of an object having a plurality of vector elements. ... International Business Machines Company

06/14/18 / #20180165549

Signal classification using sparse representation

A system, method and computer program product is provided. An input signal for classification and a set of pre-classified signals are received, each comprising a vector representation of an object having a plurality of vector elements. ... International Business Machines Company

06/14/18 / #20180165476

Interlocked blockchains to increase blockchain security

Systems and methods for preventing vulnerabilities in a blockchain due to quiescence are disclosed including submitting a first crosslink transaction for addition to a first blockchain that includes cross-referencing information for a second crosslink transaction that corresponds to the first crosslink transaction and submitting the second crosslink transaction for addition to a second blockchain that includes cross-referencing information corresponding to the first crosslink transaction. The first and second crosslink transactions are configured to be usable together by a user of at least one of the first and second blockchains to validate at least a portion of one of the first and second blockchains after a period of quiescence in the one of the first and second blockchains.. ... International Business Machines Company

06/14/18 / #20180165469

Access operation request management

Disclosed aspects relate to access operation management to a database management system (dbms) on a shared pool of configurable computing resources having a set of members. A map of the set of table names to the set of members may be established. ... International Business Machines Company

06/14/18 / #20180165457

Ranking security scans based on vulnerability information from third party resources

A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. ... International Business Machines Company

06/14/18 / #20180165445

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. ... International Business Machines Company

06/14/18 / #20180165444

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. ... International Business Machines Company

06/14/18 / #20180165419

Biometric disease growth prediction

Embodiments include methods, systems and computer program products for patterning and predicting the growth of infectious diseases through analysis of portable objects. Aspects include receiving biometric data from a plurality of nodes. ... International Business Machines Company

06/14/18 / #20180165415

Method and system for automatic knowledge-based feature extraction from electronic medical records

A method, device, and computer program storage product for generating a query to extract clinical features into a set of electronic medical record (emr) tables based on clinical knowledge. A knowledge tree is constructed according to a set of clinical knowledge data. ... International Business Machines Company

06/14/18 / #20180165405

Timing based net constraints tagging with zero wire load validation

A method is provided for facilitating an integrated circuit design layout. The method includes receiving a netlist including a plurality of subnets. ... International Business Machines Company

06/14/18 / #20180165392

Simulation employing level-dependent multitype events

In a data processing system, a processor creating level qualifying logic within instrumentation of a hardware description language (hdl) simulation model of a design. The level qualifying logic is configured to generate a first event of a first type for a first simulation level and to generate a second event of second type for a second simulation level. ... International Business Machines Company

06/14/18 / #20180165385

Constructing and enhancing a deployment pattern

An approach is provided for optimizing a deployment pattern. Event and configuration data of precedent systems is aggregated. ... International Business Machines Company

06/14/18 / #20180165377

System, method and computer program product for data transfer management

According to one aspect of the present disclosure a method and technique for managing data transfer includes receiving and storing a plurality of different data patterns anticipated to be encountered by a processor unit of a data processing system corresponding to a particular application being processed. Responsive to receiving a read request for data, the requested data is read from a memory subsystem, and the read data is compared by the memory subsystem to the stored data patterns. ... International Business Machines Company

06/14/18 / #20180165357

Dynamic message categorization for optimized message targeting

An automated dynamic message categorization system is provided and includes first, second and third processing units. The first processing unit is configured to generate a user interface (ui) and to present the ui to a user. ... International Business Machines Company

06/14/18 / #20180165356

Storage efficiency

A method, a processing device, and a computer program product are provided. At least two data elements common between multiple documents are combined into a combined group. ... International Business Machines Company

06/14/18 / #20180165355

Log-aided automatic query expansion approach based on topic modeling

A base query having a plurality of base query terms is obtained. A plurality of problem log files are accessed. ... International Business Machines Company

06/14/18 / #20180165347

Multi-dimensional analysis using named filters

Computer-implemented, multi-dimensional analysis can include storing, in a memory and using a processor, a named filter dimension as part of a multi-dimensional data model for a database. The named filter dimension includes a plurality of named filters with each named filter having an expression specifying a subset of original data of the database. ... International Business Machines Company

06/14/18 / #20180165346

Multi-dimensional analysis using named filters

Computer-implemented, multi-dimensional analysis can include storing, in a memory and using a processor, a named filter dimension as part of a multi-dimensional data model for a database. The named filter dimension includes a plurality of named filters with each named filter having an expression specifying a subset of original data of the database. ... International Business Machines Company

06/14/18 / #20180165328

Apply corrections to an ingested corpus

An approach is provided to correct documents ingested by a question answering (qa) system. A document previously ingested by the qa system is selected. ... International Business Machines Company

06/14/18 / #20180165325

Verifying data structure consistency across computing environments

According to one aspect of the present disclosure, a method and technique for verifying data structure consistency across computing environments includes computing a first signature for a data structure of an application subject to checkpointing corresponding to a first computing environment residing on a server computer. A second signature for the data structure of the application corresponding to a second computing environment residing on a client computer is computed. ... International Business Machines Company

06/14/18 / #20180165322

Fixing anomalies in a preserved data structure used to generate a temporary data structure during system initialization

Provided are a computer program product, system, and method for fixing anomalies in a preserved data structure used to generate a temporary data structure during system initialization. A preserved data structure in persistent storage is used to build a temporary data structure in a memory of the computing system during initialization of the computing system. ... International Business Machines Company

06/14/18 / #20180165319

Atomically moving data elements between or within linked data structures having no support for atomic moves

A technique for atomically moving a linked data element may include providing an atomic-move wrapper around the data element, along with an existence header whose status may be permanent, outgoing or incoming to indicate whether the data element is not in transition, or if in transition is either outgoing or incoming. The existence header may reference an existence group having a state field that changes state using a single store operation. ... International Business Machines Company

06/14/18 / #20180165307

Executing queries referencing data stored in a unified data layer

A mechanism is provided in a data processing system for executing queries referencing data stored in a unified data layer. A relational engine executing on the data processing system receives a structured query language (sql) query from a client. ... International Business Machines Company

06/14/18 / #20180165306

Executing queries referencing data stored in a unified data layer

A mechanism is provided in a data processing system for executing queries referencing data stored in a unified data layer. A relational engine executing on the data processing system receives a structured query language (sql) query from a client. ... International Business Machines Company

06/14/18 / #20180165296

Avoiding redundant presentation of content

A first application executing on a client device can access content and present the content to a user. An operating system of the client device can store into a database metadata identifying at least the content. ... International Business Machines Company

06/14/18 / #20180165292

Identifying partial update for tape file system

A request to open a file from a plurality of files in a storage is received from an application. The storage is made up of an index partition, containing recordings of file system indexes, and a data partition, containing recordings of the indexes and the file system data body. ... International Business Machines Company

06/14/18 / #20180165282

Worm data falsification detection

A computer determines the file system that contains a first partition, a second partition and a third partition. The first partition contains metadata comprising metadata associated with a worm-specified file, and metadata associated with a rewritable file. ... International Business Machines Company

06/14/18 / #20180165277

Dynamic translation of idioms

Dynamic translation of idioms is performed with respect to electronic communications. An idiom search application is activated which identifies an idiom within a phrase and searches a corpus for a translation of the idiom and one or more associated characteristics. ... International Business Machines Company

06/14/18 / #20180165275

Identification and translation of idioms

Identification and translation of idioms is performed with respect to electronic communications. Confusion with an expression is determined. ... International Business Machines Company

06/14/18 / #20180165274

Identification and processing of idioms in an electronic environment

Identification and processing of idioms is performed with respect to electronic communications. An expression is detected in connection with a potential idiom and a confidence level is assigned to the potential idiom. ... International Business Machines Company

06/14/18 / #20180165271

Optimization of sentence boundary placement

Natural language processing of raw text data for optimal sentence boundary placement. Raw text is extracted from a document and subject to cleaning. ... International Business Machines Company

06/14/18 / #20180165270

Preprocessing of string inputs in natural language processing

Natural language processing of raw text data for optimal sentence boundary placement. Raw text is extracted from a document and subject to cleaning. ... International Business Machines Company

06/14/18 / #20180165268

Determining a reading speed based on user behavior

Examples of techniques for determining a reading speed based on user behavior are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include monitoring, by a processing device, data continuously, wherein the data is generated by a sensor of the user device; determining, by the processing device, an orientation and a wobble of the user device based on the data generated by the sensor; determining, by the processing device, a reading speed of a user using the user device based on the orientation and the wobble; detecting, by the processing device, a change in at least one of the orientation and the wobble of the user device based on the data; and adjusting, by the processing device, the reading speed of the user using the user device based on the change in the at least one of the orientation and the wobble.. ... International Business Machines Company

06/14/18 / #20180165265

Indicating property inheritance in object hierarchies

A method for indicating property inheritance in object hierarchies is disclosed. In one embodiment, such a method includes enabling a user to select an object in an object hierarchy. ... International Business Machines Company

06/14/18 / #20180165239

Optimizing routing of a signal path in a semiconductor device

Methods are provided for optimizing a routing of a signal path in terms of delay and signal integrity in a semiconductor device. The signal path includes at least one track in a metal layer. ... International Business Machines Company

06/14/18 / #20180165233

Network controller - sideband interface port controller

A network interface controller includes a media access controller and a host adapter. The host adapter includes a transmit route connected to receive an in-band packet from a host and further connected to transmit the in-band packet to the media access controller. ... International Business Machines Company

06/14/18 / #20180165220

Expiring virtual content from a cache in a virtual universe

Approaches for expiring cached virtual content in a virtual universe are provided. In one approach, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe, an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe, the behavior indicating a likely future location of the avatar, and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe, wherein the cached virtual content associated with the avatar in the future location is maintained in the cache longer than cached virtual content associated with the avatar in another region of the virtual universe.. ... International Business Machines Company

06/14/18 / #20180165195

Reducing defragmentation in a multi-grained writeback cache

In one embodiment, a computer-implemented method includes selecting a cache block descriptor (cbd) from amongst a plurality of cbds stored to a cache storage device to defragment based on a determination of utilization of a particular fine block descriptor (fbd) having a first size that is allocated to the selected cbd. The cache storage device includes a free pool of fbds having various sizes that is available for use in the plurality of cbds. ... International Business Machines Company

06/14/18 / #20180165175

Common debug scripting framework for driving hybrid applications consisting of compiled languages and interpreted languages

Aspects of the present invention include a method which includes a processor providing a debug extension library; providing a common debug interface and at least two common debug interface implementations, a first one of the common debug interface implementations being dedicated to a native debugger of an interpreted language computer program, a second one of the common debug interface implementations being dedicated to a native debugger of a compiled language computer program, wherein an application contains a first portion written in an interpreted programming language and a second portion written in a compiled programming language; and responding to a user command provided through a debug script program to debug the application by commanding one of the native debugger of an interpreted language computer program or the native debugger of a compiled language computer program through the corresponding dedicated common debug interface implementation.. . ... International Business Machines Company

06/14/18 / #20180165169

Data storage system employing a hot spare to proactively store array data in absence of a failure or pre-failure event

A data storage system includes a controller, a hot spare storage device and a plurality of primary storage devices. The controller utilizes the hot spare storage device to mirror only a subset of each stripe of logical pages written across the data storage array, where the subset includes a logical page determined by a write input/output operation (iop) policy. ... International Business Machines Company

06/14/18 / #20180165162

Restore point calendar

A method for presenting options associated with restoring data is disclosed. In one embodiment, such a method includes providing a calendar, such as a monthly calendar, showing multiple days. ... International Business Machines Company

06/14/18 / #20180165137

Integrating heterogeneous business events in hybrid cloud environments

Systems, methods, and computer program products to perform an operation comprising receiving a request from a first application to receive business events from a second application, deploying a first connector selected according to a set of parameters specified in the request, receiving, by the first connector from the second application, a first unit of event data of a first format, and converting the first unit of event data to a second format specified in the request.. . ... International Business Machines Company

06/14/18 / #20180165128

Detecting application instances that are operating improperly

A method includes determining whether an application instance has properly used computing resources to process a workload request. The determination is based on one or more characteristics of the workload request to be processed. ... International Business Machines Company

06/14/18 / #20180165126

Enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping rcu grace periods finite

A technique for enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping read-copy update (rcu) grace periods finite. In an embodiment, a per-cpu indicator may be set to indicate that a cpu running the cpu-bound in-kernel workload has not reported an rcu quiescent state within a defined time. ... International Business Machines Company

06/14/18 / #20180165125

Enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping rcu grace periods finite

A technique for enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping read-copy update (rcu) grace periods finite. In an embodiment, a per-cpu indicator may be set to indicate that a cpu running the cpu-bound in-kernel workload has not reported an rcu quiescent state within a defined time. ... International Business Machines Company

06/14/18 / #20180165119

Application execution environment

An application is executed within an application execution environment. One or more service requests made by the executing application are monitored, and a service requesting profile is created for the application. ... International Business Machines Company

06/14/18 / #20180165111

Predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives

Embodiments include a technique for predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives is provided. Techniques include calculating a capacity requirement for each virtual server based on an administrator defined performance objective for each virtual server. ... International Business Machines Company

06/14/18 / #20180165109

Predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives

Embodiments include a technique for predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives is provided. Techniques include calculating a capacity requirement for each virtual server based on an administrator defined performance objective for each virtual server. ... International Business Machines Company

06/14/18 / #20180165104

Executing instructions to store context information based on routine to be executed

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165103

Marking external sibling caller routines

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165102

Marking external sibling caller routines

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165095

Pointer associated branch line jumps for accelerated line jumps

A method includes a processor providing at least one line entry address tag in each line of a branch predictor; indexing into the branch predictor with a current line address to predict a taken branch's target address and a next line address; re-indexing into the branch predictor with one of a predicted next line address or a sequential next line address when the at least one line entry address tag does not match the current line address; using branch prediction content compared against a search address to predict a direction and targets of branches and determining when a new line address is generated; and re-indexing into the branch predictor with a corrected next line address when it is determined that one of the predicted next line address or the sequential next line address differs from the new line address.. . ... International Business Machines Company

06/14/18 / #20180165094

Branch predictor search qualification using stream length prediction

A computer-implemented method includes determining, by a stream-based index accelerator predictor of a processor, a predicted stream length between an instruction address and a taken branch ending an instruction stream. A first-level branch predictor of a hierarchical asynchronous lookahead branch predictor of the processor is searched for a branch prediction in one or more entries in a search range bounded by the instruction address and the predicted stream length. ... International Business Machines Company

06/14/18 / #20180165091

Marking sibling caller routines

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165082

Concurrent i/o enclosure firmware/field-programmable gate array (fpga) update in a multi-node environment

Provided are techniques for concurrent input/output (i/o) enclosure firmware/field-programmable gate array (fpga) update in a multi-node environment. First notifications are sent to each i/o enclosure management engine on each of a plurality of server nodes that code activation for a first set of i/o enclosures is starting. ... International Business Machines Company

06/14/18 / #20180165076

Context information based on type of routine being called

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165075

Call sequence generation based on type of routine

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165074

Suppressing storing of context information

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165073

Context information based on type of routine being called

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Company

06/14/18 / #20180165063

Overflow detection for sign-magnitude adders

A circuit is provided which includes arithmetic computation logic configured to add or subtract operands of variable length to produce a result in a sign-magnitude data format. The circuit also includes an overflow detector to provide an overflow signal indicative of whether the result fits within a specified result length l. ... International Business Machines Company

06/14/18 / #20180165038

Techniques for storage command processing

A technique for handling storage commands includes receiving, by an interface node of a data storage system, a first storage command. The interface node determines whether the first storage command is a head of queue (hoq) command. ... International Business Machines Company

06/14/18 / #20180165033

Identification of volumes for thin provisioning

One embodiment provides a method, including: generating, for each of a plurality of storage volumes, an actual used storage capacity model and identifying a potential storage capacity savings using the actual used capacity model, wherein each of the plurality of storage volumes has been identified as a candidate for migration to a thin provisioned volume; generating, for each of the plurality of storage volumes, an input/output profile model and identifying a potential change in performance of an application accessing the storage volume using the input/output profile model; generating, for each of the plurality of storage volumes, a growth profile and identifying a potential change in capacity using the growth profile; and determining, using an optimization algorithm, a subset of the plurality of storage volumes to be migrated to thin provisioned volumes based upon the volume capacity model, the performance model, and the volume growth profile.. . ... International Business Machines Company

06/14/18 / #20180165030

Dynamic management of memory allocation in a database

A method for managing memory allocation in a database receives an invocation of a stored statement defined to allocate objects, each with a stored size. The method determines an actual size relating to the invocation and determines a preferred statement among defined statements with defined object sizes. ... International Business Machines Company

06/14/18 / #20180165027

Copy-redirect on write

A system, method, and computer program product for managing storage volumes in a point-in-time copy cascade. A processor swaps a host portion of a source volume with a host portion of a snapshot point-in-time copy volume. ... International Business Machines Company

06/14/18 / #20180165022

Health-aware garbage collection in a memory system

A data storage system includes a controller that controls a non-volatile memory array including a plurality of garbage collection units of physical memory. For each of the plurality of garbage collections units storing valid data, the controller determines an invalidation metric and a health-based adjustment of the invalidation metric. ... International Business Machines Company

06/14/18 / #20180165021

Adaptive health grading for a non-volatile memory

A data storage system includes a controller that controls a non-volatile memory array including a plurality of blocks. The controller assigns blocks to a plurality of different health grades. ... International Business Machines Company

06/14/18 / #20180165019

Optimized reading of multiple objects from tape

A method for restoring multiple objects from tape is disclosed. In one embodiment, such a method (1) generates a list of objects to be restored from tape and (2) identifies a starting location of a first object on the tape. ... International Business Machines Company

06/14/18 / #20180165017

Reduced data access time on tape with data redundancy

A computer-implemented method, according to one embodiment, includes: selecting a first tape to write a first copy of a first portion of data to, sending an instruction to write the first copy of the first portion of data to a first partition on the first tape, wherein the first tape has at least the first partition and a second partition, selecting a second tape that is different than the first tape to write a second copy of the first portion of data to, and sending an instruction to write the second copy of the first portion of data to a second partition on the second tape, wherein the second tape has at least a first partition and the second partition. The first partition on each of the first and second tapes is closer to a beginning of the respective tape than the second partition on the respective tape.. ... International Business Machines Company

06/14/18 / #20180165008

Memory transaction prioritization

Examples of techniques for memory transaction prioritization for a memory are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: the method may further include: allocating, by a memory controller, a reserved portion of the memory controller to process prioritized transactions; receiving, by the memory controller, a request transaction from a processor to the memory, wherein the request transaction comprises a priority; determining, by the memory controller, whether the priority of the request transaction is above a priority threshold; and responsive to determining that the priority of the request transaction is above the priority threshold, executing the request using the reserved portion of the memory controller.. ... International Business Machines Company

06/14/18 / #20180165007

Touchscreen keyboard

Operating a touch-screen device includes displaying at least a portion of a keyboard on a touch-screen, detecting a touch on the touch-screen, and detecting movement of the touch on the touch-screen. Operating the touch-screen device also includes moving the displayed keyboard in response to the detected movement of the touch on the touch-screen, detecting a release of the touch from the touch-screen, and assigning a character according to a final location of the touch relative to a location of the displayed keyboard.. ... International Business Machines Company

06/14/18 / #20180165000

Alternate video summarization

A method and system for improving video summary visualization is provided. The method includes detecting via a touch screen display of a hardware device, user contact with a specified portion of a progress bar of a video file being presented via the touch screen display. ... International Business Machines Company

06/14/18 / #20180164982

Method and system for generating a holographic image having simulated physical properties

A method, system and program for producing an interactive three-dimensional holographic image, including the steps of generating, by one or more processors of a computer system, a virtual object and assigning physical properties to the virtual object using metadata. Signals are received from a virtual tool to determine a position of the virtual tool. ... International Business Machines Company

06/14/18 / #20180164968

Providing user interface language options

User interface (ui) language options are provided. A request event of a visible text string for a ui element is identified. ... International Business Machines Company

06/14/18 / #20180164966

Providing user interface language options

User interface (ui) language options are provided. A request event of a visible text string for a ui element is identified. ... International Business Machines Company

06/14/18 / #20180164860

Enhanced cooling design for computing device

Enhanced cooling for electronic components within a computing device is provided. Blowers are preferably leveraged as air movers, and an airflow deflection surface (preferably configured as a ramp) is disposed within a plenum to guide airflow under an electronic component (such as a hard disk drive or solid state drive), the electronic component being placed in an inverted alignment whereby a surface having a higher heat transfer rate is facing down (toward the blower), and then into an intake of the blower. ... International Business Machines Company

06/14/18 / #20180164425

Determination of a change in atmospheric pressure based on radio frequency return signal

Apparatus and methods to determine a change in atmospheric pressure between a forward portion of a flying object and a rear portion of the flying object based on at least one radio frequency (rf) return signal, and to determine a password using the determined change in atmospheric pressure.. . ... International Business Machines Company

06/14/18 / #20180164181

Detecting structural integrity of a structural component

Each of a plurality electronic circuit devices fixed to a structural component of a physical structure can be scanned a first time, using a radio frequency (rf) scanner to receive, from each of the plurality of electronic circuit devices, first data indicating a first measured electrical impedance of a respective conductor connected to the electronic circuit device and an identifier assigned to the electronic circuit device. For each of the plurality of electronic circuit devices, the first data indicating the first measured electrical impedance and the identifier assigned to the electronic circuit device can be stored to a first memory. ... International Business Machines Company

06/14/18 / #20180164048

Pin fin compliant heat sink with enhanced flexibility

Methods of using heat sinks include placing a pin fin compliant heat sink on a non-flat surface. The pin fin complaint heat sink has top and bottom plates connected by a plurality of pins arranged vertically between the top and bottom plates. ... International Business Machines Company

06/14/18 / #20180163139

Cross-linkable flame retardant materials

A cross-linkable flame retardant material includes a terminal furan-containing flame retardant moiety. The terminal furan-containing flame retardant moiety includes a furan moiety bonded to a phosphorus moiety via a phosphoryl linkage or via a phosphinyl linkage.. ... International Business Machines Company

06/14/18 / #20180163076

Surface modification by polymer anchoring on porous substrates

Disclosed is a method for mechanically anchoring polymers on the surface of a porous substrate by trapping polymer chains within the pores of the substrate under capillary forces. Surface modification of the porous substrate is achieved by anchoring one end of the polymer chains within the pores while one or more other ends of the polymer chains dangle from the surface of the porous substrate. ... International Business Machines Company

06/14/18 / #20180163016

Renewable cross-linker for increased bio-content from fructose

A class of bio-based bifuran cross-linkers are disclosed. Polymers cross-linked using the cross-linkers are also disclosed.. ... International Business Machines Company

06/14/18 / #20180162888

Furan-containing flame retardant molecules

A furan-containing flame retardant molecule includes a furan moiety bonded to a phosphorus moiety via a phosphoryl linkage or via a phosphinyl linkage.. . ... International Business Machines Company

06/14/18 / #20180162307

Risk situations for vehicle occupants based on data provided by vehicle sensors and contextual information

A method for improving risk situations for vehicle occupants in a vehicle which includes: configuring a set of circumstances; defining a set of values for each circumstance where each value has a rate; collecting context information for the circumstances, values and rates; collecting real-time sensor measurements pertaining to a vehicle, a driver and vehicle occupants; retrieving risk patterns from a risk pattern database; matching the sensor measurements to the risk patterns to find a matching risk pattern having a risk similarity value; contextualizing the matching risk pattern by increasing the risk similarity value to result in a personalized risk value; comparing the personalized risk value to a threshold; and executing a context modifying action to lower the personalized risk value below a predefined threshold when the personalized risk value exceeds the predefined threshold.. . ... International Business Machines Company

06/14/18 / #20180162267

Contextual priority signal in autonomous environment

Determining contextual priority of an autonomous vehicle and whether the passengers have a genuine event based on priority input, which is greater than a threshold and is classified as an emergency, activating the notification system to alert other vehicles.. . ... International Business Machines Company

06/14/18 / #20180160963

Sensors and analytics for reading comprehension

An approach is provided that receives, from a neurological sensor worn by a user, words as they are silently read the user. The words being read by the user correspond to a set of actual words that are included in a passage that is being read by the user. ... International Business Machines Company

06/07/18 / #20180160565

Cold plate with combined inclined impingement and ribbed channels

Methods for making heat transfer devices include forming a jet plate with a plurality of inclined jets set at an angular deviation from normal. A bottom plate is formed with channel walls that have ribs. ... International Business Machines Company

06/07/18 / #20180160561

Detecting a type of storage adapter connected and miscabling of a microbay housing the storage adapter

Provided are techniques for detecting a type of storage adapter connected to an input/output (i/o) bay and miscabling of a microbay housing the storage adapter. Under control of an input/ouput (i/o) bay, cable sidebands are driven high for a predetermined period of time. ... International Business Machines Company

06/07/18 / #20180160524

Integrated circuit device assembly

A method for assembling an integrated circuit device includes positioning a thermal interface material (tim) on top of an electronic component, positioning a load frame onto a printed circuit board, the load frame having an open region for the electronic component to extend through, and positioning a heat sink onto the tim. The method further comprises fastening a first screw fastener, resulting in a tim bond line between the heat sink and the electronic component, and actuating a second screw fastener disposed within a bore of the heat sink and threaded into the load frame. ... International Business Machines Company

06/07/18 / #20180160308

User access verification

Embodiments are directed to a method of providing access verification for a system that includes activating a security control device, which is in communications with a host device. The method also includes having the security control device receiving a verification signal coming from outside the system while being locally-based, and comparing the verification signal to a table of stored criteria values. ... International Business Machines Company

06/07/18 / #20180160265

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine an emotional state of a user of a user equipment and a cognitive environment in an area proximate to the user of the user equipment. ... International Business Machines Company

06/07/18 / #20180160264

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine an emotional state of a user of a user equipment and a cognitive environment in an area proximate to the user of the user equipment. ... International Business Machines Company

06/07/18 / #20180160263

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine a cognitive dimension associated with each of the data points and a location associated with each of the data points. ... International Business Machines Company

06/07/18 / #20180160262

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine a cognitive dimension associated with each of the data points and a location associated with each of the data points. ... International Business Machines Company

06/07/18 / #20180160120

Dual technique compression

Systems and methods for ensuring that images are compressed in a format that may be decompressed at a speed that is acceptable to a particular user and/or viewing environment are disclosed herein.. . ... International Business Machines Company

06/07/18 / #20180160036

Automated image capture based on image context

According to an embodiment of the present invention, a system dynamically captures and stores an image based on the context of the image being captured. Initially, an image capture device receives and analyzes an image to determine a first set of one or more attributes associated with the image. ... International Business Machines Company

06/07/18 / #20180159956

Techniques for implementing a usage aware standby service in a grid environment

A technique for operating a grid includes receiving, by a resource manager executing on a data processing system of the grid, an allocation request from a first application for one or more resources. The resource manager determines whether a service that is in standby mode is available for utilization by the first application. ... International Business Machines Company

06/07/18 / #20180159922

Job assignment using artificially delayed responses in load-balanced groups

A detection is made that a first handshake packet has been received from a data processing system at a first system. The first system participates in a load-balanced group managed by a load-balancer. ... International Business Machines Company

06/07/18 / #20180159892

Runtime protection of web services

Protecting a runtime web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. ... International Business Machines Company








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with International Business Machines Company in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for International Business Machines Company with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###