Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines
International Business Machines Corp
International Business Machines Coporation
International Business Machiness Corporation
International Business Machines Corporations
International Business Machines Corportion
International Business Machines Incorporated
International Business Machines Cororation
International Business Machines Inc
International Business Machines Corporaton
International Business Machines Corporaiton
International Business Machines Corproation
International Business Machines Coproration
International Business Machines Corportation
International Business Machines Corpration
International Business Machines Corpoation
International Business Machines Corporation ibm
International Business Machines Corporatin
International Business Machines Corporaion
International Business Machines Company
International Business Machines Corporation yt
International Business Machines Corpporation
International Business Machines Croporation
International Business Machines corporation

International Business Machines patents


Recent patent applications related to International Business Machines. International Business Machines is listed as an Agent/Assignee. Note: International Business Machines may have other listings under different names/spellings. We're not affiliated with International Business Machines, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machines-related inventors


Method and system for forecasting using an online analytical processing database

A method for providing a forecast includes providing a multi-dimensional database storing data at a lowest level in a first dimension, calculating a first forecast at a level that is higher than the lowest level of a first dimension in the database, calculating a forecast for each category within the... International Business Machines

Intelligent persona agents for design

A processor-implemented method, system, and/or computer program product generate an intelligent persona agent for use in designing a product. One or more processors input a persona specification into an intelligent persona agent generator. The persona specification describes attributes of a set of model users of a particular type of product,... International Business Machines

Integrated die paddle structures for bottom terminated components

Bottom terminated components and methods of making bottom terminated components are provided. The bottom terminated component includes a die paddle and at least one die paddle structure configured to prevent wicking into a respective thermal via of a printed circuit board. The at least one die paddle structure includes a... International Business Machines

Scalable architecture for implementing maximization algorithms with resistive devices

In some aspects, a method may include initializing a first array and a second array with a random voltage value, passing a forward pass by pulsing an input voltage value from an input of the first array and an input of the second array, and reading output voltage values at... International Business Machines

Scalable architecture for analog matrix operations with resistive devices

In some aspects, a method for performing analog matrix inversion on a matrix with a network of resistive device arrays B, W, Q, and C is described. The method may include initializing arrays W, Q, B and C, updating the connections of array W in parallel and array Q in... International Business Machines

Multiple pre-clean processes for interconnect fabrication

A method of making an interconnect structure includes forming an opening within a dielectric material layer disposed on a substrate including a conductive material, the opening extending from a first surface to a second surface of the dielectric material layer and being in contact with a portion of the substrate;... International Business Machines

Quantized congestion notification for computing environments

A method includes determining, by a congestion point (CP) unit, traffic flow congestion in an Open Flow environment network. The CP unit comprises an Open Flow switch including a device including logic where an action is associated with each flow entry in the device. A congestion point (CP) unit sends... International Business Machines

Dynamic data compression

A method for dynamic data compression includes receiving, at a first computer system, a request for data from a second computer system. A distance factor is determined, based, at least in part, on distance separating the first computer system and the second computer system. A processor loading factor is determined,... International Business Machines

Method and system for upgrading a set of replicated state machine processes

A computer-implemented method, computerized apparatus and computer program product, the method comprising: receiving a proposed reconfiguration command, the proposed reconfiguration command indicating a modification of a protocol version employed by a plurality of replica-set processes to an updated protocol version; tentatively agreeing on at least one proposed command following the... International Business Machines

Spoof detection for facial recognition

An embodiment of the invention provides a method of analyzing an image of a user to determine whether the image is authentic, where a first image of a user's face is received with a camera. Four or more two-dimensional feature points can be located that do not lie on the... International Business Machines

Acceleration of real time computer vision processing on uavs through gps attitude estimation

A method for applying GPS UAV attitude estimation to accelerate computer vision. The UAV has a plurality of GPS receivers mounted at fixed locations on the UAV. The method includes receiving raw GPS measurements from each GPS satellite in view of the UAV, the raw GPS measurements comprising pseudo-range and... International Business Machines

Early pts with buffer for channel doping control

A method of performing an early PTS implant and forming a buffer layer under a bulk or fin channel to control doping in the channel and the resulting bulk or fin device are provided. Embodiments include forming a recess in a substrate; forming a PTS layer below a bottom surface... International Business Machines

Silicon germanium fin channel formation

A method for channel formation in a fin transistor includes removing a dummy gate and dielectric from a dummy gate structure to expose a region of an underlying fin and depositing an amorphous layer including Ge over the region of the underlying fin. The amorphous layer is oxidized to condense... International Business Machines

Daily cognitive monitoring of early signs of hearing loss

In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processing circuit to cause the processing circuit to receive collected data from one or more data collection devices. The collected data is aggregated over... International Business Machines

No clean flux composition and methods for use thereof

A flux formulation includes an activator and a protic solvent. The activator may be glutaric acid, levulinic acid, 2-ketobutyric acid, 2-oxovaleric acid, or mixtures thereof. Suitable protic solvents include alkanediol, alkoxy propanol and alkoxy ethanol. The flux formulation may be a no-clean flux formulation that may be used in the... International Business Machines

Assigning tasks to a robot device for execution

Embodiments for assigning tasks to a robot device by a processor. A target region may be selected from a displayed image of an image capturing device. One or more tasks may be defined according to a plurality of objects displayed within the target region such that the defined one or... International Business Machines

Package delivery and reception with drones

A computer program product for automatically delivering a physical mail includes receiving, by an unmanned aerial vehicle from an unmanned aerial vehicle management system, a delivery information, the delivery information includes information about a first secure mailbox and information about a second secure mailbox, the first secure mailbox being related... International Business Machines

Non-ionic low diffusing photo-acid generators

Non-ionic photo-acid generating (PAG) compounds were prepared that contain an aryl ketone group. The disclosed non-polymeric PAGs release a strong sulfonic acid when exposed to high energy radiation such as deep UV or extreme UV light. The photo-generated sulfonic acid has a low diffusion rate in an exposed resist layer... International Business Machines

Non-ionic aryl ketone based polymeric photo-acid generators

Non-ionic photo-acid generating (PAG) polymerizable monomers were prepared that contain a side chain sulfonate ester of an alpha-hydroxy aryl ketone. The aryl ketone group has a perfluorinated substituent alpha to the ketone carbonyl. The sulfur of the sulfonate ester is also directly linked to a fluorinated group. PAG polymers prepared... International Business Machines

Method and chemistry for selenium electrodeposition

Techniques for electrodepositing selenium (Se)-containing films are provided. In one aspect, a method of preparing a Se electroplating solution is provided. The method includes the following steps. The solution is formed from a mixture of selenium oxide; an acid selected from the group consisting of alkane sulfonic acid, alkene sulfonic... International Business Machines

Automated drip flow valve for freeze protection

Methods and apparatus, including computer program products, implementing and using techniques for regulating water flow in a pipe. A water flow regulator includes a valve configured to regulate water flow, a power source, a communication module and a processor. The communication module is configured to receive instructions pertaining to water... International Business Machines

Determining fluid leakage volume in pipelines

A method and an apparatus for determining leakage volume of fluid in transportation pipelines are provided. The method comprises: obtaining the negative pressure wave signals detected by at least two pressure sensors arranged on the pipeline; determining the pressure signal at the leakage location based on the negative pressure wave... International Business Machines

Building a trip plan from various sources

A method and system for building a trip plan from various sources is provided. The method includes receiving information detailing a planned trip from a social media website. A weighted rank is calculated for one or more stopover points associated with the planned trip. A route for the planned trip,... International Business Machines

Dynamic route guidance based on real-time data

In an embodiment of the present invention, background data of a first user in a group of one or more users is received. Physiometric data of the first user while the group of one or more users is traversing a first route is received from a first group of one... International Business Machines

Tracing vehicle paths

A computer-implemented method includes responding to receiving a vehicle startup notification, by recording start location coordinates corresponding to that location where a vehicle is started. The method includes collecting onboard sensor data for the vehicle. The method includes tracking the vehicle's movement, based at least on the onboard sensor data... International Business Machines

Tracing vehicle paths

A computer-implemented method includes responding to receiving a vehicle startup notification, by recording start location coordinates corresponding to that location where a vehicle is started. The method includes collecting onboard sensor data for the vehicle. The method includes tracking the vehicle's movement, based at least on the onboard sensor data... International Business Machines

Noise modulation for on-chip noise measurement

Functionality for estimating characteristics of an on-chip noise signal can be implemented on a processing module. An on-chip noise signal is determined at an on-chip determination point of a computer chip. The on-chip noise signal is converted to a frequency-varying signal using a voltage-controlled oscillator implemented on the computer chip.... International Business Machines

Laminate bond strength detection

A laminate bond strength detection apparatus is provided. The laminate bond strength detection apparatus includes first circuit elements affixable to a printed circuit board (PCB), a housing having a coefficient of thermal expansion (CTE) mismatched from that of the PCB, second circuit elements affixable to the housing and configured to... International Business Machines

Surveying physical environments and monitoring physical events

A computer-implemented method includes receiving surveying data from a proximity barrier survey device. The proximity barrier survey device is mounted to a package. The package is located within a physical environment. The method includes generating a map based on the surveying data. The method includes tracking movement within the physical... International Business Machines

Correcting computer model weather forecasts using a hybrid analog method with dynamic time warping

An aspect receiving a new weather forecast. A temporally coherent analog modeling process is performed to identify a historical weather forecast that matches the new weather forecast. The new weather forecast is updated based on historical weather observations at points in time in the historical weather forecast. The updating includes:... International Business Machines

Single-mode polymer waveguide connector assembly device

Waveguide connector assembly device and methods of forming waveguide connectors include a cap having an inner portion to protect a connection end face of a polymer waveguide, wherein the cap includes one or more insertion structures to position the polymer waveguide in relation to one or more components of an... International Business Machines

Fluorinated sulfonate esters of aryl ketones for non-ionic photo-acid generators

Non-ionic photo-acid generating (PAG) compounds were prepared that contain an aryl ketone group having a perfluorinated substituent alpha to the ketone carbonyl. The non-polymeric PAGs release a sulfonic acid when exposed to high energy radiation such as deep UV or extreme UV light. The photo-generated sulfonic acid has a low... International Business Machines

Multiple unmanned aerial vehicle autonomous coordination

At each of a plurality of unmanned aerial vehicles operating in a three-dimensional space, current relative locations of other ones of the plurality of unmanned aerial vehicles which are visible to each of the plurality of unmanned aerial vehicles are determined based on two-dimensional camera images from on-board dual-lens cameras.... International Business Machines

Mobile audio input device controller

A method, system, and/or computer program product controls operations of a mobile audio input device. One or more processors detect a first location of a mobile audio input device. The processor(s) detect a second location of the user. The processor(s) then direct the mobile audio input device to autonomously move... International Business Machines

Method and system for continued navigation of unmanned aerial vehicles beyond restricted airspace boundaries

A system for continued navigation of unmanned aerial vehicles beyond restricted boundaries. The system comprises a monitoring device to track a geolocation corresponding to an unmanned aerial vehicle and to compare the geolocation corresponding to the unmanned aerial vehicle with a geolocation corresponding to a restricted boundary to determine a... International Business Machines

02/15/18 / #20180046237

Budgeting for power consumption in a chassis environment that includes a plurality of integrated technology elements

Methods, apparatuses, and products for budgeting for power consumption in a chassis environment that includes a plurality of integrated technology elements (‘ITEs’), each ITE having power utilization information indicating an average power consumption of the ITE, including: determining, by a chassis management module, a total power requirement value based on... International Business Machines

02/15/18 / #20180046261

Remotely operating target device

The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational... International Business Machines

02/15/18 / #20180046262

Remotely operating target device

The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational... International Business Machines

02/15/18 / #20180046332

Disk utilization analysis

An approach is provided for monitoring disk utilization at an object level. At a first time a first size of an object (i.e., integrated file system or library) in a System i computing platform is determined. At a second time a second size of the object is determined. A difference... International Business Machines

02/15/18 / #20180046348

User interface for recommended alternative search queries

Alternative search queries are provided by: determining alternative search paths for terms in a current search query; receiving a user selection of one or more terms in the current search query; providing a graphical display of one or more alternative search paths for the selected terms; receiving a user selection... International Business Machines

02/15/18 / #20180046351

Controlling display object on display screen

A method and associated system for modifying an image on a display screen. While an original image is being displayed on the display screen, a first point and a second point in the original image are received. A first line and a second line are generated in the original image.... International Business Machines

02/15/18 / #20180046376

Adaptive assignment of open logical erase blocks to data streams

A computer-implemented method, according to one embodiment, includes: assigning data having a first heat to a first data stream, assigning data having a second heat to a second data stream, determining an anticipated throughput of each of the first and second data streams, assigning a first number of logical erase... International Business Machines

02/15/18 / #20180046377

Physical address management in solid state memory

A storage system includes a memory controller connected to a solid state memory device and a read status table that tracks a pending read from the solid state memory device and a physical address of the solid state memory device that is associated with the pending read. The memory controller... International Business Machines

02/15/18 / #20180046381

Hybrid compressed media in a tiered storage environment

A hybrid compressed media is maintained by detecting hot data within a logical unit name (LUN), and compressing a remaining cold data within the LUN while keeping the hot data uncompressed. The uncompressed hot data and the compressed cold data are both stored within the LUN.... International Business Machines

02/15/18 / #20180046387

Generating node access information for a transaction accessing nodes of a data set index

Provided are a computer program product, system, and method for generating node access information for a transaction accessing nodes of a data set index. Pages in the memory are allocated to internal nodes and leaf nodes of a tree data structure representing all or a portion of a data set... International Business Machines

02/15/18 / #20180046393

Dynamic compression for runtime services

A method for enabling applications to compress and un-compress selected objects based on defined rules is provided. The method may include generating un-compressed objects and proxy objects, and storing the generated un-compressed objects on an un-compressed objects storage. The method may include receiving defined rules. The method may include compressing... International Business Machines

02/15/18 / #20180046397

Method of writing a file to a plurality of media and a storage system thereof

A method according to one embodiment includes instructing a first tape drive to load a parent tape medium, and instructing the first tape drive to retrieve identification (ID) information about the parent tape medium from metadata stored (saved) thereon. The first tape drive is instructed to write a first file... International Business Machines

02/15/18 / #20180046400

Columnar data storage on tape partition

A method for writing data from a table to a tape includes setting a number of partitions on the tape, where the number of partitions is greater than or equal to a number of columns of the table to be written to the tape, and writing data from each column... International Business Machines

02/15/18 / #20180046403

Hybrid and adaptive dispersed storage network (dsn) memory

A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module that is configured to perform various operations. The computing device monitors for condition(s) that triggers expansion of a private DSN memory that stores... International Business Machines

02/15/18 / #20180046407

Automated migration of file recalled by specific application

In a hierarchical storage memory (HSM), a file recalled by a specific application is migrated as soon as possible after completion of the application process. Specifically, the effective UID of a specific process is preregistered on an HSM client. After a recall operation is performed on a certain file from... International Business Machines

02/15/18 / #20180046409

Mass storage devices packages and software-defined arrays of such packages

A mass storage devices package includes a structure comprising a stack of two or more mass storage devices of same dimensions, each having a form factor having two opposite main surfaces. The mass storage devices are superimposed in a stacking direction perpendicular to their main surfaces. The mass storage devices... International Business Machines

02/15/18 / #20180046412

Modeling the effects of switching data storage resources through data storage pool tier performance capacity and demand gap analysis

The assignment of data storage resources in a data storage arrangement having a plurality of pools, where each pool includes a plurality of data storage resources arranged in tiers, can be optimized. A gap analysis can be performed for each tier of each pool to determine that tier's excess capacity... International Business Machines

02/15/18 / #20180046423

Automated display configuration

Systems, methods and tools for automatically configuring multiple display devices. The systems tools and methods automatically determine the user of the display device, a user's display device preferences, collect feedback, user context and information of the surrounding environment as the display devices are used by the user and continuously adjust... International Business Machines

02/15/18 / #20180046425

Preserving an external display configuration

Embodiments are an approach to maintaining a shared application window environment based on mirroring the shared application windows of a secondary display to a buffer by a display proxy. When a disconnection of the secondary display is detected the display proxy creates a framed window and transfers the applications previously... International Business Machines

02/15/18 / #20180046428

Preserving an external display configuration

Embodiments are an approach to maintaining a shared application window environment based on minoring the shared application windows of a secondary display to a buffer by a display proxy. When a disconnection of the secondary display is detected the display proxy creates a framed window and transfers the applications previously... International Business Machines

02/15/18 / #20180046443

Compact data marshaller generation

A method for compact data marshaller generation includes determining a plurality of data types having a same memory layout from data to be marshalled using a processor, each of the plurality of data types being associated with one or more separate data marshallers. The one or more separate data marshallers... International Business Machines

02/15/18 / #20180046444

Initiating use of software as part of a messaging window

Disclosed is a novel system and method for initiating trial use of a software application. One or more trial software icons are displayed on a messaging window of a graphical users interface on a display coupled to a computing device. Each trial software icon represents a trial software application, such... International Business Machines

02/15/18 / #20180046448

Collaborative maintenance of software programs

Maintaining a plurality of software instances of a software program in a computing environment. An updating request is received for an updating process of the software instances from an old level to a new level. An attempt is made to update each software instance to the new level according to... International Business Machines

02/15/18 / #20180046464

Selective suppression of instruction cache-related directory access

Processing of an instruction fetch from an instruction cache is provided, which includes: determining whether the next instruction fetch is in a same cache line of the instruction cache as a last instruction fetch; and based, at least in part, on determining that the next instruction fetch is in the... International Business Machines

02/15/18 / #20180046468

Shielding real-time workloads from os jitter due to expedited grace periods

A technique for shielding real-time workloads from operating system (OS) jitter due to expedited read-copy update (RCU) grace periods. In accordance with the disclosed technique, a kernel parameter is set to indicate that expedited RCU grace periods are to be suppressed. The kernel parameter is checked to see if it... International Business Machines

02/15/18 / #20180046476

Workload placement in a hybrid cloud environment

An application is deployed on a first cloud from a set of clouds in a hybrid cloud environment. A simulator is deployed on each cloud in the set. A vertical relationship function is computed between a time-series of the application and a time-series of the simulator on the first cloud.... International Business Machines

02/15/18 / #20180046482

Expediting the provisioning of virtual machines based on cached repeated portions of a template

A computer-implemented method includes: receiving, by a computing device, a template for creating a virtual machine (VM) instance; separating, by the computing device, the template into a repeated portion and a unique portion; determining, by the computing device, whether the repeated portion is stored in a cache; creating, by the... International Business Machines

02/15/18 / #20180046492

Migrating virtual machines based on relative priority of virtual machine in the context of a target hypervisor environment

A method, system and computer program product for selecting a target hypervisor to run a migrated virtual machine. An “effective priority value,” representing the virtual machine's priority with respect to the other virtual machines running on the same hypervisor, is calculated for the virtual machine when it is running on... International Business Machines

02/15/18 / #20180046493

Semantic-aware and user-aware admission control for performance management in data analytics and data storage systems

In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processor to cause the processor to receive, by the processor, a first job request. The embodied program instructions are also executable by the processor... International Business Machines

02/15/18 / #20180046499

Generating differences for tuple attributes

A sequence of tuples, each having one or more attributes, is received at one of one or more processing elements operating on one or more processors. Each processing element may have one or more stream operators. A first stream operator may be identified as one that only processes an instance... International Business Machines

Patent Packs
02/15/18 / #20180046500

Generating differences for tuple attributes

A sequence of tuples, each having one or more attributes, is received at one of one or more processing elements operating on one or more processors. Each processing element may have one or more stream operators. A first stream operator may be identified as one that only processes an instance... International Business Machines

02/15/18 / #20180046503

Data-locality-aware task scheduling on hyper-converged computing infrastructures

Data-locality-aware task scheduling on hyper-converged computing infrastructures is provided. A plurality of data blocks referenced in an input/output (I/O) request are identified. The I/O request is based on scheduling logic that executes within a container that is deployed on a hyper-converged infrastructure. A block-location mapping table is scanned using a... International Business Machines

02/15/18 / #20180046506

Providing exclusive use of cache associated with a processing entity of a processor complex to a selected task

A plurality of processing entities are maintained in a processor complex. In response to determining that a task is a critical task, the critical task is dispatched to a scheduler, wherein it is preferable to prioritize execution of critical tasks over non-critical tasks. In response to dispatching the critical task... International Business Machines

02/15/18 / #20180046507

Reserving a core of a processor complex for a critical task

A plurality of cores are maintained in a processor complex. A core of the plurality of cores is reserved for execution of critical tasks, wherein it is preferable to prioritize execution of critical tasks over non-critical tasks. A scheduler receives a task for scheduling in the plurality of cores. In... International Business Machines

02/15/18 / #20180046510

Resolving application multitasking degradation

Systems and methods for resolving application multitasking degradation are disclosed. In aspects, a computer implemented method is used with a user device including a multitasking operating system, shared user device resources, a first application and a second application. The method includes: running, simultaneously, the first application and the second application;... International Business Machines

02/15/18 / #20180046519

Dispersed storage network secure hierarchical file directory

A method includes creating a file directory entry in a directory file of a secure hierarchical file directory system for a file. The file directory entry includes a path name, an encryption access control list, and a source name. The file is encrypted with a key and the key is... International Business Machines

02/15/18 / #20180046520

Social objectives-based workload resolution in a cloud environment

A content of a social media data is analyzed. The social media data relates to a workload that is to be located on a node. A location corresponding to the social media data is computed. The social media data is regarded as originating from the location. A set of nodes... International Business Machines

02/15/18 / #20180046521

Shielding real-time workloads from os jitter due to expedited grace periods

A technique for shielding real-time workloads from operating system (OS) jitter due to expedited read-copy update (RCU) grace periods. In accordance with the disclosed technique, a kernel parameter is set to indicate that expedited RCU grace periods are to be suppressed. The kernel parameter is checked to see if it... International Business Machines

02/15/18 / #20180046532

Requesting manual intervention on failure of initial microcode load attempts during recovery of modified customer data

A storage system maintains a cache and a non-volatile storage. An error recovery component queries a cache component to determine whether modified customer data exists in a memory preserve cache. In response to determining that the modified customer data exists in the memory preserve cache, and in response to a... International Business Machines

02/15/18 / #20180046533

Stack detail recovery

A computer-implemented method, includes, in a pageable operating system environment that does not keep all kernel pages in memory, identifying one or more stack frame pages. The method includes storing the one or more stack frame pages in a logical dump volume, wherein the logical dump volume is accessed upon... International Business Machines

02/15/18 / #20180046537

Logically and hierarchically delineated vaults

A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by receiving an access request from a requesting entity. The method continues by determining a vault ID (identifier) based on the access request, identifying a... International Business Machines

02/15/18 / #20180046544

Assigning slices to storage locations based on a predicted lifespan

A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and to the memory such that the processing module, when operable within the computing device based on the... International Business Machines

02/15/18 / #20180046547

Storage container ds unit reassignment based on dynamic parameters

A dispersed storage network (DSN) includes storage units storing dispersed error-encoded data slices, and logically grouped into a container served by a computing device configured as a container controller. A method for use in such a DSN, includes obtaining by the container controller, a container status of the container, the... International Business Machines

02/15/18 / #20180046550

Pre-filtering of join execution over multi-column range summaries and other synopses

Techniques are provided for pre-filtering of join execution over multi-column range summaries and other synopses. An exemplary method comprises maintaining a synopsis for a plurality of data tables, wherein a given synopsis summarizes a set of records in a corresponding data table; and, in response to a request for a... International Business Machines

02/15/18 / #20180046551

Recovery log analytics with a big data management platform

Provided are techniques for replicating relational transactional log data to a big data platform. Change records contained in change data tables are fetched. A relational change history with transaction snapshot consistency is rebuilt to generate consistent change records by joining the change data tables and a unit of work table... International Business Machines

Patent Packs
02/15/18 / #20180046554

Managing a redundant computerized database using a replicated database cache

Data in a database cache in memory of an operating database server is copied to memory of a standby database server, without requiring synchronization between the operating server and the standby server. If the operating server fails, the database is recovered to a consistent state in the standby server using... International Business Machines

02/15/18 / #20180046563

Exception prediction before an actual exception during debugging

An approach is provided for predicting an exception during a debugging of software code before the debugging encounters the exception. A number of lines X is received. During a debugging of a line number L of the code, upcoming lines consisting of line numbers L+1 through L+X are executed. Based... International Business Machines

02/15/18 / #20180046566

Detecting race condition vulnerabilities in computer software applications

Testing computer software applications is performed by identifying first and second executable portions of the computer software application, where the portions are configured to access a data resource, and where at least one of the portions is configured to write to the data resource, instrumenting the computer software application by... International Business Machines

02/15/18 / #20180046569

Association between a test case and source code

The present invention may be a method, a system, and/or a computer program product. An embodiment of the present invention provides a computer-implemented method for associating one or more test cases with one or more source code parts for a test target, or vice versa. The method comprises the followings:... International Business Machines

02/15/18 / #20180046572

Optimizing memory usage across multiple garbage collected computer environments

A method, information processing system, and computer readable storage medium, vary a maximum heap memory size for one application of a plurality of applications based on monitoring garbage collection activity levels for the plurality of applications, each application including a heap memory, and unused memory in the heap memory being... International Business Machines

02/15/18 / #20180046573

Optimizing memory usage across multiple applications based on garbage collection activity

A method, information processing system, and computer readable storage medium, vary a maximum heap memory size for one application of a plurality of applications based on monitoring garbage collection activity levels for the plurality of applications, each application including a heap memory, and unused memory in the heap memory being... International Business Machines

02/15/18 / #20180046597

True random generator (trng) in ml accelerators for nn dropout and initialization

A random number signal generator used for performing dropout or weight initialization for a node in a neural network. The random number signal generator includes a transistor which generates a random noise signal. The transistor includes a substrate, source and drain regions formed in the substrate, a first insulating layer... International Business Machines

02/15/18 / #20180046598

Memory device for matrix-vector multiplications

A device for performing a multiplication of a matrix with a vector. The device comprises a plurality of memory elements, a signal generator and a readout circuit. The signal generator is configured to apply programming signals to the memory elements. The signal generator is further configured to control a first... International Business Machines

02/15/18 / #20180046604

Annotating chemical reactions

A computer-implemented method according to one embodiment includes identifying a textual document, determining a chemical reaction within the textual document, extracting a plurality of chemical terms from the chemical reaction, creating an annotation for the chemical reaction, utilizing the plurality of chemical terms, and storing a representation of the annotation... International Business Machines

02/15/18 / #20180046607

Forms processing method

A forms processing method involves accessing an individual scanned form, analyzing the individual form, based upon the analysis, selecting a proper forms-scanning template, loading multiple field-specific dictionaries linked to individual fields in the selected forms-scanning template, analyzing, text content, on a field by field basis using the field-specific dictionary linked... International Business Machines

02/15/18 / #20180046609

Generating templates for automated user interface components and validation rules based on context

Generating a user interface template is provided. A user context corresponding to an action request by a user to perform a task on a computer is determined. A set of user interface templates corresponding to the action request by the user and the user context is retrieved. Components of different... International Business Machines

02/15/18 / #20180046615

System, method, and recording medium for regular rule learning

A regular rule learning system, including an analyzing circuit configured to analyze a corpus of sentences to find semantic relationships between sentence constituents that are responsible for specific senses of words in that sentence by describing the semantic relationships and grammatical relations that are actuated in the sentence.... International Business Machines

02/15/18 / #20180046616

Context enriched application text translation

A multilayered context enriched text translation interface includes a simulation layer comprising one or more text objects and a translation layer. The interface displays one or more mimicked views of an application GUI in the simulation layer. Subsequent to a user engaging a text object, the interface displays a prompt... International Business Machines

02/15/18 / #20180046626

Altering input search terms

In one general embodiment, a computer-implemented method includes identifying an input search term, determining an additional term associated with the input search term, where the additional term targets a predetermined entity, altering the input search term utilizing the determined additional term, and performing a search, utilizing the altered input search... International Business Machines

02/15/18 / #20180046627

Pattern triggers while searching an index of data being ingested into a distributed computing system

A storage unit (SU) includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the SU based on the operational instructions,... International Business Machines

02/15/18 / #20180046629

Identifying key words within a plurality of documents

A computer-implemented method according to one embodiment includes identifying a first group of textual data, determining a plurality of word combinations within the first group of textual data, and determining a first plurality of key words for the first group of textual data, utilizing the plurality of word combinations.... International Business Machines

02/15/18 / #20180046632

Backup and restoration for storage system

A backup method is provided for a file system for managing hierarchical storage including one or more storage media on a computer system including one or more computers. Each of the one or more storage media includes a data part which is separated from an index and on which updated... International Business Machines

02/15/18 / #20180046633

Backup and restoration for storage system

A backup method is provided for a file system for managing hierarchical storage including one or more storage media on a computer system including one or more computers. Each of the one or more storage media includes a data part which is separated from an index and on which updated... International Business Machines

02/15/18 / #20180046634

Backup and restoration for storage system

A backup method is provided for a file system for managing hierarchical storage including one or more storage media on a computer system including one or more computers. Each of the one or more storage media includes a data part which is separated from an index and on which updated... International Business Machines

02/15/18 / #20180046640

Lockless management of deduplicated data using reference tags

In one embodiment, a method includes creating a data extent catalog table including information related to data extents stored to computer readable storage media, receiving a query related to a first data extent, and determining whether the data extent is stored to the one or more computer readable storage media... International Business Machines

02/15/18 / #20180046642

Streamlined padding of deduplication repository file systems

Various embodiments for repository management in a data deduplication system, by a processor device, are provided. Metadata of an inode structure of an entire pre-allocated file system is captured, exported, and compressed from an existing deduplication appliance, the pre-allocated file system comprising a fully padded file system. The exported and... International Business Machines

02/15/18 / #20180046643

Consistent execution of partial queries in hybrid dbms

The disclosure relates to a system comprising a first and a second database engine and a replication module. The replication module replicates changes from a first database maintained by the first engine to a second database maintained by the second engine. The system maps state times and sync times. The... International Business Machines

02/15/18 / #20180046651

Auditing database access in a distributed medical computing environment

Methods, systems, and computer program products are provided for auditing database access in a distributed medical computing environment including receiving from a user a query of one or more databases within the distributed medical administration computing environment; determining by an audit manager in dependence upon audit policies for the medical... International Business Machines

02/15/18 / #20180046654

Displaying content based on a user's status

A webpage from a network server is received. The content of the received webpage is parsed. A first set of contextual data from one or more sources is collected. A first relationship between the collected first set of contextual data and the parsed content is identified. The identified relationship is... International Business Machines

02/15/18 / #20180046660

Management of long-running locks and transactions on database tables

An exclusive lock is acquired on each of an outer database ownership table and an inner database ownership table to obtain ownership of a database. The exclusive locks are converted to a pair of overlapping shared locks on each of the outer database ownership table and the inner database ownership... International Business Machines

02/15/18 / #20180046672

Database statistics based on transaction state

A computer-implemented method for determining a query execution plan based on transaction state may include determining that a first set of database values in a database table are in a committed transaction state and that a second set of database values in the database table are in an uncommitted transaction... International Business Machines

02/15/18 / #20180046673

Database statistics based on transaction state

A computer-implemented method for determining a query execution plan based on transaction state may include determining that a first set of database values in a database table are in a committed transaction state and that a second set of database values in the database table are in an uncommitted transaction... International Business Machines

02/15/18 / #20180046674

Optimizing an order of execution of multiple join operations

A computer-implemented method, system, and/or computer program product optimizes an order of execution of column join operations. A first partitioning of the first data column splits the first data column into first subsets of rows. A second partitioning of the second data column splits the second data column into a... International Business Machines

02/15/18 / #20180046677

Method to monitor dynamic sql statements for automatic stabilization in a data sharing environment

A database system searches for any statements that satisfy one or more of a set of filtering criteria. When a given dynamic query statement fully satisfies the set of filtering criteria, the given statement is stabilized by persistently storing a bound form of the given dynamic query statement. When the... International Business Machines

02/15/18 / #20180046681

Efficient list traversal

With respect to data items presented in structured, sorted listing having an initial arrangement positioning of the data items relative to each other, aspects select a subset group of the data items having values in a data field selected within one of the items and that share a common value... International Business Machines

Social Network Patent Pack
02/15/18 / #20180046690

Generating an outside-in hierarchical tree visualization

A data visualization tool (“tool”) configured to generate a visualization for tree data. The tool can calculate a number of hierarchical levels of the tree data. The tool can further subdivide a presentation area for the data visualization into a number of concentric parts. The concentric parts are equivalent to... International Business Machines

02/15/18 / #20180046691

Query governor rules for data replication

Embodiments of the present disclosure provide a method, system, and computer program product for managing the execution of a query. The method, system and computer program product include receiving a query to be executed. The query governor calculates an estimated replication time of the received query. The estimated replication time... International Business Machines

02/15/18 / #20180046692

Secure deletion operations in a wide area network

Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the... International Business Machines

02/15/18 / #20180046693

Consistent query execution in hybrid dbms

A method includes, where a first database engine maintains a first database, a second database engine maintains a second database, and a table has a first instance in the first database and a second instance in the second database, executing write transactions, asynchronously pooling the changes of the first instance,... International Business Machines

02/15/18 / #20180046696

Automated generation of custom dashboards for viewing application performance data

A method and system are provided. The method includes correlating end user response time monitoring data from an end user response time monitoring system to an infrastructure ownership database. The method further includes correlating the infrastructure ownership database to an organizational structure, using a unique identifier available in both the... International Business Machines

02/15/18 / #20180046700

Providing multidimensional attribute value information

The invention relates to a method, computer program product and computer system for providing attribute value information for a data extent comprising a set of data entries. For each multidimensional reference point of a set of one or more multidimensional reference points the method comprises: calculating for each multidimensional data... International Business Machines

02/15/18 / #20180046705

Providing question and answers with deferred type evaluation using text with limited structure

A system, method and computer program product for conducting questions and answers with deferred type evaluation based on any corpus of data. The method includes processing a query including waiting until a “Type” (i.e. a descriptor) is determined AND a candidate answer is provided. Then, a search is conducted to... International Business Machines

02/15/18 / #20180046707

Providing searching strategy in connection with answering question in message

A method, system and computer program product for providing a searching strategy in connection with answering a question in a message. A message containing a question is detected as being received from a sender. The steps performed by the recipient of the message to answer the question are monitored. Content... International Business Machines

02/15/18 / #20180046708

System and automatic detection and clustering of articles using multimedia information

The disclosure provides methods and systems that automatically detect and cluster related articles in a publication for archival, search, and other purposes. Text and images are recognized and scored in order to cluster related content into coherent and searchable articles.... International Business Machines

02/15/18 / #20180046718

Integration of social interactions into media sharing

Embodiments for integration of social interactions in shared media by a processor. The social interactions are mapped in real time according to a predetermined preference. Duplicate ones of the social interactions are managed according to a data deduplication operation. The shared media is analyzed in view of the mapped social... International Business Machines

Patent Packs
02/15/18 / #20180046728

Auto indexing with customizable metadata

An auto indexing method includes identifying a vault of a dispersed storage network for an auto indexing function. The method continues by obtaining search criteria for the auto indexing function. The method further includes scanning the plurality of metadata files to identify metadata files of the plurality of metadata files... International Business Machines

02/15/18 / #20180046729

Determining whether to process identified uniform resource locators

In one general embodiment, a computer-implemented method includes selecting a portion of a hash table, identifying a plurality of uniform resource locators (URLs) stored within the selected portion of the hash table, and for each of the plurality of identified URLs, individually determining whether to process the identified URL, based... International Business Machines

02/15/18 / #20180046734

Automated attribute propagation and hierarchical consistency checking for non-standard extensions

Examples of techniques for automated attribute propagation and hierarchical consistency checking are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: detecting, by a processor, a non-standard extension during convergence of an integrated circuit logic design; propagating, by the processor, the non-standard... International Business Machines

02/15/18 / #20180046741

Automated attribute propagation and hierarchical consistency checking for non-standard extensions

Examples of techniques for automated attribute propagation and hierarchical consistency checking are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: detecting, by a processor, a non-standard extension during convergence of an integrated circuit logic design; propagating, by the processor, the non-standard... International Business Machines

02/15/18 / #20180046742

System and generation of an integrated circuit design

A method for verification of a design of an electronic circuit is provided. The method includes executing test runs of the design. The method further includes increasing a fail counter if the executing of a test run of the test runs failed. The method further includes increasing a pass counter... International Business Machines

02/15/18 / #20180046743

System and generation of an integrated circuit design

A method for verification of a design of an electronic circuit is provided. The method includes executing test runs of the design. The method further includes increasing a fail counter if the executing of a test run of the test runs failed. The method further includes increasing a pass counter... International Business Machines

02/15/18 / #20180046746

Integrated circuit design layout optimizer based on process variation and failure mechanism

Embodiments include methods, design layout optimization systems, and computer program products for optimizing design layout of integrated circuits. Aspects include receiving a design layout of an integrated circuit from a design layout tool module, identifying a critical pitch in the design layout received, searching design rules forming design arc limited... International Business Machines

02/15/18 / #20180046748

Incremental common path pessimism analysis

A method, system, and computer program product for performing incremental common path pessimism analysis in integrated circuit design includes performing common path pessimism removal (CPPR) analysis to provide timing credit for one or more paths that are subject to common path pessimism. The method also includes identifying one or more... International Business Machines

02/15/18 / #20180046770

System, method, and storage medium to generate predictive medical feedback

A system that includes one or more processors and one or more memories storing code that is executable by the one or more processors to: access a data log corresponding to a diet of a user over a predetermined period; determine a diet context for the user based at least... International Business Machines

02/15/18 / #20180046771

Predicting therapeutic targets for patients unresponsive to a targeted therapeutic

Embodiments may provide the capability to identify genes or biological processes that may be targeted by other therapeutics in a group of individuals who are less likely to benefit from a specific targeted therapeutic. For example, a method may comprise receiving an indication of a biomarker or biological characteristic to... International Business Machines

02/15/18 / #20180046782

Performing chemical textual analysis to discover dangerous chemical pathways

According to one embodiment, a computer program product for performing chemical textual analysis to discover dangerous chemical pathways includes a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, and where the program instructions are executable by... International Business Machines

02/15/18 / #20180046784

Video file attribution

Methods, computer program products, and systems are set forth herein and can include examining a video file using content of an authorship attribution database, the authorship attribution database including one or more authorship attribution video file record; and determining authorship attribution of the video file based on the examining.... International Business Machines

02/15/18 / #20180046785

Multiple-point cognitive identity challenge system

A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. Responsive to receiving a request to verify the identity of the user, one or more transaction based sources associated with the user are scanned for a set of... International Business Machines

02/15/18 / #20180046810

Application integrity verification in multi-tier architectures

A method and system of determining a vulnerability of software are provided. In a setup phase, an authorized application is received from an authorized source. Static analysis is performed to identify a plurality of structural characteristics, which are stored. During an active phase, a call is received from a user... International Business Machines

02/15/18 / #20180046813

Strong confirmation mechanism for manipulation of sensitive configuration data

An intention to perform a data management function in a computing environment is confirmed by issuing a confirmation prompt requiring a user to input at least one character associated with a subject of the data management function prior to performing the data management function.... International Business Machines

02/15/18 / #20180046819

Strong confirmation mechanism for manipulation of sensitive configuration data

Pursuant to issuing a confirmation prompt to confirm an intention to perform a data management function in a computing environment, a processor device determines by a decision engine, a complexity strength of the confirmation prompt based upon a complexity algorithm.... International Business Machines

02/15/18 / #20180046822

Secure access to healthcare information

A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a... International Business Machines

02/15/18 / #20180046831

Contemporaneous gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera... International Business Machines

02/15/18 / #20180046868

Detecting device, detecting method, and program

To detect a distant object that may become an obstacle to a traveling destination of a moving vehicle or the like more accurately than the conventional, there is provided a detecting device, a program used in the detecting device, and a detecting method using the detecting device, where the detecting... International Business Machines

02/15/18 / #20180046886

Sentiment based social media comment overlay on image posts

By performing Natural Language Processing (NLP) on a comment to a social media post, an entity that is referenced in the comment is extracted. The entity is an object other than a human face that is depicted in an image in the post. The image is analyzed to determine whether... International Business Machines

02/15/18 / #20180046890

Active rfid-based real time location systems

A computer-implemented method includes identifying one or more tag readers. The one or more of tag readers are positioned peripherally to a region. The computer-implemented method further includes receiving a signal, by at least one of the one or more tag readers, from a tag. The computer-implemented method further includes... International Business Machines

02/15/18 / #20180046904

High dynamic range, high class count, high input rate winner-take-all on neuromorphic hardware

High dynamic range, high class count, high input rate winner-take-all on neuromorphic hardware is provided. In some embodiments, a plurality of thermometer codes are received by a neurosynaptic core. The plurality of thermometer codes are split into a plurality of intervals. One of the plurality of intervals is selected. A... International Business Machines

02/15/18 / #20180046908

High memory bandwidth neuromorphic computing system

Three-dimensional (3D) neuromorphic computing systems are provided. A system includes a logic wafer having a plurality of processors. The system further includes a double-sided interposer bonded to the logic wafer and incorporating a signal port ring for sending and receiving signals. The system also includes a plurality of 3D memory... International Business Machines

02/15/18 / #20180046909

Reservoir computing device using external-feedback laser system

Various Reservoir Computing systems and a method performed by a Reservoir Computing system are provided. A Reservoir Computing system includes a laser for emitting light. The Reservoir Computing system further includes a mirror for reflecting external feedback light back to the laser. The Reservoir Computing system also includes a modulator... International Business Machines

02/15/18 / #20180046912

Generating labeled data by sequence-to-sequence modeling with added perturbations to encoded information

Methods and a system are provided for generating labeled data. A method includes encoding, by a processor-based encoder, a first labeled data into an encoded representation of the first labeled data. The method further includes modifying the encoded representation into a modified representation by adding a perturbation to the encoded... International Business Machines

02/15/18 / #20180046928

Cognitive analysis of security data with signal flow-based graph exploration

This disclosure provides for a signal flow analysis-based exploration of security knowledge represented in a graph structure comprising nodes and edges. “Conductance” values are associated to each of a set of edges. Each node has an associated “toxicity” value representing a degree of maliciousness associated with the node. The conductance... International Business Machines

02/15/18 / #20180046930

Performing chemical textual analysis

According to one embodiment, a computer program product for performing chemical textual analysis comprises a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, and where the program instructions are executable by a processor to cause the... International Business Machines

02/15/18 / #20180046932

Performing chemical textual analysis

A computer-implemented method according to one embodiment includes identifying a textual document, determining chemical data within the textual document, performing an analysis of the chemical data to identify a chemical pathway, and calculating a probability score for the chemical pathway.... International Business Machines

02/15/18 / #20180046934

Warning filter based on machine learning

Techniques for generating a warning filter to filter the warnings output from a static program analysis tool are provided. In one example, a computer-implemented method comprises determining feature vector data for a set of warnings, wherein the set of warnings is generated in response to static analysis of a computer... International Business Machines

02/15/18 / #20180046937

System and ground truth evaluation

A method for training a question answering system includes providing training questions to a question answering system executing on a computer and to a plurality of subject matter experts. The question answering system generates first answers to each training question. Second answers to the training questions are received from the... International Business Machines

Patent Packs
02/15/18 / #20180046938

System and ground truth evaluation

A method for ground truth generation includes providing training questions to a machine learning system executing on a computer. The machine learning system generates candidate answers to each of the training questions. The method also includes providing the candidate answers to a plurality of subject matter experts for evaluation with... International Business Machines

02/15/18 / #20180046951

System, method and recording medium for causality analysis for auto-scaling and auto-configuration

Similar to other Cloud Service, Solution as Services over Cloud, as single tenant technology, also requires support of agility and flexibility as a fundamental feature of Cloud computing. Different from other Cloud services, the agility and flexibility typically are not triggered by the typical performance metrics, but at the business... International Business Machines

02/15/18 / #20180046955

Supporting analysis based on workflow

A computer-implemented method for supporting analysis based on a workflow, includes: obtaining a non-timeline-based workflow including a first process and a second process to that is executed after the first process; and outputting a timeline-based workflow including the first process arranged at a first position corresponding to a first time... International Business Machines

02/15/18 / #20180046959

Similar project identification

One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: accessing a project plan comprising a plurality of projects, each having a duration and resource requirement, wherein each of the plurality of projects comprises a plurality of tasks; representing the... International Business Machines

02/15/18 / #20180046962

Techniques for evaluating optimum data center operation

Techniques for modeling a data center are provided. In one aspect, a method for determining data center efficiency is provided. The method includes the following steps. Target parameters for the data center are obtained. Technology pre-requisite parameters for the data center are obtained. An optimum data center efficiency is determined... International Business Machines

02/15/18 / #20180046965

Executing a set of business rules on incomplete data

A method for executing a plurality of business rules on a plurality of incomplete data is provided. The method may include receiving the plurality of business rules, an object model, and a plurality of ruleset parameters. The method may also include generating a dependency tree based on the received plurality... International Business Machines

02/15/18 / #20180046968

Job profile generation based on intranet usage

A method, computer program product, and system for job profile generation, the method, computer program product, and system include receiving employee intranet usage data, storing the received employee intranet usage data in a database, identifying a portion of the stored employee intranet usage data associated with the former employee, transmitting... International Business Machines

02/15/18 / #20180046971

Determining a non-optimized inventory system

A tool for determining a non-optimized inventory system is provided. The tool retrieves a plurality of data related to a supply chain. The tool determines an inventory history for the supply chain. The tool creates a set of linear difference equations based, at least in part, the plurality of data... International Business Machines

02/15/18 / #20180046974

Determining a non-optimized inventory system

A tool for determining a non-optimized inventory system is provided. The tool retrieves a plurality of data related to a supply chain. The tool determines an inventory history for the supply chain. The tool creates a set of linear difference equations based, at least in part, the plurality of data... International Business Machines

02/15/18 / #20180046976

Mapping boxes in a storage bay

Mapping boxes in a storage bay is provided, which includes: ascertaining storage bay boundaries; wirelessly reading, using a mobile device, identifying information from tags associated with the boxes, each box having one or more associated tags, and the identifying information including size information for the associated box; determining position of... International Business Machines

02/15/18 / #20180046982

Precise real time marketing of a product

An approach is provided for marketing a product in real time. A presence of a social contact in a physical store is determined. The contact is connected to a shopper by a social networking service. Based on contextual information about a shopper, it is determined that the shopper intends to... International Business Machines

02/15/18 / #20180047008

Smart mobile application for e-commerce applications

An approach using one or more computer processors to send a request from a user for a mobile payment to a payment gateway and to determine that an event has occurred on a mobile computing device of a user, wherein the event is an interruption to processing of a request... International Business Machines

02/15/18 / #20180047009

Smart mobile application for e-commerce applications

An approach using one or more computer processors to send a request from a user for a mobile payment to a payment gateway and to determine that an event has occurred on a mobile computing device of a user. The approach includes sending a request for additional transaction time for... International Business Machines

02/15/18 / #20180047017

Transaction with security integrity and permission management

Methods, computer program products, and systems are presented and can include for instance: The method can include for example, establishing a permission that authorizes a second shopper to act on behalf of a first shopper, the first shopper having a profile that includes first shopper information stored in a secure... International Business Machines

02/15/18 / #20180047025

Multiple-point cognitive identity challenge system using voice analysis

A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. One or more transaction based sources associated with the user are scanned for a set of transactions conducted by the user. A subset of transactions from the set... International Business Machines

02/15/18 / #20180047038

Leveraging hashtags to dynamically scope a target audience for a social network message

A method for identifying a plurality of recipients of a social media correspondence is provided. The method may include receiving a correspondence from a user on a social media network that utilizes a hashtag. The method may also include identifying a subject and a location associated with the received correspondence... International Business Machines

02/15/18 / #20180047043

Determining sensor placement and a reward sharing mechanism based on shared energy forecasting information

Methods, systems, and computer program products for determining sensor placement and a reward sharing mechanism based on shared energy forecasting information are provided herein. A computer-implemented method includes processing multiple data streams derived from multiple respective energy-related sensors within a network, wherein each of the multiple energy-related sensors is linked... International Business Machines

02/15/18 / #20180047061

Social message promotion enhancement

An approach is provided for promoting user-generated content in a social network message list. An intent of a first user of a social networking service to perform an action related to goals of an advertising campaign is identified. Based on the identified intent of the first user, content is selected.... International Business Machines

02/15/18 / #20180047095

Automated product personalization based on multiple sources of product information

In an approach to customer-product matching, a computing device receives textual information related to a product. The computing device generates a set of product personality traits based on analyzing the textual information by a natural language processor. The computing device identifies a set of customer personality traits for a target... International Business Machines

02/15/18 / #20180047134

Automatically enabling a read-only cache in a language in which two arrays in two different variables may alias each other

A method and system are provided for executing, by a processor including a read-only cache, a program having a plurality of variables including a first variable and a second variable. Each variable is for executing a respective read operation or a respective write operation for an object. The method includes... International Business Machines

Social Network Patent Pack
02/15/18 / #20180047170

Method of solar power prediction

Techniques for estimating direct and diffuse sunlight reaching a location as a function of time using color whole sky images are provided. In one aspect, a method for forecasting solar insolation is provided that includes the steps of: obtaining color whole sky images using a digital camera which are taken... International Business Machines

02/15/18 / #20180047215

Providing volume indicators based on received images of containers

In order to aid a user in filling a container with a target volume of a substance, an image is received. The image includes a view of the container and a view of a reference object. The reference object has a known dimension. The view of the reference object and... International Business Machines

02/15/18 / #20180047221

Event tracking for vehicles

Embodiments for tracking vehicle events by capturing data from a vehicle component by a processor. Sensory instrumentation associated with the vehicle component is initialized to provide data to a repository when one of the vehicle events occurs. The data in the repository is analyzed to extrapolate the vehicle event to... International Business Machines

02/15/18 / #20180047258

Accessibility-layered communication service using lighthouse

Methods, computer program products, and systems are presented. The methods include, for instance: providing social media feed cognizant lighthouse display service for communicating to spectators, information in regard to social response to an event, the lighthouse display service by use of a lighthouse structure further including a private display for... International Business Machines

02/15/18 / #20180047300

Music practice feedback system, method, and recording medium

A music practice feedback system, comprising, a processor; and a memory storing instructions that cause the processor to perform, monitoring an outcome of a playing of a sheet music by a user, and based on the outcome, suggesting a type of improvement to increase a success rate of playing the... International Business Machines

02/15/18 / #20180047409

Denoising a signal

A computer-implemented method according to one embodiment includes creating a clean dictionary, utilizing a clean signal, creating a noisy dictionary, utilizing a first noisy signal, determining a time varying projection, utilizing the clean dictionary and the noisy dictionary, and denoising a second noisy signal, utilizing the time varying projection.... International Business Machines

02/15/18 / #20180047413

Training deep neural network for acoustic modeling in speech recognition

A method is provided for training a Deep Neural Network (DNN) for acoustic modeling in speech recognition. The method includes reading central frames and side frames as input frames from a memory. The side frames are preceding side frames preceding the central frames and/or succeeding side frames succeeding the central... International Business Machines

02/15/18 / #20180047509

Gate-all-around fin device

A gate-all around fin double diffused metal oxide semiconductor (DMOS) devices and methods of manufacture are disclosed. The method includes forming a plurality of fin structures from a substrate. The method further includes forming a well of a first conductivity type and a second conductivity type within the substrate and... International Business Machines

02/15/18 / #20180047568

Multilayer dielectric structures with graded composition for nano-scale semiconductor devices

Multilayer dielectric structures are provided with graded composition. For example, a multilayer dielectric structure includes a stack of dielectric films, wherein the dielectric films include at least a first SiCNO (silicon carbon nitride oxide) film and a second SiCNO film. The first SiCNO film has a first composition profile of... International Business Machines

02/15/18 / #20180047575

Self-aligned single dummy fin cut with tight pitch

A method of forming a semiconductor device and resulting structures having a dummy semiconductor fin removed from within an array of tight pitch semiconductor fins by forming a first spacer including a first material on a substrate; forming a second spacer including a second material on the substrate, the second... International Business Machines

02/15/18 / #20180047590

Limiting electronic package warpage

An electronic package includes a carrier, semiconductor chip, a lid, and a lid-ring. The carrier includes a top surface and a bottom surface configured to be electrically connected to a system board. The semiconductor chip is electrically connected to the top surface. The lid is attached to the top surface... International Business Machines

02/15/18 / #20180047615

Air gap spacer formation for nano-scale semiconductor devices

Semiconductor devices having air gap spacers that are formed as part of BEOL or MOL layers of the semiconductor devices are provided, as well as methods for fabricating such air gap spacers. For example, a method comprises forming a first metallic structure and a second metallic structure on a substrate,... International Business Machines

02/15/18 / #20180047617

Air gap spacer formation for nano-scale semiconductor devices

Semiconductor devices having air gap spacers that are formed as part of BEOL or MOL layers of the semiconductor devices are provided, as well as methods for fabricating such air gap spacers. For example, a method comprises forming a first metallic structure and a second metallic structure on a substrate,... International Business Machines

02/15/18 / #20180047622

Diffusion barrier layer formation

A method of forming a titanium nitride (TiN) diffusion barrier includes exposing a deposition surface to a first pulse of a titanium-containing precursor and to a first pulse of a nitrogen-rich plasma to form a first TiN layer with a first nitrogen concentration making a lower portion of the TiN... International Business Machines

02/15/18 / #20180047625

Reflow enhancement layer for metallization structures

A reflow enhancement layer is formed in an opening prior to forming and reflowing a contact metal or metal alloy. The reflow enhancement layer facilitates the movement (i.e., flow) of the contact metal or metal alloy during a reflow anneal process such that a void-free metallization structure of the contact... International Business Machines

02/15/18 / #20180047637

Self-aligned punch through stopper liner for bulk finfet

A technique relates to forming a self-aligning field effect transistor. A starting punch through stopper comprising a substrate having a plurality of fins patterned thereon, an n-type field effect transistor (NFET) region, a p-type field effect transistor (PFET) region, and a center region having a boundary defect at the interface... International Business Machines

02/15/18 / #20180047639

Field effect transistor stack with tunable work function

A method for fabricating a gate stack of a semiconductor device comprises forming a first dielectric layer over a channel region of the device, forming a first nitride layer over the first dielectric layer, forming a first gate metal layer over the first nitride layer, forming a capping layer over... International Business Machines

02/15/18 / #20180047640

Field effect transistor stack with tunable work function

A method for fabricating a gate stack of a semiconductor device comprises forming a first dielectric layer over a channel region of the device, forming a first nitride layer over the first dielectric layer, forming a first gate metal layer over the first nitride layer, forming a capping layer over... International Business Machines

02/15/18 / #20180047644

Method and structure for flip-chip package reliability monitoring using capacitive sensors groups

Flip-chip package reliability monitoring and systems of monitoring using capacitive sensors are disclosed. The monitoring is conducted in situ and in real-time without the need for destructive testing of the packages. The capacitive sensors can be used for flip-chip package reliability monitoring.... International Business Machines

02/15/18 / #20180047654

Tim strain mitigation in electronic modules

A heat spreading lid, including a lid body, a wing portion, where the wing portion flexibly moves independently from the lid body.... International Business Machines

Social Network Patent Pack
02/15/18 / #20180047655

Thermal interface material on package

A packaged assembly is disclosed, including thermal interface material dispensed on an organic package and methods of manufacturing. The method includes dispensing a thermal interface material (TIM) on an electronic assembly. The method further includes removing volatile species of the TIM, prior to lid placement on the electronic assembly. The... International Business Machines

02/15/18 / #20180047668

Semiconductor resistor structures embedded in a middle-of-the-line (mol) dielectric

A resistor structure composed of a metal liner is embedded within a MOL dielectric material and is located, at least in part, on a surface of a doped semiconductor material structure. The resistor structure is located on a same interconnect level of the semiconductor structure as a lower contact structure... International Business Machines

02/15/18 / #20180047669

Iii-v compatible anti-fuses

An anti-fuse is provided above a semiconductor material. The anti-fuse includes a first end region including a first metal structure; a second end region including a second metal structure; and a middle region located between the first end region and the second end region. In accordance with the present application,... International Business Machines

02/15/18 / #20180047671

Electrical fuse and/or resistor structures

Electrical fuse (eFuse) and resistor structures and methods of manufacture are provided. The method includes forming metal gates having a capping material on a top surface thereof. The method further includes protecting the metal gates and the capping material during an etching process which forms a recess in a dielectric... International Business Machines

02/15/18 / #20180047676

Structure and fabrication enhanced mechanical strength crack stop

Methods for enhancing mechanical strength of back-end-of-line (BEOL) dielectrics to prevent crack propagation within interconnect stacks are provided. After forming interconnect structures in a dielectric material layer, a pore filling material is introduced into pores of a portion of the dielectric material layer that is located in a crack stop... International Business Machines

02/15/18 / #20180047679

Damaging integrated circuit components

An integrated circuit structure and formation thereof. The integrated circuit structure includes a substrate and a front-end-of-the-line (FEOL) portion. The FEOL portion rests on top of and in contact with the substrate. The integrated circuit structure includes a memory level portion. The memory level portion rests on top of and... International Business Machines

02/15/18 / #20180047726

Integrated circuit having oxidized gate cut region and method to fabricate same

A method includes epitaxially depositing source/drains on parallel semiconductor fins having parallel polysilicon gate precursor structures disposed thereon orthogonally to the fins, where two adjacent polysilicon gate precursor structures are joined together and connected at ends thereof by a polysilicon loop portion. The method further includes oxidizing the ends of... International Business Machines

02/15/18 / #20180047750

Lateral bipolar junction transistor with multiple base lengths

A method comprises forming shallow trenches in an intrinsic base semiconductor layer and forming a first base layer thereon; applying a first mask to the layer; etching the first base layer; forming a second base layer on the intrinsic base semiconductor layer adjacent the first base layer; removing the first... International Business Machines

02/15/18 / #20180047754

Gate top spacer for finfet

The capacitance between gate structures and source/drain contacts of FinFET devices is reduced by the incorporation of inner spacers in the top portions of the gate structures. A replacement metal gate process used in the fabrication of such devices includes formation of the inner spacers following partial removal of dummy... International Business Machines

02/15/18 / #20180047755

Bridging local semiconductor interconnects

A semiconductor device includes a plurality of gates formed upon a semiconductor substrate that includes a plurality of outer active areas (e.g. CMOS/PMOS areas, source/drain regions, etc.) and one or more inner active areas. An isolator is formed upon one or more inner gates associated with the one or more... International Business Machines

02/15/18 / #20180047805

Magnetic inductor stacks with multilayer isolation layers

A magnetic laminating structure and process includes alternating layers of a magnetic material and a multilayered insulating material, wherein the multilayered insulating material is intermediate adjacent magnetic material layers and comprises a first insulating layer abutting at least one additional insulating layer, wherein the first insulating layer and the at... International Business Machines

02/15/18 / #20180047806

On chip mim capacitor

On-chip, three-dimensional MIM capacitors are provided. In one aspect, a method for forming a device includes: forming at least one MOSFET structure and at least one MIM capacitor structure on a substrate each structure including: a metal gate, and source and drain regions on opposite sides of the metal gate,... International Business Machines

02/15/18 / #20180047812

Localized and self-aligned punch through stopper doping for finfet

A method for doping punch through stoppers (PTSs) includes forming fins in a monocrystalline substrate, forming a dielectric layer at a base portion between the fins and forming spacers on sidewalls of the fins down to a top portion of the dielectric layer. The dielectric layer is recessed to form... International Business Machines

02/15/18 / #20180047816

High voltage laterally diffused mosfet with buried field shield and method to fabricate same

A structure includes a laterally diffused (LD) MOSFET with an n-type drift region disposed on a surface of a substrate and a p-type body region contained in the drift region. The structure further includes an n-type source region contained in the p-type body region; an n-type drain region contained in... International Business Machines

02/15/18 / #20180047817

High voltage laterally diffused mosfet with buried field shield and method to fabricate same

A structure includes a laterally diffused (LD) MOSFET with an n-type drift region disposed on a surface of a substrate and a p-type body region contained in the drift region. The structure further includes an n-type source region contained in the p-type body region; an n-type drain region contained in... International Business Machines

02/15/18 / #20180047824

Hybrid source and drain contact formation using metal liner and metal insulator semiconductor contacts

An electrical device including a first semiconductor device having a silicon and germanium containing source and drain region, and a second semiconductor device having a silicon containing source and drain region. A first device contact to at least one of said silicon and germanium containing source and drain region of... International Business Machines

02/15/18 / #20180047827

Replacement metal gate structures

Replacement metal gate structures with improved chamfered workfunction metal and self-aligned contact and methods of manufacture are provided. The method includes forming a replacement metal gate structure in a dielectric material. The replacement metal gate structure is formed with a lower spacer and an upper spacer above the lower spacer.... International Business Machines

02/15/18 / #20180047828

Method of forming vertical transistor having dual bottom spacers

A method of forming a spacer for a vertical transistor is provided. The method includes forming a fin structure on a substrate, depositing a first spacer on exposed surfaces of the substrate to define gaps between the first spacer and the fin structure and depositing a second spacer on the... International Business Machines

02/15/18 / #20180047834

Self-aligned inner-spacer replacement process using implantation

A method for manufacturing a semiconductor device includes forming a stacked configuration of first and second semiconductor layers on a semiconductor substrate, wherein the stacked configuration comprises a repeating arrangement of a second semiconductor layer stacked on a first semiconductor layer, forming a plurality of dummy gates spaced apart from... International Business Machines

02/15/18 / #20180047835

Self-aligned inner-spacer replacement process using implantation

A method for manufacturing a semiconductor device includes forming a stacked configuration of first and second semiconductor layers on a semiconductor substrate, wherein the stacked configuration comprises a repeating arrangement of a second semiconductor layer stacked on a first semiconductor layer, forming a plurality of dummy gates spaced apart from... International Business Machines

02/15/18 / #20180047845

Structure and forming strained finfet by cladding stressors

Various methods and structures for fabricating a strained semiconductor fin of a FinFET device. A strained semiconductor fin structure includes a substrate, a semiconductor fin disposed on the substrate, the semiconductor fin having two fin ends, and a stressor material cladding wrapped around a portion of each of the two... International Business Machines

02/15/18 / #20180047847

Tensile strained high percentage silicon germanium alloy finfets

A thermal mixing process is employed to convert a portion of a silicon germanium alloy fin having a first germanium content and an overlying non-doped epitaxial silicon source material into a silicon germanium alloy source structure having a second germanium content that is less than the first germanium content, to... International Business Machines

02/15/18 / #20180047853

Nanosheet and nanowire mosfet with sharp source/drain junction

A semiconductor device that includes a gate structure present on at least two suspended channel structures, and a composite spacer present on sidewalls of the gate structure. The composite spacer includes a cladding spacer present along a cap portion of the gate structure, and an inner spacer along the channel... International Business Machines

02/15/18 / #20180047875

Protective capping layer for spalled gallium nitride

A method of producing a semiconductor device includes forming a stack including a semiconductor material having a Group III nitride semiconductor material formed on a growth substrate, a protective layer formed over the Group III nitride semiconductor material, and a handle layer and a stressor layer formed over the protective... International Business Machines

02/15/18 / #20180048028

Thin film lithium ion battery

A method for forming a thin film lithium ion battery includes, under a same vacuum seal, forming a stack of layers on a substrate including an anode layer, an electrolyte, a cathode layer and a first cap over the stack of layers to protect the layers from air. Under a... International Business Machines

02/15/18 / #20180048097

Embedded platform in electrical cables

A platform embedded in an electrical cable that stores and transmits data or information related to the electrical cable is designed. The embedded platform includes a non-volatile memory element to store product data describing at least one of electrical characteristics and certifications of the electrical cable. The platform also includes... International Business Machines

02/15/18 / #20180048264

Bipolar junction transistor based switched capacitors

A switched capacitor is provided. The switched capacitor includes a pair of parallel component stacks. Each stack is connected to a common top node and a common bottom node. Each stack includes a BJT. Each stack further includes a first resistor in series with the BJT and having a first... International Business Machines

02/15/18 / #20180048321

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. The phase locked loop circuit also includes a digital path including a digital phase detector. The phase locked loop circuit further includes an analog path including a linear phase detector. Additionally, the phase locked... International Business Machines

02/15/18 / #20180048411

Selective directional mitigation of wireless signal interference

A boundary of a wireless network is monitored for incoming wireless signals that may interfere with an ability of a first wireless computing device to connect to the wireless network within the boundary of the wireless network. For an incoming wireless signal determined to interfere with the ability of the... International Business Machines

02/15/18 / #20180048468

Enhancing security for multiple storage configurations

A method begins by a processing module identifying, for a DSN (Dispersed Storage Network) memory using multiple IDA (Information Dispersal Algorithms) configurations simultaneously, a first IDA configuration with a highest security level relative to each of the multiple IDA configurations. The method continues by generating at least one master key.... International Business Machines

Social Network Patent Pack
02/15/18 / #20180048491

Overlay switch

The present invention discloses an overlay switch (OSW) and a method used by the same. A received unicast packet needs to pass a waypoint chain including a number of waypoints. A network address of a first waypoint of the waypoint chain and an underlay network address of a second OSW... International Business Machines

02/15/18 / #20180048517

Correlating computing network events

A method for correlating computing network events includes identifying computing resources to be deployed. An identification of a correlation pattern comprising a set of the resources to be deployed is received and a correlation identifier is assigned to the correlation pattern. Each resource of the correlation pattern is configured to... International Business Machines

02/15/18 / #20180048546

High availability in packet processing for high-speed networks

Methods and systems for high-availability data processing include detecting, at a first data processing system, a change in link state between the first data processing system and a second data processing system. A link state between the first data processing system and a third data processing system is changed responsive... International Business Machines

02/15/18 / #20180048556

I/o routing in a multidimensional torus network

A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each... International Business Machines

02/15/18 / #20180048600

Predictive message personalization

Embodiments of the present invention provide a method, computer program product, and a computer system for predicting message personalization. According to one embodiment a message is received on a first device, wherein the message is sent from a second device, and wherein the first device and the second device are... International Business Machines

02/15/18 / #20180048602

Electronic mail delivery system having a spool function

A computer-implemented method includes receiving, by a first mail transfer agent having a first spool, an electronic mail. The computer-implemented method further includes issuing, by the first mail transfer agent, a first unique identifier to be associated with the electronic mail. The computer-implemented method further includes holding the electronic mail... International Business Machines

02/15/18 / #20180048603

Integration of social interactions into media sharing

Embodiments for managing social commentary as applicable to social media by a processor. A spectrum of weights is assigned to individual portions of the social commentary as a function of a determined measured characteristic. Those of the individual portions having a higher weight than a predetermined threshold are selected to... International Business Machines

02/15/18 / #20180048605

Supporting message sharing

A method and system for processing an email. A mail hub device receives the email from a first mail server, a Mail Thread ID (MTID) from a Mail Thread Board (MTB) server, and additional data from the MTB server. The mail hub device transmits, to a second mail client, the... International Business Machines

02/15/18 / #20180048609

Intelligent presentation of multiple proximate audible alerts

A computing device can receive an incoming message. The incoming message can be one directed to a set of different client machines at approximately the same time. The computing device can perform a mitigation action that alters a presentation characteristic of the audible alert for the incoming message. The mitigation... International Business Machines

02/15/18 / #20180048613

Ensuring that a composed message is being sent to the appropriate recipient

A method, system and computer program product for ensuring that the composed message is being sent to the appropriate recipient. A message being composed by an author is detected. The intended recipient(s) to receive the composed message are identified. The composed message is then analyzed to identify one or more... International Business Machines

02/15/18 / #20180048614

Cognitive adjustment of social interactions to edited content

A shift in sentiment is computed, the shift including a difference between an original sentiment value of an original content of a post on social media and an edited sentiment value of an edited content of the post, where the post has an associated reaction value. By applying a function... International Business Machines

02/15/18 / #20180048615

Integration of social interactions into media sharing

Embodiments for managing social commentary as applicable to social media by a processor. A spectrum of weights is assigned to individual portions of the social commentary as a function of a determined measured characteristic. Those of the individual portions having a higher weight than a predetermined threshold are selected to... International Business Machines

02/15/18 / #20180048617

Intelligently splitting text in messages posted on social media website to be more readable and understandable for user

A method, system and computer program product for improving readability and understandability in messages posted on a social media website. The messages posted on a social media website, such as the user's social networking feed, are scanned. The scanned messages are analyzed for topics, meaning and/or tenses using natural language... International Business Machines

02/15/18 / #20180048661

Cognitive offense analysis using contextual data and knowledge graphs

An automated method for processing security events in association with a cybersecurity knowledge graph. The method begins upon receipt of information from a security system representing an offense. An initial offense context graph is built based in part on context data about the offense. The graph also activity nodes connected... International Business Machines

02/15/18 / #20180048662

Cognitive offense analysis using enriched graphs

An automated method for processing security events begins upon receipt of information representing an offense. Based in part on context data extracted from the offense, an offense context graph is built. The offense context graph comprises nodes and edges, with an edge therein representing a relationship between a pair of... International Business Machines

02/15/18 / #20180048664

Reparsing unsuccessfully parsed event data in a security information and event management system

A mechanism is provided for reparsing unsuccessfully parsed event data. Responsive to determining that one or more unsuccessfully parsed event data items exist for a log source, each unsuccessfully parsed event data item of the one or more unsuccessfully parsed event data items is reparsing using an updated device support... International Business Machines

02/15/18 / #20180048682

Notification bot for topics of interest on voice communication devices

A method and system are provided. The method includes transcribing into text, by a processor-based voice-to-text transcriber, voices uttered by two or more respective participants other than a user in each of one or more voice communications sessions occurring on multiple communication devices. The method further includes generating, for each... International Business Machines

02/15/18 / #20180048684

Managing access to a conference call

Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of participants to be included in a conference call, identifying, from the list of participants, a first portion of the participants that have personal passcodes, generating guest... International Business Machines

02/15/18 / #20180048685

Goal-based connection management between parties

A monitoring computer system receives a message, from a first party, which identifies a goal of the first party. The monitoring computer system receives an identity of a second party that has been selected by the first party to assist the first party in achieving the identified goal of the... International Business Machines

02/15/18 / #20180048707

Maintaining state synchronization of an application between computing devices as well as maintaining state synchronization of common information between different applications without requiring periodic synchronization

A method, system and computer program product for maintaining state synchronization of an application between computing devices and maintaining state synchronization of common information between different applications. A server receives a request from a client device to access a shared state scope. A shared state scope is a data store... International Business Machines

02/15/18 / #20180048708

Maintaining state synchronization of an application between computing devices as well as maintaining state synchronization of common information between different applications without requiring periodic synchronization

A method, system and computer program product for maintaining state synchronization of an application between computing devices and maintaining state synchronization of common information between different applications. A server receives a request from a client device to access a shared state scope. A shared state scope is a data store... International Business Machines

02/15/18 / #20180048711

High-performance key-value store using a coherent attached bus

An infrastructure for servicing remote direct memory access (RDMA) requests without the need to pin memory and/or register memory for access by only a single RDMA adapter. Rather, RDMA requests can be coherently serviced from memory accessible to multiple adapters, and that memory can be flexibly managed (such as by... International Business Machines

02/15/18 / #20180048721

Integration of social interactions into media sharing

Embodiments for integration of social interactions in shared media by a processor. The social interactions are mapped in real time according to a predetermined preference. Duplicate ones of the social interactions are managed according to a data deduplication operation. The shared media is analyzed in view of the mapped social... International Business Machines

02/15/18 / #20180048734

Automatically enforcing uniform resource locator workflow presentation

Presenting URLs on a user interface to guide users on a specific URL browsing path over an internet. A plurality of URLs for a user to view on a user interface running in a computing environment may be received. A URL workflow may be created, which comprise a sequence of... International Business Machines

02/15/18 / #20180048751

Notification bot for topics of interest on voice communication devices

A method and system are provided. The method includes automatically monitoring one or more voice communication sessions occurring on multiple communication devices to transcribe into text, by a processor-based voice-to-text transcriber, voices uttered by two or more respective participants other than a user in each of the voice communications sessions.... International Business Machines

02/15/18 / #20180048850

Detecting anomalous events to trigger the uploading of video to a video storage server

A computer-implemented method includes: monitoring, by a computing device, video or image data captured by a plurality of cameras implemented within a vehicle; monitoring, by the computing device, vehicle information associated with the vehicle, wherein the vehicle information includes sensor information reported by tire pressure sensors or impact sensors of... International Business Machines

02/15/18 / #20180048869

Data center raised floor monitoring

One or more aspects relates to monitoring conditions under a raised floor in a data center. A grid of raised floor tiles has regular floor tiles interspersed with sensor floor tiles. The sensor floor tiles include: one or more sensors to monitor conditions under the raised floor; and one or... International Business Machines

02/15/18 / #20180048935

System, method, and recording medium for providing notifications in video streams to control video playback

A video stream control method, system, and a computer program product include analyzing a video stream to identify a section of the video stream where a condition will occur, delivering a notification that the condition will occur in the section of the video stream and modifying the video stream before... International Business Machines

02/15/18 / #20180048992

Smart group mobility positioning and sharing

Determining an individual exceeds a time-distance from a point. Locations for a set of individuals are monitored and an alert is transmitted if an individual exceeds a time-distance from a point.... International Business Machines








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with International Business Machines in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for International Business Machines with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###