Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines
International Business Machines Corp
International Business Machines Coporation
International Business Machiness Corporation
International Business Machines Corporations
International Business Machines Corportion
International Business Machines Incorporated
International Business Machines Cororation
International Business Machines Inc
International Business Machines Corporaton
International Business Machines Corporaiton
International Business Machines Corproation
International Business Machines Coproration
International Business Machines Corportation
International Business Machines Corpration
International Business Machines Corpoation
International Business Machines Corporation ibm
International Business Machines Corporatin
International Business Machines Corporaion
International Business Machines Company
International Business Machines Corporation yt
International Business Machines Corpporation
International Business Machines Croporation
International Business Machines corporation

International Business Machines patents


Recent patent applications related to International Business Machines. International Business Machines is listed as an Agent/Assignee. Note: International Business Machines may have other listings under different names/spellings. We're not affiliated with International Business Machines, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machines-related inventors


Method and system for forecasting using an online analytical processing database

A method for providing a forecast includes providing a multi-dimensional database storing data at a lowest level in a first dimension, calculating a first forecast at a level that is higher than the lowest level of a first dimension in the database, calculating a forecast for each category within the... International Business Machines

Intelligent persona agents for design

A processor-implemented method, system, and/or computer program product generate an intelligent persona agent for use in designing a product. One or more processors input a persona specification into an intelligent persona agent generator. The persona specification describes attributes of a set of model users of a particular type of product,... International Business Machines

Integrated die paddle structures for bottom terminated components

Bottom terminated components and methods of making bottom terminated components are provided. The bottom terminated component includes a die paddle and at least one die paddle structure configured to prevent wicking into a respective thermal via of a printed circuit board. The at least one die paddle structure includes a... International Business Machines

Scalable architecture for implementing maximization algorithms with resistive devices

In some aspects, a method may include initializing a first array and a second array with a random voltage value, passing a forward pass by pulsing an input voltage value from an input of the first array and an input of the second array, and reading output voltage values at... International Business Machines

Scalable architecture for analog matrix operations with resistive devices

In some aspects, a method for performing analog matrix inversion on a matrix with a network of resistive device arrays B, W, Q, and C is described. The method may include initializing arrays W, Q, B and C, updating the connections of array W in parallel and array Q in... International Business Machines

Multiple pre-clean processes for interconnect fabrication

A method of making an interconnect structure includes forming an opening within a dielectric material layer disposed on a substrate including a conductive material, the opening extending from a first surface to a second surface of the dielectric material layer and being in contact with a portion of the substrate;... International Business Machines

Quantized congestion notification for computing environments

A method includes determining, by a congestion point (CP) unit, traffic flow congestion in an Open Flow environment network. The CP unit comprises an Open Flow switch including a device including logic where an action is associated with each flow entry in the device. A congestion point (CP) unit sends... International Business Machines

Dynamic data compression

A method for dynamic data compression includes receiving, at a first computer system, a request for data from a second computer system. A distance factor is determined, based, at least in part, on distance separating the first computer system and the second computer system. A processor loading factor is determined,... International Business Machines

Method and system for upgrading a set of replicated state machine processes

A computer-implemented method, computerized apparatus and computer program product, the method comprising: receiving a proposed reconfiguration command, the proposed reconfiguration command indicating a modification of a protocol version employed by a plurality of replica-set processes to an updated protocol version; tentatively agreeing on at least one proposed command following the... International Business Machines

Spoof detection for facial recognition

An embodiment of the invention provides a method of analyzing an image of a user to determine whether the image is authentic, where a first image of a user's face is received with a camera. Four or more two-dimensional feature points can be located that do not lie on the... International Business Machines

Acceleration of real time computer vision processing on uavs through gps attitude estimation

A method for applying GPS UAV attitude estimation to accelerate computer vision. The UAV has a plurality of GPS receivers mounted at fixed locations on the UAV. The method includes receiving raw GPS measurements from each GPS satellite in view of the UAV, the raw GPS measurements comprising pseudo-range and... International Business Machines

Early pts with buffer for channel doping control

A method of performing an early PTS implant and forming a buffer layer under a bulk or fin channel to control doping in the channel and the resulting bulk or fin device are provided. Embodiments include forming a recess in a substrate; forming a PTS layer below a bottom surface... International Business Machines

Silicon germanium fin channel formation

A method for channel formation in a fin transistor includes removing a dummy gate and dielectric from a dummy gate structure to expose a region of an underlying fin and depositing an amorphous layer including Ge over the region of the underlying fin. The amorphous layer is oxidized to condense... International Business Machines

Automated vegetation removal

A method and system for automatically removing undesirable vegetation is provided. The method includes receiving by a first vehicle, data describing a specified geographical area for scanning. The specified geographical area is divided into a plurality of sectors and a second vehicle is directed to a first sector of the... International Business Machines

Airborne anxiety detection and remediation

Embodiments include methods, systems, and computer program products for detection and remediation of anxiety. Aspects include receiving an anxiety indicator. Aspects also include analyzing the anxiety indicator to determine whether an anxiety level exceeds an anxiety threshold. Aspects also include, based upon a determination that the anxiety level exceeds the... International Business Machines

Access control for electronic entertainment systems

Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated... International Business Machines

Delegating control of a vehicle

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the... International Business Machines

Controlling driving modes of self-driving vehicles

A method controls an operational mode of a self-driving vehicle (SDV). One or more physical detectors detect an erratically driven vehicle (EDV) that is being operated in an unsafe manner within a predetermined distance of an SDV that is initially being operated in an evasive autonomous mode. One or more... International Business Machines

Flame-retardant cross-linked epdm rubber

In an example, a process includes polymerizing a mixture that includes an ethylene monomer, a propylene monomer, and a diene monomer to form an ethylene-propylene-diene (EPDM) terpolymer using ring-opening metathesis polymerization (ROMP). The process further includes chemically reacting the EPDM terpolymer with a norbornene-based phosphinate cross-linking material to form a... International Business Machines

Ink compositions

An ink composition includes a fluid and a plurality of microcapsules suspended in the fluid. The fluid includes a first chemical compound that exhibits a first color characteristic in a first pH range and exhibits a second color characteristic in a second pH range, where the first color characteristic is... International Business Machines

Fastener with center for limiting engagement

Embodiments of the disclosure relate to an apparatus that disengages a tool and indicates undesired contact. More specifically, the embodiments of the disclosure relate to a fastener that limits over insertion, indicates over insertion, and limits undesired contact of that fastener with a surface. Further, the apparatus can limit damage... International Business Machines

Formed hose with different fiber-reinforced regions

Formed hose configurations are provided which include an innermost elastomer layer, a first fiber-reinforcement region, and multiple second fiber-reinforcement regions. The first fiber-reinforcement region has a first fiber-reinforcement density, and is disposed, at least in part, at a bend region of the formed hose, and the multiple second fiber-reinforcement regions... International Business Machines

Multi-layered counterflow expanding microchannel cooling architecture and system thereof

Devices that have integrated cooling structures for counterflow, two-phase cooling and systems thereof are provided. In one example, a first structure can comprise a first cooling channel. The first cooling channel can have a first value of width that increases as the first cooling channel extends from a first side... International Business Machines

Suppressing rerouting for intentional circumstances

A method, computer program product, and system for suppressing rerouting in a navigational system which includes a processor monitoring movements of a vehicle relative to a planned route generated by a navigational system, where the planned route includes a trip from a point of origin to a destination and the... International Business Machines

Estimation of concentration of particulate matter in atmosphere

A computer-implemented method, a computer program product, and a system for adapting a model for estimating a concentration of particulate matter (PM) in the atmosphere includes obtaining image data, humidity data and actual PM concentration data. Visibility is determined from the obtained image data. An estimation model for estimating PM... International Business Machines

Integrated circuit protection during high-current esd testing

A method of protecting devices within an integrated circuit during electro-static discharge (ESD) testing using an ESD test system is provided. The method includes applying a direct current (DC) bias voltage to an input of at least one device of the integrated circuit and applying an ESD simulated signal to... International Business Machines

Integrated circuit protection during high-current esd testing

A method of protecting devices within an integrated circuit during electro-static discharge (ESD) testing using an ESD test system is provided. The method includes applying a direct current (DC) bias voltage to an input of at least one device of the integrated circuit and applying an ESD simulated signal to... International Business Machines

Predicting service life of electrical equipment

The service life of electrical equipment is predicted using a thermal history sensor mounted in the electrical equipment. At least one thermal history sensor is mounted inside or on an outer wall surface of electrical equipment. The thermal history sensor includes dissimilar metal joints, and the resistance values of the... International Business Machines

Implementing user configurable probing using magnetic connections and pcb features

A method and system are provided for implementing user configurable probing with magnetic connections and printed circuit board (PCB) features. A first magnet is located at a desired probe point on the PCB, a probe having a second magnet of suitable polarity and an electrical contact is moved to the... International Business Machines

Integrated circuit temperature determination using photon emission detection

A computer-implemented method includes receiving a plurality of images from a device under test (DUT), whereby each of the plurality of images is generated by operating the DUT at different frequency conditions. The computer-implemented method further includes receiving emission intensity values from a corresponding pixel location on each of the... International Business Machines

Environment customization through local automation services

Modifying an environment to meet preferred settings. Settings for controllable appliances are adjusted to customize an environment based on a profile of a user.... International Business Machines

Forecasting solar power generation using weather forecasts

Embodiments are directed to a computer-implemented method of forecasting power generation. The method includes analyzing, using a processor, a set of historical weather data. A set of historical power generation data is analyzed using the processor. The processor then determines a plurality of clusters, where each cluster of the plurality... International Business Machines

System, method and computer program product for fault detection and location in power grid

A method, system, and computer program product, include obtaining a dataset related to a power grid collected by a plurality of sensors distributed in the power grid, identifying a region as a candidate fault region based on first data in the dataset, the first data being collected by a first... International Business Machines

System and tracking pollution

A pollution source detection system, includes an automated vehicle including a position sensor that detects a geographic position of the automated vehicle and at least one pollution detection sensor that measures a concentration of pollution at the automated vehicle. The pollution source detection system includes a back-end system. The back-end... International Business Machines

Voltage and frequency balancing at nominal point

In an approach for determining voltage and frequency pairs, the computer identifies an integrated circuit design. The computer identifies a timing model associated with the identified integrated circuit design. The computer identifies at least a nominal voltage, a nominal clock signal, and a voltage range associated with the integrated circuit... International Business Machines

04/12/18 / #20180101212

Voltage and frequency balancing at nominal point

In an approach for determining voltage and frequency pairs, the computer identifies an integrated circuit design. The computer identifies a timing model associated with the identified integrated circuit design. The computer identifies at least a nominal voltage, a nominal clock signal, and a voltage range associated with the integrated circuit... International Business Machines

04/12/18 / #20180101214

Sla-based power management in disaggregated computing systems

For power management in a disaggregated computing system, initial electrical power levels are distributed thereby allocating a voltage and a clock speed to each one of a set of processor cores in the disaggregated computing system. The voltage and the clock speed of respective processor cores within the set of... International Business Machines

04/12/18 / #20180101215

Sla-based backup power management during utility power interruption in disaggregated datacenters

For power management in a disaggregated computing system, upon detecting an electrical power reduction to the disaggregated computing system, respective workloads being performed by respective processors within a set of processors are prioritized according to a service level agreement (SLA) of the respective workloads. Backup electrical power is dynamically allocated... International Business Machines

04/12/18 / #20180101216

Power management and utilization detection of computing components

For power management in a computing system, component utilization is dynamically managed within the computing system according to a calculated aggregate energy consumed by each one of a set of processors. Each of a plurality of energy factors are measured individually between each one of the set of processors to... International Business Machines

04/12/18 / #20180101217

Management of core power state transition in a microprocessor

A method and apparatus for adjusting a frequency of a processor is disclosed herein. In one embodiment, the method includes inhibiting one or more processor cores from exiting an idle state. The method further includes determining a number of processor cores requesting exit from the idle state and a number... International Business Machines

04/12/18 / #20180101220

Power management in disaggregated computing systems

For power management in a disaggregated computing system, a set of initial electrical power levels are allocated to a set of processor cores according to a predicted desired workload, where the set of initial power levels aggregate to an initial collective contracted power level. Electrical power is dynamically allocated to... International Business Machines

04/12/18 / #20180101280

Displaying ui components

An apparatus includes: a component controller displaying a balloon component in a display area, the balloon component corresponding to a window component displayed in the display area, the balloon component and the window component being to be selected by a user; and a dynamic controller changing a behavior of the... International Business Machines

04/12/18 / #20180101287

Display for input selection on a compact information processing device

Embodiments are provided for a system, a computer program product, and/or a method that improves a display of an input selection displayed on a compact screen. To improve this display, embodiments search displayed content for input items, wherein the input items are selections inputted by a user; display different marks,... International Business Machines

04/12/18 / #20180101301

Performance-balanced heterogeneous raid

A method for balancing performance in a redundant array of independent disks (RAID) made up of heterogeneous storage drives is disclosed. In one embodiment, such a method includes implementing a RAID on a set of storage drives. The set of storage drives includes a lower-performing storage drive that underperforms other... International Business Machines

04/12/18 / #20180101305

Determining when to initiate an intra- distributed storage unit rebuild vs. an inter- distributed storage unit rebuild

A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by identifying an encoded data slice to be rebuilt within a DS unit, obtaining DS unit status information, selecting a rebuilding approach based on the... International Business Machines

04/12/18 / #20180101306

Mirroring a storage vault in a dispersed storage network

A method for execution by a computing device includes determining to establish mirror pools for a plurality of storage pools, where each of the plurality of storage pools includes a plurality of existing storage vaults. For each existing storage vault on each of the plurality of storage pools, a new... International Business Machines

04/12/18 / #20180101307

Scenario based logging

This disclosure provides a computer implemented method comprising: determining whether an input to a program matches a predetermined scenario; and recording, at least partially in response to the determination that the input matches the predetermined scenario, execution information of execution of at least part of the program, the execution of... International Business Machines

04/12/18 / #20180101308

Storing data utilizing a maximum accessibility approach in a dispersed storage network

A method for execution by a dispersed storage and task (DST) processing unit of a dispersed storage network includes determining to store data in a storage pool utilizing a maximum accessibility approach. A storage unit performance factor is determined for a plurality of storage units of the storage pool. A... International Business Machines

04/12/18 / #20180101309

Provision of information about fragmentation of file on sequential access medium

A mechanism is provided for providing information about fragmentation of a file on a sequential access medium by a computer system is disclosed. An actual time for reading the file recorded on the sequential access medium is estimated based on a physical position of the file. A total length of... International Business Machines

04/12/18 / #20180101315

Determining correct devices to use in a mass volume migration environment

A computer-implemented method for determining correct devices to use in a mass volume migration environment includes reading an I/O configuration definition for a plurality of devices in the mass volume migration environment and definition of a second set of the plurality of devices, wherein the plurality of devices comprise a... International Business Machines

04/12/18 / #20180101316

Managing disaster recovery replication for storage volumes

A storage area network comprises: one or more replicating source and target storage volumes accessible by one or more hosts; a volume replication status checker for determining an active replication relationship between a source storage volume and a target storage volume; and a volume visibility engine for setting the target... International Business Machines

04/12/18 / #20180101320

Performing a remote point-in-time copy to a source and target storages in further mirror copy relationships

Provided are a computer program product, system, and method for performing a remote point-in-time copy to a source and target storages in further mirror copy relationships. Each of a plurality of source copy relationships is from the source storage to one corresponding source copy storage. Each of a plurality of... International Business Machines

04/12/18 / #20180101325

Adding incremental storage resources in a dispersed storage network

A method for execution by a computing device includes detecting that an incremental storage cohort has been added to a storage generation to produce an updated plurality of storage cohorts of an updated storage generation, where each storage cohort includes a set of storage units. For each storage cohort, a... International Business Machines

04/12/18 / #20180101326

Managing a collection of data

A measurement sampling facility takes snapshots of the central processing unit (CPU) on which it is executing at specified sampling intervals to collect data relating to tasks executing on the CPU. The collected data is stored in a buffer, and at selected times, an interrupt is provided to remove data... International Business Machines

04/12/18 / #20180101327

Linking common attributes among a set of synchronized vaults

A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN). The method begins by receiving a data access requests with regards to a data object. The method continues by identifying a vault set based on the data access... International Business Machines

04/12/18 / #20180101328

Applying a probability function to avoid storage operations for already-deleted data

A method includes receiving a delete request for a data element and determining to be in a state of queued delete request processing. The method further includes adding an intent to delete to a delete log. The method further includes receiving a data access request regarding the data element and... International Business Machines

04/12/18 / #20180101329

Strong consistency write threshold

The computing device operates based on a store data request from a requesting entity to dispersed error encode a data segment associated with a data object to generate a set of encoded data slices (EDSs). The computing device selects a write threshold number of EDSs based on a desired consistency... International Business Machines

04/12/18 / #20180101358

Decimal and binary floating point rounding

Arithmetic logic circuitry is provided for performing a floating point arithmetic add/subtract operation on first and second floating point numbers. The method includes: generating a guard digit for the first or second number by transforming the first and second numbers by a compressing function; determining a result depending on the... International Business Machines

04/12/18 / #20180101360

Secured pseudo-random number generator

The present invention provides a method of generating a sequence of pseudo-random numbers which are difficult to predict. The method includes: (i) generating a plurality of candidate pseudo-random numbers by a respectively corresponding plurality of (differently structured) linear feedback shift registers; (ii) generating a “selector number” from one or more... International Business Machines

04/12/18 / #20180101361

Secured pseudo-random number generator

The present invention provides a method of generating a sequence of pseudo-random numbers which are difficult to predict. The method includes: (i) generating a plurality of candidate pseudo-random numbers by a respectively corresponding plurality of (differently structured) linear feedback shift registers; (ii) generating a “selector number” from one or more... International Business Machines

04/12/18 / #20180101363

Locating features in a layered software application

A new feature can be defined for an application. Data pertaining to layer information, service information, feature information and dependency information for the application can be processed and, based on the processing, an identification can be made of a highest layer of a plurality of layers of the application containing... International Business Machines

04/12/18 / #20180101365

Reducing waste areas inside strings

A computer-implemented method is presented for removing overlap character array of a programming language where a part of the character array is used as a value of a string. The computer-implemented method includes, when comparison of a first string and a second string succeeds, modifying the string using a larger... International Business Machines

04/12/18 / #20180101367

Dynamically building mobile applications

A method for dynamically assembling a mobile application includes the steps of: (i) receiving a plurality of artifacts from a programmer; (ii) storing the received plurality of artifacts in an artifacts database; (iii) receiving, from a user, a request for a dynamically assembled mobile application, the request comprising a plurality... International Business Machines

04/12/18 / #20180101368

Reducing call overhead through function splitting

Embodiments disclose a method, computer program product, and system for optimizing computer functions. The embodiment may create a control flow graph from a computer function. The control flow graph may contain an entry block, an exit block, and basic blocks located between the entry block and the exit block. The... International Business Machines

04/12/18 / #20180101369

Modifying execution flow in save-to-return code scenarios

A computer-implemented method includes, in a code transformation system, identifying save-to-return code instructions, function call code instructions, comparison code instructions, and exceptional code instructions. The function call code instructions are associated with the save-to-return code instructions. The comparison code instructions are associated with the save-to-return code instructions. The exceptional code... International Business Machines

Patent Packs
04/12/18 / #20180101373

Operating system update management

Disclosed aspects relate to operating system update management for a shared pool of configurable computing resources having a plurality of logical partitions (LPARs). An operating system update request may be received. A set of original shared portions and a set of original individualized portions may be classified with respect to... International Business Machines

04/12/18 / #20180101374

Upgrade management for a shared pool of configurable computing resources

Disclosed aspects relate to upgrade management for a shared pool of configurable computing resources having a set of logical partition (LPAR) nodes which includes a set of established members. Performance of a live kernel update (LKU) operation may be initiated with respect to a first original LPAR node. Generation of... International Business Machines

04/12/18 / #20180101378

Initialization status of a register employed as a pointer

Initialization status of a register to be used as a pointer to a reference data structure is used to determine how a stub is to be generated to access the reference data structure. The register is one type of pointer configuration to be used to access the reference data structure,... International Business Machines

04/12/18 / #20180101380

Detection of potential need to use a larger data format in performing floating point operations

Detection of whether a result of a floating point operation is safe. Characteristics of the result are examined to determine whether the result is safe or potentially unsafe, as defined by the user. An instruction is provided to facilitate detection of safe or potentially unsafe results.... International Business Machines

04/12/18 / #20180101382

Wait-free process request execution utilizing a dedicated helper thread

One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: receiving a system instruction from the at least one processor to perform an operation on a data structure; collecting, using at least one worker thread from a plurality of worker... International Business Machines

04/12/18 / #20180101386

Restricted instructions in transactional execution

Restricted instructions are prohibited from execution within a transaction. There are classes of instructions that are restricted regardless of type of transaction: constrained or nonconstrained. There are instructions only restricted in constrained transactions, and there are instructions that are selectively restricted for given transactions based on controls specified on instructions... International Business Machines

04/12/18 / #20180101398

Bandwidth control in multi-tenant virtual networks

Machines, systems and methods for managing quality of service (QoS) in a multi-tenant virtualized computing environment, the method comprising: collecting transmission rate statistics associated with data communicated in a virtual network, wherein at least one virtual switch monitors communications initiated by at least a virtual machine (VM) executed on a... International Business Machines

04/12/18 / #20180101403

Tiered model for event-based serverless computing

A computer system, method, and computer readable product are provided for event-based serverless computing with tiered latency. In various embodiments, computer-executable instructions are received along with an indication of an event whose occurrence triggers execution of those instructions within a container on a serverless computing platform. Additionally, the instructions come... International Business Machines

04/12/18 / #20180101406

Task scheduling using improved weighted round robin techniques

Mechanisms are provided for distributing work requests to worker devices. The mechanisms generate a cycle table data structure which segments a set of work request allocations into a plurality of cycles in which, for each cycle, a subset of worker devices, from a set of worker devices, are eligible to... International Business Machines

04/12/18 / #20180101409

Efficient critical thread scheduling for non-privileged thread requests

An operating system interface, responsive to detecting a non-privileged thread request with a scheduling attribute set to a critical setting to request access to at least one privileged core, selectively schedules the non-privileged thread request into a privileged core queue associated with the at least one privileged core only when... International Business Machines

04/12/18 / #20180101410

Management of resources within a computing environment

Resources in a computing environment are managed, for example, by a hardware controller controlling dispatching of resources from one or more pools of resources to be used in execution of threads. The controlling includes conditionally dispatching resources from the pool(s) to one or more low-priority threads of the computing environment... International Business Machines

04/12/18 / #20180101411

Data relocation in global storage cloud environments

Methods and systems for data relocation in global storage cloud environments are provided. A method includes locating a data server near a travel location of a user based on one or more travel plans of the user. The method further includes transferring data of the user from a home data... International Business Machines

04/12/18 / #20180101412

Data relocation in global storage cloud environments

Methods and systems for data relocation in global storage cloud environments are provided. A method includes locating a data server near a travel location of a user based on one or more travel plans of the user. The method further includes transferring data of the user from a home data... International Business Machines

04/12/18 / #20180101414

Processor thread management

Provided are a computer program product, system, and method for managing processor threads of a plurality of processors. In one embodiment, a parameter of performance of the computing system is measured, and the configurations of one or more processor nodes are dynamically adjusted as a function of the measured parameter... International Business Machines

04/12/18 / #20180101415

Measuring utilization of resources in datacenters

For measuring component utilization in a computing system, a server energy utilization reading of a statistical significant number of servers out of a total number of servers located in the datacenter is obtained by measuring, at predetermined intervals, a collective energy consumed by all processing components within each server. The... International Business Machines

Patent Packs
04/12/18 / #20180101417

Detecting deadlocks involving inter-processor interrupts

Creating, maintaining and using a lock dependency graph in a way that includes the following steps: (i) acquiring a first restriction on processor access in a multi-processor computer system; (ii) modeling the first restriction as first locking primitive information; and (iii) storing data corresponding to the first locking primitive information... International Business Machines

04/12/18 / #20180101419

Modifying a device based on an annotated time series of sensor readings

A method, system, and/or computer program product modify a hardware device based on a time series of data. One or more processors standardize a time series of data received from sensors that are monitoring a hardware device. The processor(s) determine a time delta that measures how long a disruption in... International Business Machines

04/12/18 / #20180101420

Modifying a device based on an annotated time series of sensor readings

A computer-implemented method modifies a hardware device based on a time series of data. One or more processors standardize a time series of data received from sensors that are monitoring a hardware device. The processor(s) determine a time delta that measures how long a disruption in the time series lingers... International Business Machines

04/12/18 / #20180101421

Storage and application intercommunication using acpi

Storage system and application intercommunication is provided. A first kernel-mode module determines a first event corresponding to an operational parameter of a first node based, at least in part, on a shared namespace accessible by the first kernel-mode module and a second kernel-mode module. An interrupt is issued based on... International Business Machines

04/12/18 / #20180101426

Root cause analysis

Systems, methods and tools for performing a root cause analysis and improvements to the root cause detection by changing the way analysts and troubleshooters interact with the error reporting files to detect injection points that indicate the root cause of a system error. The systems, methods and tools record the... International Business Machines

04/12/18 / #20180101428

System dump analysis

An example computer implemented method includes determining a fingerprint of the system dump, which identifies a model of the system and a type of the system dump. The method further includes receiving, from a first user device, a request to identify system dumps matching a set of system dump criteria... International Business Machines

04/12/18 / #20180101432

Combining deduplication with locality for efficient and fast storage

A method begins by receiving a storage request to store one or more portions of a data object. The method continues by determining whether the one or more portions are stored within a dispersed storage network memory. When stored, the method continues by determining a retrieval demand for each portion.... International Business Machines

04/12/18 / #20180101433

Temporarily storing dropped and rebuilt slices in a dsn memory

A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and processing circuitry. The computing device issues a set of write requests to a first storage unit (SU) set based on a set of encoded data slices... International Business Machines

04/12/18 / #20180101434

Listing types in a distributed storage system

A method for execution by a dispersed storage network (DSN) begins by identifying a subset of encoded data slices stored in a set of storage units for enhanced access and determining a listing type. The method continues by generating listing slice names for the subset of encoded data slices based... International Business Machines

04/12/18 / #20180101435

Overcoming bottlenecks in partial and traditional rebuild operations

The SU determines to rebuild an encoded data slice (EDS) of a set of EDSs based on a storage error of the EDS and selects combining units to perform receiving of slice representations to enable rebuilding of the EDS. The SU facilitates receiving, by the combining units and/or by the... International Business Machines

04/12/18 / #20180101436

Bundled writes in a distributed storage system

A method for execution by a dispersed storage network (DSN). The method begins by disperse storage error encoding a data object for storage in a set of storage units with mapping to a unique storage unit. The method continues by selecting a storage unit for temporary exclusion, producing a bundled... International Business Machines

04/12/18 / #20180101437

Transitioning to an optimized data storage approach in a dispersed storage network

A method for execution by a computing device includes dispersed storage error encoding a data segment to produce a set of encoded data slices in accordance with an information dispersal algorithm (IDA) width number. Storage of the set of encoded data slices in a set of storage units is maintained.... International Business Machines

04/12/18 / #20180101438

Rebuilding strategy in memory managed multi-site duplication

A method includes identifying encoded data slices in need of rebuilding, where the encoded data slices are of plurality of copies of a set of encoded data slices stored in a plurality of sets of storage units of a plurality of dispersed storage network (DSN) memories. The method further includes... International Business Machines

04/12/18 / #20180101439

Optimizing data storage in a dispersed storage network

A method for execution by a computing device of a dispersed storage network includes dispersed storage error encoding a data segment to produce a set of encoded data slices. Storage of more than a write threshold number of encoded data slices of the set of encoded data slices in a... International Business Machines

04/12/18 / #20180101440

Overcoming bottlenecks in zero information gain (zig) rebuild operations

A storage unit (SU) includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The SU determines to rebuild an encoded data slice (EDS) of a set of... International Business Machines

04/12/18 / #20180101442

Energy conscious mobile device redundancy and recovery

A tool for redundancy and recovery for a mobile device. Responsive to the mobile device unsuccessfully powering up, the tool activates a recovery functionality via a physical reset switch on the mobile device. Responsive to activating the recovery functionality, the tool scavenges for at least one resource to support a... International Business Machines

04/12/18 / #20180101443

Energy conscious mobile device redundancy and recovery

A tool for redundancy and recovery for a mobile device. Responsive to the mobile device unsuccessfully powering up the tool activates a recovery functionality via a physical reset switch on the mobile device. Responsive to activating the recovery functionality, the tool scavenges for at least one resource to support the... International Business Machines

04/12/18 / #20180101444

Checkpoint and restart

A method of performing a checkpoint on a set of connected processors and memories comprises the steps of creating one or more statefiles for one or more of the processors, querying available processing and/or memory resources, allocating data from one or more statefiles to the available resources, compressing the allocated... International Business Machines

04/12/18 / #20180101447

Efficient state tracking for clusters

Exemplary method, system, and computer program product embodiments for efficient state tracking for clusters are provided. In one embodiment, by way of example only, in a distributed shared memory architecture, an asynchronous calculation of deltas and the views is performed while concurrently receiving client requests and concurrently tracking the client... International Business Machines

04/12/18 / #20180101451

Handling failures when synchronizing objects during a write operation

A method for execution by a dispersed storage network (DSN). The method begins by obtaining a data object for synchronized storage within a plurality of storage vaults, identifying a plurality of storage vaults, encoding the data object for each storage vault, initiating storage of data slices for each storage vault... International Business Machines

04/12/18 / #20180101453

Implementing cable failover in multiple cable pci express io interconnections

A method, system and computer program product are provided for implementing cable failover in multiple cable Peripheral Component Interconnect Express (PCIE) IO interconnections to an external IO enclosure. System firmware is provided for implementing health check functions for the PCIE IO interconnections to identify a faulted low byte cable. A... International Business Machines

04/12/18 / #20180101456

Enclosure-encapsulated raid rebuild

A method for recovering data in a redundant array of independent disks (RAID) is disclosed. In one embodiment, such a method includes implementing a RAID in a storage architecture comprising a RAID controller and a storage enclosure containing a set of storage drives belonging to the RAID. The RAID controller... International Business Machines

04/12/18 / #20180101457

Retrying failed write operations in a dispersed storage network

In various examples, a computing device of a dispersed storage network (DSN) receives a store data request including a data object. The computing device identifies a storage unit pool associated with the store data request. The storage unit pool includes a plurality of storage sets, each of the storage sets... International Business Machines

04/12/18 / #20180101463

Boosting the efficiency of static program analysis using configuration tuning

An improved static program analysis procedure is provided by formulating a set of seeding configurations, and selecting a subset of queries posed by the static program analysis procedure. In response to one or more queries of the subset of queries being answered positively under at least one configuration of the... International Business Machines

04/12/18 / #20180101464

Real-time globalization verification on development operations

Technical solutions are described for verifying translatability compliance of a new code for a computer program product includes receiving a notification about a check-in request for the new code, and in response determining whether to verify the translatability compliance of the new code. The method further includes, in response to... International Business Machines

04/12/18 / #20180101467

Association between a test case and source code

The present invention may be a method, a system, and/or a computer program product. An embodiment of the present invention provides a computer-implemented method for associating one or more test cases with one or more source code parts for a test target, or vice versa. The method comprises the followings:... International Business Machines

04/12/18 / #20180101469

Blocking a selected port prior to installation of an application

An installer application implemented in a computational device receives a command to install a test application in the computational device. The installer application determines whether a selected port of a plurality of ports of the computational device is to be blocked prior to installing the test application in the computational... International Business Machines

04/12/18 / #20180101470

System testing using time compression

Provided are techniques for system testing using time compression. A first program and a second program of a workload are executed in accordance with a test clock, wherein the test clock is independent of a computer system clock, and wherein the first program and the second program are to be... International Business Machines

04/12/18 / #20180101471

Performing entropy-based dataflow analysis

Providing dataflow analysis by selecting a plurality of sampling points from a program under examination. A set of respective values is recorded from a corresponding set of memory registers at each of the plurality of sampling points. The set of respective values comprises at least a first set of values... International Business Machines

04/12/18 / #20180101474

Granting exclusive cache access using locality cache coherency state

A cache coherency management facility to reduce latency in granting exclusive access to a cache in certain situations. A node requests exclusive access to a cache line of the cache. The node is in one region of nodes of a plurality of regions of nodes. The one region of nodes... International Business Machines

Social Network Patent Pack
04/12/18 / #20180101476

Counter-based victim selection in a cache memory

A set-associative cache memory includes a bank of counters including a respective one of a plurality of counters for each cache line stored in a plurality of congruence classes of the cache memory. Prior to receiving a memory access request that maps to a particular congruence class of the cache... International Business Machines

04/12/18 / #20180101478

Counter-based victim selection in a cache memory

In one embodiment, a set-associative cache memory has a plurality of congruence classes each including multiple entries for storing cache lines of data. The cache memory includes a bank of counters, which includes a respective one of a plurality of counters for each cache line stored in the plurality of... International Business Machines

04/12/18 / #20180101491

Hdmi devices and methods with stacking support

Embodiments for managing High-Definition Multimedia Interface (HDMI) data are provided. HDMI data is received at an HDMI connector of an HDMI device. The HDMI data received at the HDMI connector is transmitted to another HDMI connector of the HDMI device. The transmission of the HDMI data received at the HDMI... International Business Machines

04/12/18 / #20180101499

Hdmi devices and methods with stacking support

Embodiments for managing High-Definition Multimedia Interface (HDMI) data, such as an HDMI device, are provided. The HDMI device includes a body, first and second HDMI connectors coupled to the body, and an electronic assembly coupled to the body. The electronic assembly is configured to operate in a first mode and... International Business Machines

04/12/18 / #20180101511

Qr code loading of form elements

Embodiments for facilitating form entry by one or more processors. The form is initialized by recognizing template data using a Quick Response (QR) code scanned by a user device. The form is populated using user data obtained from the user device.... International Business Machines

04/12/18 / #20180101514

Use of temporary optimized settings to reduce cycle time of automatically created spreadsheets

Aspects of the present invention provide a solution for reducing cycle time of automatically created spreadsheets. Specifically, an embodiment of the present invention provides a way to create a spreadsheet from data that is in a native format more quickly and/or efficiently. To do so, the invention accesses a control... International Business Machines

04/12/18 / #20180101523

Optimized caching based on historical production patterns for catalogs

A method, system and computer readable medium that predict times where cost of catalog caching is not efficient and deactivating catalog caching for that catalog during the predicted times. More specifically, an optimized catalog caching operation conducts historical analysis on catalog usage via records such as resource measurement facility (RMF)... International Business Machines

04/12/18 / #20180101538

Rule generation in a data governance framework

The invention relates to computer-implemented method for supplementing a data governance framework with one or more new data governance technical rules. The method comprises providing a plurality of expressions and a first mapping. The expressions assign natural language patterns to technical language patterns. The first mapping maps first terms to... International Business Machines

04/12/18 / #20180101539

Reducing read operations and branches in file system policy checks

A method to identify data elements conforming to a policy includes receiving a request to identify data elements in an input set of data elements that conform to one or more requested policies. According to the method, policy output information describing data elements that conform to a requested policy are... International Business Machines

04/12/18 / #20180101550

Real time object description service integrated with knowledge center on augmented reality (ar) and virtual reality (vr) devices

In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to obtain an image of an object viewed by a user... International Business Machines

Patent Packs
04/12/18 / #20180101555

Reorganizing a data table to improve analytical database performance

Reorganizing a data table to improve analytical database performance is presented. Attribute value information for data blocks of the data table is determined. One or more queries having respective query predicates involving the attribute may be received and processed. Data blocks having attribute value information matching a query predicate are... International Business Machines

04/12/18 / #20180101556

Optimizing space management of tablespaces in database systems

A database is identified, wherein the database has two or more tablespaces. A local partition and a global partition for each tablespace of the two or more tablespaces is created, wherein the created two or more global partitions are included in a global storage pool. A request to move an... International Business Machines

04/12/18 / #20180101558

Log-shipping data replication with early log record fetching

Techniques for data replication from a primary system to a standby system. A first buffer portion of a transaction log buffer is allocated to a first transaction at a primary system. Upon determining that the first buffer portion is fully formed, before the log data is written to the storage... International Business Machines

04/12/18 / #20180101560

Establishing overlay trust consensus for blockchain trust validation system

The system, method, and computer program product described herein provides a built-in feedback mechanism for a blockchain to sanction validator nodes that consistently “vote” in a manner that does not match the ultimate consensus. The method includes receiving a vote on whether to add a transaction to the blockchain, comparing... International Business Machines

04/12/18 / #20180101567

Query optimization in hybrid dbms

A mechanism is provided for generating statistical information for query optimization in a data processing system. The mechanism comprises a first database engine maintaining a current first dataset currently being stored, a second database engine maintaining a second dataset. The second dataset is generated from previous first datasets or from... International Business Machines

04/12/18 / #20180101569

Efficient analysis of distinct aggregations

Embodiments relate to aggregation operations. More specifically, embodiments relate to translating a query involving a distinct aggregate(s) into a query that does not involve a distinct aggregate. The translation involves a transformation effectively rewriting the original query containing the distinct aggregate including removal of the distinct aggregate from the query.... International Business Machines

04/12/18 / #20180101577

Adapting an application based on mood and biometrics

A method for modifying an application behavior based on a plurality of user specific data is provided. The method may include receiving a plurality of user specific data. The method may also include storing the received plurality of user specific data in a database. The method may further include determining... International Business Machines

04/12/18 / #20180101579

Adapting an application based on mood and biometrics

A method for modifying an application behavior based on a plurality of user specific data is provided. The method may include receiving a plurality of user specific data. The method may also include storing the received plurality of user specific data in a database. The method may further include determining... International Business Machines

04/12/18 / #20180101583

Technology for extensible in-memory computing

A user-defined function (UDF) is received in a central Computer System, which causes registration of the UDF and distributes the UDF to a cluster of computer system nodes configured for performing, in volatile memory of the nodes, extract-transform-load processing of data cached in the volatile memory of the nodes. First... International Business Machines

04/12/18 / #20180101587

Replication of data objects from a source server to a target server

Data objects are replicated from a source storage managed by a source server to a target storage managed by a target server. A source list is built of objects at the source server to replicate to the target server. The target server is queried to obtain a target list of... International Business Machines

04/12/18 / #20180101588

Replication of data objects from a source server to a target server

Data objects are replicated from a source storage managed by a source server to a target storage managed by a target server. A source list is built of objects at the source server to replicate to the target server. The target server is queried to obtain a target list of... International Business Machines

04/12/18 / #20180101590

Message management in a social networking environment

Disclosed aspects relate to message management utilizing a social networking environment. A set of message data may be detected in the social networking environment. A set of dynamic event data related to a dynamic event may be ingested. A set of inference data related to the dynamic event may be... International Business Machines

04/12/18 / #20180101592

Bidirectional integration of information between a microblog and a data repository

Arrangements described herein relate to collaborative environments and, more particularly, to use of a microblog to enhance communication in an organization. The present arrangements can include receiving from a first user a first microblog entry into a microblog, identifying at least one keyword associated with the first microblog entry, and... International Business Machines

04/12/18 / #20180101593

Bidirectional integration of information between a microblog and a data repository

Arrangements described herein relate to collaborative environments and, more particularly, to use of a microblog to enhance communication in an organization. The present arrangements can include receiving from a first user a first microblog entry into a microblog, identifying at least one keyword associated with the first microblog entry, and... International Business Machines

04/12/18 / #20180101595

Message management in a social networking environment

Disclosed aspects relate to message management utilizing a social networking environment. A set of message data may be detected in the social networking environment. A set of dynamic event data related to a dynamic event may be ingested. A set of inference data related to the dynamic event may be... International Business Machines

04/12/18 / #20180101596

Deriving and interpreting users collective data asset use across analytic software systems

One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: receiving at least one heterogeneous system log from each of a plurality of systems, wherein each of the heterogeneous system logs comprises events corresponding to activities occurring within its corresponding... International Business Machines

04/12/18 / #20180101598

Personalized approach to handling hypotheticals in text

Mechanisms receive natural language content and analyze the natural language content to generate a parse tree data structure. The mechanisms process the parse tree data structure to identify one or more instances of candidate hypothetical spans in the natural language content. Hypothetical spans are terms or phrases indicative of a... International Business Machines

04/12/18 / #20180101601

Providing answers to questions using logical synthesis of candidate answers

A method, system and computer program product for generating answers to questions. In one embodiment, the method comprises receiving an input query, decomposing the input query into a plurality of different subqueries, and conducting a search in one or more data sources to identify at least one candidate answer to... International Business Machines

04/12/18 / #20180101602

Analogy outcome determination

Embodiments relate to a system, program product, and method for use with an intelligent computer platform to decipher analogical phrases. A phrase is compared to an analogy classifier database in order to identify a match between the analogical pattern and an analogy entry. If a match is identified, generating an... International Business Machines

04/12/18 / #20180101603

Analogic pattern determination

Embodiments relate to a system, program product, and method for use with an intelligent computer platform to decipher analogical phrases. An analogy list is obtained, each analogy within the analogy list having a known meaning, and receiving an analogy phrase. A verb is identified within the phrase and a verb... International Business Machines

04/12/18 / #20180101613

Distance-based social message pruning

Correspondences in a social networking system are analyzed to determine at least one topic. An activity stream with the at least one topic is analyzed. A target audience for the activity steam is identified. The activity stream is analyzed according to a uniqueness and a relationship criteria to form an... International Business Machines

04/12/18 / #20180101619

User-specified user application data sharing

An indication initiated by a user within a first local user application that specifies user-selected data sharable by the first local user application is received at an operating system of a first computing device used by the user. A determination is made as to whether any other user applications share... International Business Machines

04/12/18 / #20180101625

Layout of large block synthesis blocks in integrated circuits

Generating a layout of an integrated circuit chip area from a description of an integrated circuit (IC). The description includes a register-transfer-level (RTL) design. The RTL design is partitioned in large blocks for synthesis of large block synthesis (LBS) blocks. The description of the IC further includes a floorplan for... International Business Machines

04/12/18 / #20180101626

Layout of large block synthesis blocks in integrated circuits

Generating a layout of an integrated circuit chip area from a description of an integrated circuit (IC). The description includes a register-transfer-level (RTL) design. The RTL design is partitioned in large blocks for synthesis of large block synthesis (LBS) blocks. The description of the IC further includes a floorplan for... International Business Machines

04/12/18 / #20180101630

Process-metrology reproducibility bands for lithographic photomasks

A photomask lithography simulation model is created for making a semiconductor chip. Poor metrology is filtered and removed from a contour-specific metrology dataset to improve performance of the photomask. Filtering is performed by the application of a weighting scheme.... International Business Machines

04/12/18 / #20180101636

Pessimism reduction in hierarchical blockage aggressors using estimated resistor and capacitor values

A method, system, and computer product for performing a coupled noise analysis in an integrated circuit (IC) design include copying one or more victim circuit sections of a victim circuit in the IC, generating a blockage circuit section that represents a blockage aggressor circuit in the IC, using the copied... International Business Machines

04/12/18 / #20180101638

Physically aware test patterns in semiconductor fabrication

A method for fabricating a circuit comprises identifying a target on the circuit with a transitional sensitivity, determining a test pattern that stresses the target, generating a verification model at the hierarchy of the target, creating a pattern and translating the pattern into a verification assertion, running the verification with... International Business Machines

04/12/18 / #20180101652

Medical risk factors evaluation

A method, apparatus and computer program product for using machine learning to evaluate medical risks are described. A graphical user interface is provided for entering a set of patient symptoms for a first patient. A query is sent to a medical system containing the set of patient symptoms. A set... International Business Machines

04/12/18 / #20180101657

Medical risk factors evaluation

A method, apparatus and computer program product for using a machine learning system to evaluate medical risks are described. A set of symptoms and a set of causal factors is used by the machine learning system to learn a set of association link formulas. Each of the association link formulas... International Business Machines

04/12/18 / #20180101663

Efficient retrosynthesis analysis

Techniques for efficient retrosynthesis analysis are provided. A computer-implemented method for determining whether a target compound can be synthesized using known pathways for similar compounds includes receiving, by a processor, target compound data including a target compound. The method further includes obtaining, by the processor, a similar compound to the... International Business Machines

Patent Packs
04/12/18 / #20180101679

Detection of key logging activity

Detection of a key logger includes determining a count of keystrokes that occur during each of a plurality of time windows. Write activity that occurs during each of the plurality of time windows can be measured. The number of key strokes occurring in window is compared with the write activity... International Business Machines

04/12/18 / #20180101686

Reducing decryption latency for encryption processing

In a compression processing storage system, using a pool of encryption processing cores, the encryption processing cores are assigned to process either encryption operations, decryption operations, and decryption and encryption operations, that are scheduled for processing. A maximum number of the encryption processing cores are set for processing only the... International Business Machines

04/12/18 / #20180101689

Customer load of field programmable gate arrays

Customer content is securely loaded on a field programmable gate array (FPGA) located on a secure cryptography card. The customer content is loaded such that it may not be extracted. A customer obtains a secure cryptography card that includes a field programmable gate array and a master key generated by... International Business Machines

04/12/18 / #20180101690

Dynamically constructed capability for enforcing object access order

Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A capability is dynamically constructed when the capability is needed. After the capability is used to access an object, a new capability is... International Business Machines

04/12/18 / #20180101692

Protecting sensitive data in software products and in generating core dumps

Sensitive data is protected in a software product. A source file of the software product is compiled to generate an object file, in which the source file includes at least one piece of sensitive data marked with a specific identifier. The object file has a secure data section for saving... International Business Machines

04/12/18 / #20180101727

Field verification of documents

A system, method and computer program product to validate documents is provided. A processor receives an image of a document. The processor identifies a plurality of fixed contents of the document. The processor identifies a plurality of field contents of the document. The processor determines a type of the document... International Business Machines

04/12/18 / #20180101764

Transfer of an acoustic knowledge to a neural network

A method for transferring acoustic knowledge of a trained acoustic model (AM) to a neural network (NN) includes reading, into memory, the NN and the AM, the AM being trained with target domain data, and a set of training data including a set of phoneme data, the set of training... International Business Machines

04/12/18 / #20180101772

Electromagnetic noise signal based predictive analytics

In an approach to predicting user touch events, one or more computer processors receive a detected electromagnetic noise signal of an object. The one or more computer processors compare the detected electromagnetic noise signal of the object to one or more stored electromagnetic noise signals associated with one or more... International Business Machines

04/12/18 / #20180101778

Electromagnetic noise signal based predictive analytics

In an approach to predicting user touch events, one or more computer processors receive a detected electromagnetic noise signal of an object. The one or more computer processors compare the detected electromagnetic noise signal of the object to one or more stored electromagnetic noise signals associated with one or more... International Business Machines

04/12/18 / #20180101779

System, method and computer program product for detecting policy violations

A policy violation detection computer-implemented method, system, and computer program product, includes extracting a policy activity from a policy, the policy activity including an actor in the policy, an object of the policy, an action of the policy, and policy scope metadata, capturing a transaction by a user including metadata... International Business Machines

04/12/18 / #20180101780

Machine learning of analogic patterns

Embodiments relate to a system, program product, and method for use with an intelligent computer platform to decipher analogical phrases. A phrase is parsed into a set of terms to reveal an analogical pattern. The set of terms are categorized according to syntactic placement and each term is placed into... International Business Machines

04/12/18 / #20180101781

Creating a uniform resource identifier structure to represent resources

An approach is described of structuring resources among a plurality of resources in a system architecture. A method pertaining to such approach may include accessing a knowledge base including attributes relevant to the plurality of resources. The attributes of the knowledge base may include concepts and logical relationships associated with... International Business Machines

04/12/18 / #20180101785

High fidelity threshold detection of single microwave photons using a quantum non-demolition photon detector

A technique relates to a microwave detection device. A quantum non-demolition microwave photon detector is connected to a quadrature microwave hybrid coupler connected. A dispersive nonlinear element is coupled to the quadrature microwave hybrid coupler.... International Business Machines

04/12/18 / #20180101787

Quantum nondemolition microwave photon counter based on the cross-kerr nonlinearity of a josephson junction embedded in a superconducting circuit

A technique relates to a microwave device. A pump resonator, at a first pump resonator end, is connected to both a dispersive nonlinear element and a first stub. The pump resonator, at a second pump resonator end, is capacitively coupled to a pump port, where the first stub is terminated... International Business Machines

04/12/18 / #20180101790

Parameter version vectors used for deterministic replay of distributed execution of workload computations

A method includes storing parameter versions utilized by learner instances in each of two or more epochs in a parameter receiving buffer of a parameter server, the learner instances performing distributed execution of workload computations of a machine learning algorithm. The method also includes creating a parameter roster in the... International Business Machines

04/12/18 / #20180101792

Information processing apparatus, program, and information processing method

Various embodiments train a prediction model for predicting a label to be allocated to a prediction target explanatory variable set. In one embodiment, one or more sets of training data are acquired. Each of the one or more sets of training data includes at least one set of explanatory variables... International Business Machines

04/12/18 / #20180101794

Method and system for creating mapping between business models

Embodiments of the present invention disclose a method, computer program product, and system for updating business model mappings. A computer receives a plurality of business models and a plurality of model mappings, wherein the plurality of model mappings show how elements of one of the plurality of business models relates... International Business Machines

04/12/18 / #20180101804

Impact identification of new product

One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: identifying a new product launch having a predetermined time frame; identifying at least one existing maintenance contract expiring within the predetermined time frame; generating at least one machine learning model,... International Business Machines

04/12/18 / #20180101809

Real-time update of a mobile workforce schedule

A method, apparatus and product for real-time update of a Mobile Workforce Scheduling Problem (MWSP), which comprises: agents and tasks to be performed by the agents, wherein a schedule which solves the mobile workforce scheduling problem exists and is being implemented by the agents. The method comprising: monitoring real time... International Business Machines

04/12/18 / #20180101817

Methods and systems for multiple drone delivery system

Embodiments for delivering goods to customers by a processor are described. An item is selected to be delivered to a delivery point. The selected item is loaded onto a first drone. The delivery point is scanned with a second drone. Based on the scanning of the delivery point, the delivery... International Business Machines

Social Network Patent Pack
04/12/18 / #20180101855

Automated reward mechanism for graphic content selection

Aspects automatic provide compensation in response to graphic item selection. in response to a selection by a viewing user of a graphic item visible within an image published on an interactive web-based service, aspects analyze text content posted on the interactive web-based service in association with the published image to... International Business Machines

04/12/18 / #20180101859

Method and system for determining optimal incentives for customers to reduce queueing wait time with wait-time-dependent incentive choice probabilities

A method is provided for determining a number of current customers in a queue for a first event; estimating a current wait time of the queue for a new customer based at least on the number of current customers in the queue; predicting a future wait time of the queue... International Business Machines

04/12/18 / #20180101860

Automated offer generation responsive to behavior attribute

Programmable device processors are configured by aspects of the present invention to automatically generate item offers in response to behavior attributes determined for a person receiving the offer. Said configured processor determines current personality traits for the person from analysis of activity data, identifies geographically proximate transactional channels available for... International Business Machines

04/12/18 / #20180101873

Elevator multimedia information display

Example embodiments of the present disclosure provide methods, a computer system and a computer program product for multimedia information display in an elevator. According to an embodiment of the method, moving status information of an elevator is obtained. The moving status information comprises at least a source floor information indicating... International Business Machines

04/12/18 / #20180101886

User actions in a physical space directing presentation of customized virtual environment

A system and method for adjusting content in a virtual environment based on dwell time in physical spaces is disclosed. The method includes defining, by a zone-to-virtual content mapping module, a zone in a physical space and tagging the defined zone with descriptive information. The method may also include detecting,... International Business Machines

04/12/18 / #20180101887

Offering personalized and interactive decision support based on learned model to predict preferences from traits

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement a personalized interactive decision support system. A personalized... International Business Machines

04/12/18 / #20180101888

Interactive decision support based on preferences derived from user-generated content sources

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement a personalized interactive decision support system. A customer... International Business Machines

04/12/18 / #20180101891

Approving group purchase requests

Approving a group purchase request for a group of articles. A sub-group of articles is selected, wherein a unique article approval index is assigned to each of the articles and a highest article approval index is determined among the unique article approval indexes of the articles of the group, wherein... International Business Machines

04/12/18 / #20180101935

Lens distortion correction using a neurosynaptic circuit

One or more embodiments provide a neurosynaptic circuit that includes multiple neurosynaptic core circuits that: perform image sharpening by converting a source image to a sharpened destination image by: taking as input a sequence of image frames of a video with one or more channels per frame, and representing the... International Business Machines

04/12/18 / #20180101971

Rebuilding images based on historical image data

A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image... International Business Machines

04/12/18 / #20180101973

Applying an image overlay to an image based on relationship of the people identified in the image

Applying an image overlay to an image is provided. A relationship type and a relationship strength between two or more people identified in a first image is determined based on profile data corresponding to each of the two or more people and a set of data elements determined to be... International Business Machines

04/12/18 / #20180101992

Overlay for camera field of vision

One or more computer processors generate an augmented reality overlay for camera field of vision based on a perspective of a display device. The one or more processors generate an overlay image that represents a field of view of an imaging device based at least on an orientation of the... International Business Machines

04/12/18 / #20180102063

Comprehension in rapid serial visual presentation

Computer-implemented methods are provided. A method includes determining, by a processor, a cognitive load of a plurality of words included in a rapid serial visual presentation by using at least one metric. The cognitive load is determined on any of a word level and a word sequence level. The method... International Business Machines

04/12/18 / #20180102124

Reducing computer fan noise

A noise source emits an acoustic noise wave with a noise frequency corresponding to an attribute of a control-status signal associated with the noise source. A method to reduce the noise comprises generating, based on the noise frequency corresponding to the attribute, an anti-noise signal having the noise frequency. The... International Business Machines

04/12/18 / #20180102138

Tape head having a portion of a bearing surface slot that defines a skiving edge

An apparatus according to one embodiment includes a substrate, and a thin film layer on the substrate having transducers therein. A portion of a bearing surface slot extends along the substrate, the portion of the bearing surface slot defining a skiving edge. A length of a tape bearing surface between... International Business Machines

04/12/18 / #20180102140

Detecting media defects

A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a controller to cause the controller to: monitor, by the controller, a resistance value of each of a plurality of detector structures positioned in an array,... International Business Machines

04/12/18 / #20180102141

Detecting media defects

A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith. The computer readable storage medium is not a transitory signal per se. Moreover, the program instructions readable and/or executable by a processor to cause the processor to perform a method which... International Business Machines

04/12/18 / #20180102173

Buffered automated flash controller connected directly to processor memory bus

A mechanism is provided for buffer linking in a buffered solid state drive controller. Responsive to the buffered flash memory module receiving from a memory bus of a processor a memory command specifying a write operation, the mechanism initializes a first memory buffer in the buffered flash memory module. The... International Business Machines

04/12/18 / #20180102176

Delaying programming requests in flash memory

Embodiments herein describe a memory system that queues program requests to a block of flash memory until a predefined threshold is reached. That is, instead of performing program requests to write data into the block as the requests are received, the memory system queues the requests until the threshold is... International Business Machines

04/12/18 / #20180102179

One time programmable read-only memory (rom) in soi cmos

A method of operating a programmable read-only-memory (ROM) cell unit having a series coupled CMOS NFET and CMOS PFET device formed on a semiconductor layer located on top of a buried dielectric layer, the buried dielectric layer formed on top of a cell substrate, and each NFET and PFET device... International Business Machines

Social Network Patent Pack
04/12/18 / #20180102207

Patterning magnetic films using self-stop electro-etching

A semiconductor structure includes a substrate and a patterned magnetic feature disposed over a top surface of the substrate. The patterned magnetic feature is a magnetic material, and has undercut sidewalls providing a self-stop for electro-etching of the magnetic material. The semiconductor structure may form a closed-yoke inductor or a... International Business Machines

04/12/18 / #20180102277

Different shallow trench isolation fill in fin and non-fin regions of finfet

A fin field effect transistor (finFET) and a method of fabricating the finFET. The method includes forming one or more fins above a substrate in a channel region, depositing a first insulating material conformally on the one or more fins and the substrate, and depositing a second insulating material over... International Business Machines

04/12/18 / #20180102290

Stress memorization technique for strain coupling enhancement in bulk finfet device

A method for forming strained fins includes etching trenches in a bulk substrate to form fins, filling the trenches with a dielectric fill and recessing the dielectric fill into the trenches to form shallow trench isolation regions. The fins are etched above the shallow trench isolation regions to form a... International Business Machines

04/12/18 / #20180102294

Integrated circuit with replacement gate stacks and forming same

A first aspect of the invention provides for a method including: forming an interfacial layer in a first opening in a pFET region and a second opening in an nFET region, each opening being in a dielectric layer in the pFET region and the nFET region; forming a high-k layer... International Business Machines

04/12/18 / #20180102295

Semiconductor device structure with 110-pfet and 111-nfet current flow direction

A FinFET comprises a hybrid substrate having a top wafer of (100) silicon, a handle wafer of (110) silicon, and a buried oxide layer between the top wafer and the handle wafer; a first set of fins disposed in the top wafer and oriented in a <110> direction of the... International Business Machines

04/12/18 / #20180102317

Interconnect structures with fully aligned vias

A structure having fully aligned via connecting metal lines on different Mx levels. The structure may include a first metal line and a second metal line in a first ILD, a cap covering the first ILD, the second metal line and a portion of the first metal line, a second... International Business Machines

04/12/18 / #20180102320

Self-formed liner for interconnect structures

An interconnect dielectric material having an opening formed therein is first provided. A surface nitridation process is then performed to form a nitridized dielectric surface layer within the interconnect dielectric material. A metal layer is formed on the nitridized dielectric surface layer and then an anneal is performed to form... International Business Machines

04/12/18 / #20180102329

Tamper-proof electronic packages with stressed glass component substrate(s)

Tamper-proof electronic packages and fabrication methods are provided which include a glass substrate. The glass substrate is stressed glass with a compressively-stressed surface layer. Further, one or more electronic components are secured to the glass substrate within a secure volume of the tamper-proof electronic package. In operation, the glass substrate... International Business Machines

04/12/18 / #20180102335

Mixed ubm and mixed pitch on a single die

Embodiments are directed to a method of forming a semiconductor chip package and resulting structures having a mixed under-bump metallization (UBM) size and pitch on a single die. A first set of UBMs having a first total plateable surface area is formed on a first region of a die. A... International Business Machines

04/12/18 / #20180102336

Mixed ubm and mixed pitch on a single die

Embodiments are directed to a method of forming a semiconductor chip package and resulting structures having a mixed under-bump metallization (UBM) size and pitch on a single die. A first set of UBMs having a first total plateable surface area is formed on a first region of a die. A... International Business Machines

04/12/18 / #20180102337

Conductive pillar shaped for solder confinement

A method of fabricating a pillar-type connection includes forming a second conductive layer on a first conductive layer to define a conductive pillar that includes a non-planar top surface defining a recess aligned with a hollow core of the first conductive layer.... International Business Machines

04/12/18 / #20180102359

High density nanosheet diodes

Embodiments are directed to a method for forming a semiconductor structure by depositing a stack of alternating layers of two materials over a substrate and defining field-effect transistor (FET) and diode regions. The method further includes depositing a mask, where the mask covers only the FET region while leaving the... International Business Machines

04/12/18 / #20180102362

Finfets with controllable and adjustable channel doping

A method of forming features of a finFET structure includes forming fins on a surface of a substrate. A first liner is formed around each fin and a shallow trench isolation region is formed around each fin. A dopant layer is implanted in each fin. A portion of the shallow... International Business Machines

04/12/18 / #20180102367

Mirror contact capacitor

A semiconductor structure and a method for fabricating the same. The semiconductor structure includes a substrate and a bonding layer in contact with a top surface of the substrate. At least one transistor contacts the bonding layer. The transistor includes at least one gate structure disposed on and in contact... International Business Machines

04/12/18 / #20180102369

Selective epitaxy growth for semiconductor devices with fin field-effect transistors (finfet)

A method for forming a Fin field-effect transistor (FinFET) semiconductor structure includes performing an angled ion implantation process at a predetermined angle on a first sidewall of a fin to cause damage to the first sidewall of the fin. The damage caused to the first sidewall of the fin is... International Business Machines

04/12/18 / #20180102432

Vertical vacuum channel transistor

A method of fabricating features of a vertical transistor include performing a first etch process to form a first portion of a fin in a substrate; depositing a spacer material on sidewalls of the first portion of the fin; performing a second etch process using the spacer material as a... International Business Machines

04/12/18 / #20180102433

Vertical vacuum channel transistor

A method of fabricating features of a vertical transistor include performing a first etch process to form a first portion of a fin in a substrate; depositing a spacer material on sidewalls of the first portion of the fin; performing a second etch process using the spacer material as a... International Business Machines

04/12/18 / #20180102438

Quantum capacitance graphene varactors and fabrication methods

A plate varactor includes a dielectric substrate and a first electrode embedded in a surface of the substrate. A capacitor dielectric layer is disposed over the first electrode, and a layer of graphene is formed over the dielectric layer to contribute a quantum capacitance component to the dielectric layer. An... International Business Machines

04/12/18 / #20180102450

Thin film photovoltaic cell with back contacts

Photovoltaic cells, photovoltaic devices, and methods of fabrication are provided. The photovoltaic cells include a transparent substrate to allow light to enter the photovoltaic cell through the substrate, and a light absorption layer associated with the substrate. The light absorption layer has opposite first and second surfaces, with the first... International Business Machines

04/12/18 / #20180102455

Solution-phase inclusion of silver into chalcogenide semiconductor inks

Silver-containing absorbers for photovoltaic devices and techniques for fabrication thereof are provided. In one aspect, a method of forming an ink includes: mixing a silver halide and a solvent to form a first solution; mixing a metal, sulfur, and the solvent to form a second solution; combining the first solution... International Business Machines

04/12/18 / #20180102481

Organic semiconductors with dithienofuran core monomers

An organic semiconducting donor-acceptor (D-A) small molecule, as well as a semiconductor device that can incorporate the D-A small molecule, are disclosed. The D-A small molecule can have electron deficient substituents and R group substituents that can be C1-C20 linear alkyl chains, C2-C24 branched alkyl chains, hydrogen atoms, etc. The... International Business Machines

04/12/18 / #20180102482

Dielectric treatments for carbon nanotube devices

Dielectric treatments for carbon nanotube devices are provided. In one aspect, a method for forming a carbon nanotube-based device is provided. The method includes: providing at least one carbon nanotube disposed on a first dielectric; removing contaminants from surfaces of the first dielectric; and depositing a second dielectric onto the... International Business Machines

04/12/18 / #20180102689

Traffic barrier with integrated turbine

An energy harvesting system includes a barrier disposed adjacent to a first traffic lane, the barrier comprising an aperture and a turbine disposed within the aperture. The turbine may be configured to generate electrical power in response to airflow through the aperture and in response to horizontal airflow that is... International Business Machines

04/12/18 / #20180102690

Traffic barrier with integrated turbine

An energy harvesting system includes a barrier disposed adjacent to a first traffic lane, the barrier comprising an aperture and a turbine disposed within the aperture. The turbine may be configured to generate electrical power in response to airflow through the aperture and in response to horizontal airflow that is... International Business Machines

04/12/18 / #20180102738

Tuning lc tank circuits

A method for controlling a semiconductor circuit, including forming an inductor and a capacitor on a substrate, which are inductively coupled to one another. The inductor has an inductance value while the capacitor has a capacitance value. The inductor and capacitor make up an oscillator circuit with two terminals. Eddy... International Business Machines

04/12/18 / #20180102787

Character conversion

Methods, devices, and computer programs are provided for character conversion. An original file is compressed, for instance, by a source or target device, to obtain a compressed file. Then, characters in the compressed file are converted from a source code page to a target code page to obtain a converted... International Business Machines

04/12/18 / #20180102874

Storage unit (su) report cards

A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and... International Business Machines

04/12/18 / #20180102899

Authenticating features of virtual server system

Technical solutions are described for authenticating a hosting system prior to securely deploying a shrouded virtual server. An example method includes receiving, by a hypervisor, a request for a public certificate, from a client device that requested the virtual server, and sending the public certificate of the hosting system that... International Business Machines

04/12/18 / #20180102901

Validating internet of things device firmware using a peer-to-peer registry

A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network using a peer-to-peer registry. Each device in an IoT is registered anonymously by utilizing a unique device identifier and a firmware level in a peer-to-peer registry. Communication rules are provided by the peer-to-peer... International Business Machines

04/12/18 / #20180102917

Bridging between differing communication buses

Communication between one communication bus having one set of characteristics and another communication bus having another set of characteristics is facilitated by a bridge coupling the two communication buses. The bridge includes a scoreboard to manage data communicated between the buses. In one particular example, the one communication bus is... International Business Machines

Social Network Patent Pack
04/12/18 / #20180102920

Virtual gateways and implicit routing in distributed overlay virtual environments

A method includes receiving a packet from a first virtual machine (VM) in a distributed overlay virtual Ethernet (DOVE) network. A first virtual switch appends the packet with a tunnel header that is addressed for a second virtual switch. The first virtual switch acts as a virtual default gateway based... International Business Machines

04/12/18 / #20180102946

Operator fusion management in a stream computing environment

Disclosed aspects relate to operator fusion management in a stream computing environment. A topology model which indicates a set of stream operators, a set of connections between the set of stream operators, and a set of stream operator attributes for the set of stream operators may be established. Based on... International Business Machines

04/12/18 / #20180102953

Energy consumption as a measure of utilization and work characterization in a system

For measuring component utilization in a system having a plurality of subsystems, an energy consumption of each of the plurality of subsystems is monitored whether or not each subsystem performs at least a portion of an overall computation. Respective workloads are classified based upon an energy consumption pattern associated with... International Business Machines

04/12/18 / #20180102957

Generating production server load activity for a test server

Replicating on a test server a production load of a production server. A plurality of messages representing the production load on the production server can be received from the production server. Each message can correspond to a respective client request received from a respective client. Responsive to receiving each message,... International Business Machines

04/12/18 / #20180102966

Data processing lock signal transmission

In accordance with one aspect of the present description, a node of the distributed computing system has multiple communication paths to a data processing resource lock which controls access to shared resources, for example. In this manner, at least one redundant communication path is provided between a node and a... International Business Machines

04/12/18 / #20180102973

System detection and flow control

A system detection method and apparatus. Throughput and response time of a system are acquired. Throughput reflects the number of requests processed by the system that are received from outside the system. The response time reflects time required to process requests from outside the system. A system performance characteristic parameter... International Business Machines

04/12/18 / #20180102984

Quota management protocol for shared computing systems

Techniques are provided for automated employment of respective quota managers for framework instances, where the respective quota managers can negotiate amongst themselves to manage usage of a resource of a shared computing system in relation to a quota for the resource for a tenant of the shared computing system. This... International Business Machines

04/12/18 / #20180102986

Inquiry-based adaptive prediction

Predicting future utilization of a resource. The predicting future utilization of a resource may include receiving inquiries for a potential future utilization of the resource for different future points in time, recording time-based patterns of the received inquiries, recording a historic actual utilization value of the resource, and determining a... International Business Machines

04/12/18 / #20180102994

Message delivery management based on device accessibility

A processor may receive an electronic message for delivery to a user on a first device. The electronic message may have a first format. The processor may identify one or more features of the first format of the electronic message. The processor may determine whether the one or more features... International Business Machines

04/12/18 / #20180102995

Message delivery management based on device accessibility

A processor may receive an electronic message sent to a first device associated with a user. The electronic message may have a first format. The processor may receive usage information about the first device and a second device associated with the user. The processor may determine whether to send the... International Business Machines

04/12/18 / #20180103003

Visibility management enhancement for messaging systems and online social networks

A method, a processing device, and a computer program product are provided. An initial state of a message is captured by at least one processing device. At least one external reference from the message is extracted by the least one processing device. The at least one external reference is analyzed... International Business Machines

04/12/18 / #20180103012

Network security processing

A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource and a duplicate of request for the resource are forwarded to a first proxy server and a second proxy server, respectively. A first output including the... International Business Machines

04/12/18 / #20180103021

Ensuring the credibility of devices for global attestation

Embodiments disclose systems, methods, and computer program products to perform an operation for adapting a set of devices used to authenticate a client device. The operation generally includes determining a plurality of broker devices available for attesting a location of a client device, and determining, from the available broker devices,... International Business Machines

04/12/18 / #20180103023

Validating internet of things device firmware

A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to establish a session to validate IoT device firmware levels between the first device and the second device on a network.... International Business Machines

04/12/18 / #20180103035

Network authentication of a geo-fenced volume

Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a Global Positioning System (GPS) including a range of latitudes, a range of longitudes and a range of altitudes. A resource within the geo-fenced... International Business Machines

04/12/18 / #20180103046

Protecting from unintentional malware download

Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application. A newly generated secure virtual machine is obtained from one of a network server or a cloud computing service. The one of the email... International Business Machines

04/12/18 / #20180103048

System conversion in a networked computing environment

Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk... International Business Machines

04/12/18 / #20180103055

Security-risk plugin to help targeted users interact with web pages and applications

The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual... International Business Machines

04/12/18 / #20180103067

Context-based cloud security assurance system

A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a... International Business Machines

04/12/18 / #20180103077

Method and system for dynamic proximity-based media sharing

Disclosed embodiments provide an approach for sharing media items between mobile devices that are in proximity to one another. A device ID is generated and shared with nearby devices. Media items are uploaded to a data server and then sent from the data server to other devices that request them... International Business Machines

04/12/18 / #20180103081

Processing element host management in a stream computing environment

Disclosed aspects relate to processing element host management in a stream computing environment having a pool of compute nodes to host a set of processing elements. A set of processing element placement criteria may be identified for the pool of compute nodes with respect to processing element placement on the... International Business Machines

04/12/18 / #20180103084

Optimized orchestration of data-migration projects with soft migration costs based on file-specific migration feasibilities

A method and associated systems for optimized orchestration of a data-migration project. A data-migration orchestration system represents a hierarchical organization of each dataset to be migrated as a tree, where each leaf node of the tree represents data to be migrated and where a path between the leaf node and... International Business Machines

04/12/18 / #20180103088

Minimizing execution time of a compute workload based on adaptive complexity estimation

The present disclosure relates to minimizing the execution time of compute workloads in a distributed computing system. An example method generally includes receiving, from each of a plurality of server clusters, an estimated completion time and cost information predicted to be consumed in processing the compute workload. A workload manager... International Business Machines

04/12/18 / #20180103095

Controlling the state of duplexing of coupling facility structures

A coupling facility is coupled to one or more other coupling facilities via one or more peer links. The coupling of the facilities enables various functions to be supported, including the duplexing of structures of the coupling facilities. Duplexing is performed on a structure basis, and thus, a coupling facility... International Business Machines

04/12/18 / #20180103100

Streaming all-or-nothing encoding with random offset support

A method comprises dividing a data segment of a data object into a plurality of data chunks. The method continues with all-or-nothing (AONT) encoding each data chunk of the plurality of data chunks to produce a plurality of sets of AONT encoded data pieces. Note a set of AONT encoded... International Business Machines

04/12/18 / #20180103101

Memory access using deterministic function and secure seed

A processing device implementing a storage unit is included in a distributed storage network (DSN) that uses employing one or more storage units to store encoded data slices. The storage unit receives an access request that includes a slice identifier associated with an encoded data slice stored in a particular... International Business Machines

04/12/18 / #20180103102

Optimally apportioning rebuilding resources

A distributed storage network (DSN) stores encoded data slices in storage units based on DSN address ranges. A rebuilding module selects a range of addresses for potential rebuilding activities. A rebuilding activity capacity level for the address range is determined, and using that information a maximum number of rebuilding modules... International Business Machines

04/12/18 / #20180103103

Efficient resource reclamation after deletion of slice from common file

A distributed storage network (DSN) employs one or more distributed storage task execution (DST EX) units for dispersed storage of encoded data slices. A delete-slice request associated with a first encoded data slice is received at a DST EX unit, the encoded data slice is packed into a common file... International Business Machines

04/12/18 / #20180103104

Transitioning a state of a dispersed storage network

A method for execution by transition storage facility includes determining to initiate capturing snapshot information from a plurality of modules of a dispersed storage network (DSN). Snapshot scheduling information is issued to a plurality of modules of the DSN. The plurality of modules, in response to receiving the snapshot scheduling... International Business Machines








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with International Business Machines in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for International Business Machines with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###