Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines
International Business Machines Corp
International Business Machines Coporation
International Business Machiness Corporation
International Business Machines Corporations
International Business Machines Corportion
International Business Machines Incorporated
International Business Machines Inc
International Business Machines Cororation
International Business Machines Corporaton
International Business Machines Corporaiton
International Business Machines Corproation
International Business Machines Coproration
International Business Machines Corportation
International Business Machines Corporation ibm
International Business Machines Corpoation
International Business Machines Corpration
International Business Machines Corporatin
International Business Machines Croporation
International Business Machines Corporaion
International Business Machines Company
International Business Machines Corpporation
International Business Machines Corporation yt
International Business Machines Copration

International Business Machines patents (2016 archive)


Recent patent applications related to International Business Machines. International Business Machines is listed as an Agent/Assignee. Note: International Business Machines may have other listings under different names/spellings. We're not affiliated with International Business Machines, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machines-related inventors


Communication message consolidation with content difference fomatting

A set of similar messages addressed to a user is detected. Redundantly similar portions of the set of similar messages and a progressive set of differences between the set of similar messages are identified. ... International Business Machines

Identification of employees on external social media

A method for identifying employees across external social media sites including generating a list of at least one external social media site to be compared with an enterprise directory, comparing a plurality of users in the at least one external social media site to at least one employee in the enterprise directory, and determining a match between the at least one employee in the enterprise directory and at least one user in the at least one external social media site.. . ... International Business Machines

System for post self awareness

A social network post subject area of a social network post is identified using text analysis. A longevity of social network posts related to the social network post subject area on each of multiple hosting platforms is determined using monitored multi-platform post-longevity information. ... International Business Machines

System and method for detecting expertise via meeting participation

A method, computer program product, and computer system for determining, by a computing device, a topic of a meeting. Participation of a meeting attendant during the meeting may be tracked. ... International Business Machines

Host state-sensing for message interruption

Embodiments of the present invention address deficiencies of the art in respect to managing interrupting requests to engage in a collaborative session and provide a novel and non-obvious method, system and computer program product for host state sensing for message interruptions. In one embodiment of the invention, a data processing system configured for host sensing for message interruption can include a messenger disposed is a host computing platform, prioritization logic including program code enabled to assign priorities to incoming messages, and host state sensing logic coupled to the host computing platform. ... International Business Machines

Handling various scenarios where an email recipient is not available

A method for sending a plurality of alternate contact information associated with an online communication system. The method may include receiving an electronic message associated with the online communication system, wherein the electronic message is addressed to a recipient from a sender. ... International Business Machines

Mention identification for untrusted content

In some embodiments of the invention a method provides for processing a mention in textual content being input to a content provider. The method can include detecting input by a user of the content provider of the mention and identifying a member of a mention provider such as a social network based on the mention while maintaining privacy of information about the member with respect to the content provider. ... International Business Machines

Collecting messages from a group chat window that mention a specific user

Collecting online group chat messages. The method may include receiving a message associated with an online group chat session between chat participants. ... International Business Machines

Collecting messages from a group chat window that mention a specific user

Collecting online group chat messages. The method may include receiving a message associated with an online group chat session between chat participants. ... International Business Machines

Handling various scenarios where an email recipient is not available

A method for sending a plurality of alternate contact information associated with an online communication system. The method may include receiving an electronic message associated with the online communication system, wherein the electronic message is addressed to a recipient from a sender. ... International Business Machines

Establishing sender identities in synchronous and asynchronous communications

An approach is provided for establishing a sender identity. In the approach, a communication is received at a communication device over an electronic communications channel from a sender with the identity of the sender being withheld in the communication. ... International Business Machines

Dynamically generating solution stacks

Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. ... International Business Machines

Transactional orchestration of resource management and system topology in a cloud environment

Mechanisms are provided, in a cloud computing data processing system comprising a plurality of components, hosted on one or more hardware computing devices of the cloud computing data processing system, for transactional resource and topology management. A cloud service system is instantiated that comprises component instances having allocated resources. ... International Business Machines

Predictive vpn bandwidth balancing based on weather data and social media sentiment

The disclosure is directed to a method for balancing vpn network bandwidth. A method in accordance with an embodiment includes: obtaining weather data and social media sentiment for a plurality of geographical regions; analyzing the weather data and the social media sentiment for factors that may influence network bandwidth usage in each of the plurality of geographical regions; predicting network bandwidth requirements for each of the plurality of geographical regions based on the analysis of the weather data and the social media sentiment; and balancing the network bandwidth among the plurality of geographical regions based on the predicted network bandwidth requirements.. ... International Business Machines

12/29/16 / #20160380879

Rerouting bus data signals from faulty signal carriers to existing healthy signal carriers

A first set of signal carriers of a plurality of signal carriers may be determined to be faulty. The first set of signal carriers may be for transmitting a first set of respective lane signals of a plurality of lane signals. ... International Business Machines

12/29/16 / #20160380846

Method for determining system topology graph changes in a distributed computing system

A distributed computing system provides at least one service, and the service is provided by resources of the distributed computing system. Resources are represented by a topology graph including storage, application and database server nodes joined by edges indicative of relationships between nodes. ... International Business Machines

12/29/16 / #20160380840

Data synchronization using redundancy detection

Managing data in a cloud computing environment, including data transfers. File level and block level similarities are identified, including for archive and nested archive files, residing on datacenters and regional repositories. ... International Business Machines

12/29/16 / #20160380839

Efficient parallel processing of a network with conflict constraints between nodes

According to one exemplary embodiment, a method for parallel processing a network of nodes having at least one ordering constraint and at least one conflict constraint is provided. The method may include breaking a plurality of loops caused by the at least one ordering constraint. ... International Business Machines

12/29/16 / #20160380829

Transactional orchestration of resource management and system topology in a cloud environment

Mechanisms are provided, in a cloud computing data processing system comprising a plurality of components, hosted on one or more hardware computing devices of the cloud computing data processing system, for transactional resource and topology management. A cloud service system is instantiated that comprises component instances having allocated resources. ... International Business Machines

12/29/16 / #20160380817

Assessing computing environment changes using specification documents

According to one embodiment of the present invention, a system analyzes an environment specification document that specifies a proposed configuration of a full-stack environment for a computing system and that describes infrastructure, middleware, and application elements. The system correlates the environment specification document with an environment instantiated on the computing system from the environment specification document. ... International Business Machines

12/29/16 / #20160380811

Application hierarchy specification with real-time functional selection

A preferred communication application hierarchy that specifies user priorities for application selection for communication sessions and functional communication capabilities of each prioritized application is configured for at least one user of a group of users. A real-time communication request, initiated by a user with a configured preferred communication application hierarchy, is detected that specifies a particular type of communication functionality and that includes an indication of another one of the group of users as a requested communication recipient. ... International Business Machines

12/29/16 / #20160380806

Identifying performance-degrading hardware components in computer storage systems

Performance-degrading hardware components in computer storage systems are identified. A timed-out input/output (i/o) operation is detected. ... International Business Machines

12/29/16 / #20160380761

Distributed computing utilizing homomorphic encryption

A method for determining a compute amount contributed by a device is provided. The method comprises receiving encrypted data from a processor of a customer system and parsing the encrypted data into a plurality of encrypted subsets. ... International Business Machines

12/29/16 / #20160380714

Codeword synchronization for fiber channel protocol

Efficient codeword synchronization methods and systems for fiber channel protocol are disclosed. The method includes identifying a codeword boundary by detecting 100-bit known patterns in a bit codeword in a transmission.. ... International Business Machines

12/29/16 / #20160380694

Rerouting bus data signals from faulty signal carriers to existing healthy signal carriers

A first set of signal carriers of a plurality of signal carriers may be determined to be faulty. The first set of signal carriers may be for transmitting a first set of respective lane signals of a plurality of lane signals. ... International Business Machines

12/29/16 / #20160380637

Temperature stabilization of an on-chip temperature-sensitive element

Disclosed is an integrated circuit (ic) chip incorporating a temperature-sensitive element and temperature stabilization circuitry for ensuring that the temperature of the temperature-sensitive element (tse) remains essentially constant. The ic chip comprises a temperature-sensitive element and, within at least one region adjacent to the temperature-sensitive element, a first circuit that radiates a first heat amount to the tse and a second circuit that radiates a second heat amount to the tse. ... International Business Machines

12/29/16 / #20160380636

Driving the common-mode of a josephson parametric converter using a three-port power divider

An on-chip josephson parametric converter is provided. The on-chip josephson parametric converter includes a josephson ring modulator. ... International Business Machines

12/29/16 / #20160380465

Tetherless device charging for chained devices

In one embodiment, a method includes integrating a charging pad into a powered device having a power supply, where the powered device is at least one of a monitor and a keyboard. The method includes configuring the charging pad to receive a first chargeable device in a charging position relative to the charging pad. ... International Business Machines

12/29/16 / #20160380463

Tetherless device charging for chained devices

In one embodiment, a method includes integrating a charging pad into a powered device having a power supply, where the powered device is at least one of a monitor and a keyboard. The method includes configuring the charging pad to receive a first chargeable device in a charging position relative to the charging pad. ... International Business Machines

12/29/16 / #20160380449

Coupling mobile devices for tetherless charging or communication

In one embodiment, a computer-implemented method includes detecting insertion of a mobile device into a cradle of a computer. The mobile device includes one or more device edges each having device coupling hardware. ... International Business Machines

12/29/16 / #20160380220

Organic monolayer passivation and silicon heterojunction photovoltaic devices using the same

A method for inorganic surface passivation in a photovoltaic device includes etching a native oxide over an inorganic substrate, the inorganic substrate having a surface; and forming an organic monolayer on the surface of the inorganic substrate to form a heterojunction, the organic monolayer having the following formula: ˜x-y, wherein x is an oxygen or a sulfur; y is an alkyl chain, an alkenyl chain, or an alkynyl chain; and x covalently bonds to the surface of the inorganic substrate by a covalent bond.. . ... International Business Machines

12/29/16 / #20160380219

Organic monolayer passivation and silicon heterojunction photovoltaic devices using the same

A method for inorganic surface passivation in a photovoltaic device includes etching a native oxide over an inorganic substrate, the inorganic substrate having a surface; and forming an organic monolayer on the surface of the inorganic substrate to form a heterojunction, the organic monolayer having the following formula: ˜x—y, wherein x is an oxygen or a sulfur; y is an alkyl chain, an alkenyl chain, or an alkynyl chain; and x covalently bonds to the surface of the inorganic substrate by a covalent bond.. . ... International Business Machines

12/29/16 / #20160380218

Self-aligned carbon nanotube transistor including source/drain extensions and top gate

A carbon nanotube semiconductor device includes at least one carbon nanotube disposed on an insulator portion of a substrate. The at least one carbon nanotube includes a non-doped channel portion interposed between a first doped source/drain portion and a second doped source/drain portion. ... International Business Machines

12/29/16 / #20160380217

Self-aligned carbon nanotube transistor including source/drain extensions and top gate

A carbon nanotube semiconductor device includes at least one carbon nanotube disposed on an insulator portion of a substrate. The at least one carbon nanotube includes a non-doped channel portion interposed between a first doped source/drain portion and a second doped source/drain portion. ... International Business Machines

12/29/16 / #20160380188

Perpendicular magnetic anisotropy free layers with iron insertion and oxide interfaces for spin transfer torque magnetic random access memory

A method of making a spin-torque transfer magnetic random access memory device (stt mram) device includes forming a tunnel barrier layer on a reference layer; forming a free layer on the tunnel barrier layer, the free layer comprising a cobalt iron boron (cofeb) alloy layer and an iron (fe) layer; and performing a sputtering process to form a metal oxide layer on the fe layer.. . ... International Business Machines

12/29/16 / #20160380143

Iii-v solar cell structure with multi-layer back surface field

Photovoltaic devices including direct gap iii-v absorber materials and operatively associated back structures enhance efficiency by enabling photon recycling. The back structures of the photovoltaic devices include wide bandgap iii-v layers, highly doped (in)gaas layers, patterned oxide layers and metal reflectors that directly contact the highly doped (in)gaas layers through vias formed in the back structures. ... International Business Machines

12/29/16 / #20160380139

Thin film photovoltaic cell with back contacts

Photovoltaic cells, photovoltaic devices, and methods of fabrication are provided. The photovoltaic cells include a transparent substrate to allow light to enter the photovoltaic cell through the substrate, and a light absorption layer associated with the substrate. ... International Business Machines

12/29/16 / #20160380135

Ohmic contact of thin film solar cell

A chalcogen-resistant material including at least one of a conductive elongated nanostructure layer and a high work function material layer is deposited on a transition metal layer on a substrate. A semiconductor chalcogenide material layer is deposited over the chalcogen-resistant material. ... International Business Machines

12/29/16 / #20160380133

Thin film photovoltaic cell with back contacts

Photovoltaic cells, photovoltaic devices, and methods of fabrication are provided. The photovoltaic cells include a transparent substrate to allow light to enter the photovoltaic cell through the substrate, and a light absorption layer associated with the substrate. ... International Business Machines

12/29/16 / #20160380104

Iii-v gate-all-around field effect transistor using aspect ratio trapping

Embodiments of the invention provide methods for forming iii-v gate-all-around field effect transistors on silicon substrates that utilize aspect-ratio trapping to reduce or eliminate dislocation defects associated with lattice mismatches. A field dielectric material defining a trench is formed on a crystalline silicon substrate. ... International Business Machines

12/29/16 / #20160380095

High voltage finfet structure with shaped drift region

Devices and methods for a high voltage finfet with a shaped drift region include a lateral diffusion metal oxide semiconductor (ldmos) finfet having a substrate with a top surface and a fin attached to the top surface. This fin includes a source region having a first type of doping, an undoped gate-control region adjacent the source region, a drift region adjacent the undoped gate-control region opposite the source region, and a drain region. ... International Business Machines

12/29/16 / #20160380094

Field effect transistors with strained channel features

A method is provided for forming an integrated circuit. A doped silicon layer is formed on a silicon substrate. ... International Business Machines

12/29/16 / #20160380083

Nanowire semiconductor device including lateral-etch barrier region

A semiconductor device includes a semiconductor-on-insulator wafer having a buried oxide layer. The buried oxide layer includes therein opposing etch barrier regions and a gate region between the etch barrier regions. ... International Business Machines

12/29/16 / #20160380074

Method of forming field effect transistors (fets) with abrupt junctions and integrated circuit chips with the fets

A method of forming field effect transistors (fets) and on integrated circuit (ic) chips with the fets. Channel placeholders at fet locations are undercut at each end of fet channels. ... International Business Machines

12/29/16 / #20160380070

Replacement metal gate structures

Replacement metal gate structures with improved chamfered workfunction metal and self-aligned contact and methods of manufacture are provided. The method includes forming a replacement metal gate structure in a dielectric material. ... International Business Machines

12/29/16 / #20160380058

Finfet devices having silicon germanium channel fin structures with uniform thickness

Methods are provided to fabricate semiconductor devices, e.g., finfet devices, having fin channel structures formed of silicon-germanium alloy layers with uniform thickness. For example, a method includes forming a semiconductor fin structure having sidewalls that define a first width of the semiconductor fins structure, and a hard mask layer disposed on a top surface of the semiconductor fin structure. ... International Business Machines

12/29/16 / #20160380055

Extrinsic base doping for bipolar junction transistors

Device structure and fabrication methods for a bipolar junction transistor. A base layer is formed and an emitter is formed on a first portion of the base layer. ... International Business Machines

12/29/16 / #20160380054

Nanowire semiconductor device including lateral-etch barrier region

A semiconductor device includes a semiconductor-on-insulator wafer having a buried oxide layer. The buried oxide layer includes therein opposing etch barrier regions and a gate region between the etch barrier regions. ... International Business Machines

12/29/16 / #20160380053

Iii-v gate-all-around field effect transistor using aspect ratio trapping

A field effect transistor includes a trench in a field dielectric material on a crystalline silicon substrate and source/drain features inside the trench. The field effect transistor further includes a channel feature comprising a iii-v material in the trench and spanning between the source/drain features, and gate dielectric layers and a gate feature surrounding a portion of the channel feature.. ... International Business Machines

12/29/16 / #20160380051

Finfet devices

Finfet devices and processes to prevent fin or gate collapse (e.g., flopover) in finfet devices are provided. The method includes forming a first set of trenches in a semiconductor material and filling the first set of trenches with insulator material. ... International Business Machines

12/29/16 / #20160380049

Compound finfet device including oxidized iii-v fin isolator

A semiconductor device includes a wafer having a bulk layer and a iii-v buffer layer on an upper surface of the bulk layer. The semiconductor device further includes at least one semiconductor fin on the iii-v buffer layer. ... International Business Machines

12/29/16 / #20160380027

Injection pillar definition for line mram by a self-aligned sidewall transfer

A technique relates to an mram system. A conformal film covers trenches formed in an upper material. ... International Business Machines

12/29/16 / #20160380003

Gate all-around finfet device and a method of manufacturing same

A method for manufacturing a fin field-effect transistor (finfet) device, comprises patterning a first layer on a substrate to form at least one fin, patterning a second layer under the first layer to remove a portion of the second layer on sides of the at least one fin, forming a sacrificial gate electrode on the at least one fin, and a spacer on the sacrificial gate electrode, selectively removing the sacrificial gate electrode, depositing an oxide layer on top and side portions of the at least one fin corresponding to a channel region of the at least one fin, performing thermal oxidation to condense the at least one fin in the channel region until a bottom portion of the at least one fin is undercut, and stripping a resultant oxide layer from the thermal oxidation, leaving a gap in the channel region between a bottom portion of the at least one fin and the second layer.. . ... International Business Machines

12/29/16 / #20160380002

Contact formation to 3d monolithic stacked finfets

A first gate structure straddles one end of a staircase fin stack that contains a first semiconductor material fin, an insulator fin, and a second semiconductor material fin, a second gate structure straddles a portion of the staircase fin stack, a third gate structure straddles another end of the staircase fin stack, and a fourth gate structure straddles a portion of only the first semiconductor fin. A first contact structure is between the first and second gate structures, a second contact structure is between the second and third gate structures, and a third contact structure is between the third and fourth gate structures. ... International Business Machines

12/29/16 / #20160380001

Selective oxidation for making relaxed silicon germanium on insulator structures

Methods and devices are provided to fabricate semiconductor devices with, e.g., sige-on-insulator structures. For example, a method for fabricating a semiconductor device includes forming a crystalline buffer layer on a substrate, forming an epitaxial semiconductor layer on the crystalline buffer layer, patterning the epitaxial semiconductor layer to form a patterned epitaxial semiconductor layer, and oxidizing a surface region of the crystalline buffer layer selective to the patterned epitaxial semiconductor layer to convert the surface region of the crystalline buffer layer to an insulating layer. ... International Business Machines

12/29/16 / #20160380000

Semiconductor device structure with 110-pfet and 111-nfet curent flow direction

A finfet comprises a hybrid substrate having a top wafer of (100) silicon, a handle wafer of (110) silicon, and a buried oxide layer between the top wafer and the handle wafer; a first set of fins disposed in the top wafer and oriented in a <110> direction of the (100) silicon; and a second set of fins disposed in the handle wafer and oriented in a <112> direction of the (110) silicon. The first set of fins and the second set of fins are aligned.. ... International Business Machines

12/29/16 / #20160379981

Finfet structures having silicon germanium and silicon fins with suppressed dopant diffusion

A finned structure is fabricated using a bulk silicon substrate having a carbon-doped epitaxial silicon germanium layer. A pfet region of the structure includes fins having silicon germanium top portions and an epitaxial carbon-doped silicon germanium diffusion barrier that suppresses dopant diffusion from the underlying n-well into the silicon germanium fin region during device fabrication. ... International Business Machines

12/29/16 / #20160379975

Lateral bipolar sensor with sensing signal amplification

An integrated sensor for detecting the presence of an environmental material and/or condition includes a sensing structure and first and second bipolar junction transistors (bjts). The first bjt has a base that is electrically coupled with the sensing structure and is configured to generate an output signal indicative of a change in stored charge in the sensing structure. ... International Business Machines

12/29/16 / #20160379948

Corrosion resistant aluminum bond pad structure

A method of manufacturing a bond pad structure may include depositing an aluminum-copper (al—cu) layer over a dielectric layer; and depositing an aluminum-chromium (al—cr) layer directly over the al—cu layer.. . ... International Business Machines

12/29/16 / #20160379942

Self-destructive circuits under radiation

Circuits which self-destruct under radiation are provided. In one aspect, a method for creating a radiation-sensitive circuit is provided. ... International Business Machines

12/29/16 / #20160379934

Wafer rigidity with reinforcement structure

Reinforcement structures used with a thinned wafer and methods of manufacture are provided. The method includes forming trenches or vias at least partially through a backside of a thinned wafer attached to a carrier wafer. ... International Business Machines

12/29/16 / #20160379928

Finfet power supply decoupling

Embodiments herein describe dummy gates disposed over a portion of a fin in finfets. That is, instead of separating the dummy gates from the finfet structure, the fins may be extended and covered, at least partially, by the dummy gates. ... International Business Machines

12/29/16 / #20160379927

Optimized wires for resistance or electromigration

Optimized metal wires for resistance or electromigration, methods of manufacturing thereof and design methodologies are disclosed. The method includes depositing metal material within openings and on a surface of dielectric material resulting in metal filled openings and a topography of recessed areas aligned with the metal filled openings. ... International Business Machines

12/29/16 / #20160379925

Stable contact on one-sided gate tie-down structure

After forming a first contact opening to expose a portion of a first source/drain contact located at one side of a functional gate structure followed by forming a second contact opening that intersects the first contact opening to expose the functional gate structure and a portion of a second source/drain contact located at an opposite side of the functional gate structure, the exposed portions of the first source/drain contact and the second-side source/drain contact are recessed. A dielectric cap is subsequently formed over the recessed portion of the second source/drain contact. ... International Business Machines

12/29/16 / #20160379899

Implementing resistance defect performance mitigation using test signature directed self heating and increased voltage

A method and system are provided for implementing resistive defect performance mitigation for integrated circuits. A test is generated for identifying resistive defects. ... International Business Machines

12/29/16 / #20160379898

Implementing resistance defect performance mitigation using test signature directed self heating and increased voltage

A method and system are provided for implementing resistive defect performance mitigation for integrated circuits. A test is generated for identifying resistive defects. ... International Business Machines

12/29/16 / #20160379895

Formation of strained fins in a finfet device

In an aspect of the present invention, a field-effect transistor (fet) structure is formed. The fet structure comprises a plurality of fins formed on a semiconductor substrate, wherein the plurality of fins includes a set of fins that include a base portion that is comprised of relaxed silicon-germanium (sige) and an upper portion that is comprised of semiconductor material. ... International Business Machines

12/29/16 / #20160379894

Semiconductor device structure with 110-pfet and 111-nfet current flow direction

A finfet comprises a hybrid substrate having a top wafer of (100) silicon, a handle wafer of (110) silicon, and a buried oxide layer between the top wafer and the handle wafer; a first set of fins disposed in the top wafer and oriented in a <110> direction of the (100) silicon; and a second set of fins disposed in the handle wafer and oriented in a <112> direction of the (110) silicon. The first set of fins and the second set of fins are aligned.. ... International Business Machines

12/29/16 / #20160379893

Integrated circuit (ic) with offset gate sidewall contacts and method of manufacture

A method of forming logic cell contacts, forming cmos integrated circuit (ic) chips including the fets and the ic chips. After forming replacement metal gates (rmg) on fin field effect transistor (finfet) pairs, gates are cut on selected pairs, separating pfet gates from nfet gates. ... International Business Machines

12/29/16 / #20160379892

Finfet devices

Finfet devices and processes to prevent fin or gate collapse (e.g., flopover) in finfet devices are provided. The method includes forming a first set of trenches in a semiconductor material and filling the first set of trenches with insulator material. ... International Business Machines

12/29/16 / #20160379890

Finfet devices with multiple channel lengths

A method including patterning a continuous fin having a first segment and a second segment in a semiconductor layer, the first segment is arranged at an angle relative to the second segment, and forming a first gate and a second gate substantially parallel to each other, the first gate substantially covering sides and a top of a portion of the first segment of the continuous fin, the second gate substantially covering sides and a top of a portion of the second segment of the continuous fin.. . ... International Business Machines

12/29/16 / #20160379887

Finfet devices

Finfet devices and processes to prevent fin or gate collapse (e.g., flopover) in finfet devices are provided. The method includes forming a first set of trenches in a semiconductor material and filling the first set of trenches with insulator material. ... International Business Machines

12/29/16 / #20160379882

Partial spacer for increasing self aligned contact process margins

A semiconductor structure is provided. The semiconductor includes a gate stack on a substrate. ... International Business Machines

12/29/16 / #20160379881

Integrated circuits with self aligned contacts and methods of manufacturing the same

Integrated circuits and methods for producing the same are provided. A method for producing an integrated circuit includes forming an interconnect in a first interlayer dielectric. ... International Business Machines

12/29/16 / #20160379880

Low resistance metal contacts to interconnects

A semiconductor device and a method of fabricating a contact to interface with an interconnect in a semiconductor device are described. The device includes a dielectric layer formed on a semiconductor layer, and a contact fabricated in a via formed within the dielectric layer. ... International Business Machines

12/29/16 / #20160379878

Metal level formation method and an integrated circuit structure having a metal level with improved dielectric to metal adhesion

Disclosed is a method of forming back end of the line (beol) metal levels with improved dielectric capping layer to metal wire adhesion. The method includes process step(s) designed to address dielectric capping layer to metal wire adhesion, when the metal wire(s) in a given metal level are relatively thick. ... International Business Machines

12/29/16 / #20160379877

Optimized wires for resistance or electromigration

Optimized metal wires for resistance or electromigration, methods of manufacturing thereof and design methodologies are disclosed. The method includes depositing metal material within openings and on a surface of dielectric material resulting in metal filled openings and a topography of recessed areas aligned with the metal filled openings. ... International Business Machines

12/29/16 / #20160379876

Insulating a via in a semiconductor substrate

Insulating a via in a semiconductor substrate, including: depositing, in the via, a dielectric layer; depositing, in the via, a barrier layer; allowing the barrier layer to oxidize; and depositing, in the via, a conducting layer.. . ... International Business Machines

12/29/16 / #20160379869

Low resistance metal contacts to interconnects

A semiconductor device and a method of fabricating a contact to interface with an interconnect in a semiconductor device are described. The device includes a dielectric layer formed on a semiconductor layer, and a contact fabricated in a via formed within the dielectric layer. ... International Business Machines

12/29/16 / #20160379837

Directed self-assembly

The disclosure provides methods for directed self-assembly (dsa) of a block co-polymer (bcp). In one embodiment, a method includes: forming an oxide spacer along each of a first sidewall and a second sidewall of a cavity in a semiconductor substrate; forming a neutral layer between the oxide spacers and along a bottom of the cavity; and removing the oxide spacers to expose the first and second sidewalls and a portion of the bottom of the cavity adjacent the first and second sidewalls.. ... International Business Machines

12/29/16 / #20160379830

Multiple nanosecond laser pulse anneal processes and resultant semiconductor structure

Semiconductor structures and methods of fabricating the same using multiple nanosecond pulsed laser anneals are provided. The method includes exposing a gate stack formed on a semiconducting material to multiple nanosecond laser pulses at a peak temperature below a melting point of the semiconducting material.. ... International Business Machines

12/29/16 / #20160379823

Tone inverted directed self-assembly (dsa) fin patterning

A method for dsa fin patterning includes forming a bcp layer over a lithographic stack, the bcp layer having first and second blocks, the lithographic stack disposed over a hard mask and substrate, and the hard mask including first and second dielectric layers; removing the first block to define a fin pattern in the bcp layer with the second block; etching the fin pattern into the first dielectric layer; filling the fin pattern with a tone inversion material; etching back the tone inversion material that overfills the fin pattern; removing the first dielectric layer selectively to define an inverted fin pattern from the tone inversion material; etching the inverted fin pattern into the second dielectric layer of the hard mask; removing the tone inversion material; and transferring the inverted fin pattern of the second dielectric layer into the substrate to define fins.. . ... International Business Machines

12/29/16 / #20160379820

Compound finfet device including oxidized iii-v fin isolator

A semiconductor device includes a wafer having a bulk layer and a iii-v buffer layer on an upper surface of the bulk layer. The semiconductor device further includes at least one semiconductor fin on the iii-v buffer layer. ... International Business Machines

12/29/16 / #20160379675

Electrically conductive magnetic shield laminate structure for contact recording sensor

In one general embodiment, an apparatus includes a magnetic sensor structure, a magnetic shield having at least one laminate pair comprising a magnetic layer and an electrically conductive nonmagnetic layer, and a nonmagnetic spacer layer between the sensor structure and the magnetic shield. In another general embodiment, an apparatus includes a magnetic tunnel junction sensor structure, and a magnetic shield having at least two laminate pairs, each pair comprising a magnetic layer and an electrically conductive nonmagnetic layer. ... International Business Machines

12/29/16 / #20160379674

Electrically non-conductive magnetic shield laminate structure for contact recording sensor

An apparatus according to one embodiment includes a magnetic sensor structure, a magnetic shield having at least one laminate pair comprising a magnetic layer and an electrically nonconductive nonmagnetic layer, and a nonmagnetic spacer layer between the sensor structure and the magnetic shield. In one embodiment, a deposition thickness of the nonconductive nonmagnetic layer in each laminate pair is about 10% or less of a total deposition thickness of the laminate pair. ... International Business Machines

12/29/16 / #20160379665

Training deep neural network for acoustic modeling in speech recognition

A method is provided for training a deep neural network (dnn) for acoustic modeling in speech recognition. The method includes reading central frames and side frames as input frames from a memory. ... International Business Machines

12/29/16 / #20160379628

Discovering windows in temporal predicates

A method and system are provided. The method includes separating a predicate that specifies a set of events into a temporal part and a non-temporal part. ... International Business Machines

12/29/16 / #20160379494

Reference tokens for managing driverless cars

Negotiating a multi-vehicle environment using vehicle-to-vehicle network tokens for intra-vehicle communication. Preliminary routing assignments are efficiently improved by available intra-vehicle communication.. ... International Business Machines

12/29/16 / #20160379493

Reference tokens for managing driverless cars

Negotiating a multi-vehicle environment using vehicle-to-vehicle network tokens for intra-vehicle communication. Preliminary routing assignments are efficiently improved by available intra-vehicle communication.. ... International Business Machines

12/29/16 / #20160379473

Wearable device for automatic detection of emergency situations

A portion of data is received from each sensor of a plurality of sensors. An emergency level corresponding to each metric of a plurality of metrics is calculated, where the calculated emergency level is determined based on the portion of data received from the sensors. ... International Business Machines

12/29/16 / #20160379412

Reality augmentation to eliminate, or de-emphasize, selected portions of base image

An augmented reality display system used to diminish (for example, obscure, obfuscate, hide, make less distracting, block out, “white wash” and/or make less discernible) certain portions of a base image (for example, a user's view of a part of the real world as seen through eyeglasses). Some examples of visual subject matter that can be diminished include: (i) driver distraction phenomena; (ii) advertising; and/or (iii) subject matter the user is not authorized to view.. ... International Business Machines

12/29/16 / #20160379392

Producing visualizations of elements in works of literature

A visualization of literary elements of a work of literature, such as a novel or short story, is generated from meta-data records representing a digital work of literature including literary elements (humor, drama, adventure, etc.), characters, and plot devices related to a position within the work of literature where each appears. A significance level is determined for each of the elements, characters and plot devices at each position within the work of literature, and these are plotted into a sequential graph having position (e.g. ... International Business Machines

12/29/16 / #20160379323

Behavioral and exogenous factor analytics based user clustering and migration

A present risk aversion of a customer is determined. A temporal preference is detected using historical data related to the customer, the temporal preference showing a preference of current utility over a future utility of a product. ... International Business Machines

12/29/16 / #20160379313

Identification of employees on external social media

A method for identifying employees across external social media sites including generating a list of at least one external social media site to be compared with an enterprise directory, comparing a plurality of users in the at least one external social media site to at least one employee in the enterprise directory, and determining a match between the at least one employee in the enterprise directory and at least one user in the at least one external social media site.. . ... International Business Machines

12/29/16 / #20160379295

Product recommendations based on analysis of social experiences

A method for recommending products. The method may include receiving an identification element associated with an image or a visual code captured by a user. ... International Business Machines

12/29/16 / #20160379293

Application for automatic ordering of food items

Aspects of the present invention disclose a method for automatic ordering of food from a restaurant. In one aspect, the method includes determining at least one suggested restaurant from a plurality of restaurants based on a history of the user, at least one recent activity of the user, and information about the plurality of restaurants.. ... International Business Machines

12/29/16 / #20160379283

Analysis of social data to match suppliers to users

In an approach for providing a product recommendation, a processor identifies an image as trending, based on the image exceeding a threshold frequency of occurrence on at least one media platform. A processor analyzes the image to identify a set of one or more elements within the image, wherein at least one element is a product. ... International Business Machines

12/29/16 / #20160379267

Targeted e-commerce business strategies based on affiliation networks derived from predictive cognitive traits

Embodiments are directed to a computer implemented business campaign development system. The system includes an electronic tool configured to hold data of a user, and an analyzer circuit configured to derive a cognitive trait of the user based at least in part on the data of the user. ... International Business Machines

12/29/16 / #20160379260

Product recommendations based on analysis of social experiences

A method for recommending products. The method may include receiving an identification element associated with an image or a visual code captured by a user. ... International Business Machines

12/29/16 / #20160379253

Dynamic generation of advertisement based upon user need

Provided are techniques for the generation of advertising content based upon users' needs and use cases. The techniques include monitoring social media to generate a history of user interest; identifying a current interest of a user based upon information derived from a group of sources, the first group of sources comprising: social media data corresponding to the user; communications to and from the user; interactions between the user and other users; calendar entries of the user; and a location corresponding to the user; predicting a user case corresponding to a product such that the use case conforms to the current interest; generating an advertisement based upon the use case and a second group of sources, the second group of sources comprising literature corresponding to the product; user feedback with respect to the product; user ratings of the product; and blogs referencing the product; and displaying the advertisement to the user.. ... International Business Machines

12/29/16 / #20160379252

Dynamic generation of advertisement based upon user need

Provided are techniques for the generation of advertising content based upon users' needs and use cases. The techniques include monitoring social media to generate a history of user interest; identifying a current interest of a user based upon information derived from a group of sources, the first group of sources comprising: social media data corresponding to the user; communications to and from the user; interactions between the user and other users; calendar entries of the user; and a location corresponding to the user; predicting a user case corresponding to a product such that the use case conforms to the current interest; generating an advertisement based upon the use case and a second group of sources, the second group of sources comprising literature corresponding to the product; user feedback with respect to the product; user ratings of the product; and blogs referencing the product; and displaying the advertisement to the user.. ... International Business Machines

12/29/16 / #20160379249

Prioritized advertising

A system, method, and program product that prioritizes internet advertising for a particular product for a consumer. A system is disclosed that includes: an information gathering system that gathers purchasing information of a consumer; an identification analyzer that identifies at least one potential product for the consumer; a product analyzer that determines whether the at least one potential product is a utility item or a vanity item; and a prioritizing engine including: a vanity scoring engine that assigns an advertising score based on whether the consumer owns the vanity item, whether the vanity item is consumable, and a vanity score for the consumer and a utility scoring engine that assigns an advertising score based on whether the consumer owns the utility item and whether the utility item is consumable, wherein in response to the assigned advertising score exceeding an advertising threshold, an internet advertisement is presented to the consumer.. ... International Business Machines

12/29/16 / #20160379245

Cross-device and cross-channel advertising and remarketing

An embodiment of the invention identifies a positive reaction to an advertisement and sends the advertisement to a mobile and/or wearable electronic device of a user. The advertisement can be sent to the mobile and/or wearable electronic device of the user only when the user is within a first threshold distance to a store of the advertiser, the user is within a second threshold distance to a store that is within a third threshold degree of similarity to the advertisement, the user is within the second threshold distance to a store that is within the third threshold degree of similarity to the advertiser, the user is browsing a website of the advertiser, the user is browsing a website that is within a fourth threshold degree of similarity to the advertisement, and/or the user is browsing a website that is within the fourth threshold degree of similarity to the advertiser.. ... International Business Machines

12/29/16 / #20160379229

Predicting project outcome based on comments

In one embodiment, a computer-implemented method includes receiving a set of comments related to a project. One or more sentiment tags are extracted from the set of comments, where each sentiment tag includes an associated sentiment phrase. ... International Business Machines

12/29/16 / #20160379224

Targeted e-commerce business strategies based on affiliation networks derived from predictive cognitive traits

Embodiments are directed to a computer implemented business campaign development system. The system includes an electronic tool configured to hold data of a user, and an analyzer circuit configured to derive a cognitive trait of the user based at least in part on the data of the user. ... International Business Machines

12/29/16 / #20160379214

Privacy protection in ecommerce/logistics

Various embodiments secure a customer's private data within a logistics environment. In one embodiment, a graphical object including encoded data associated with an order for goods is generated. ... International Business Machines

12/29/16 / #20160379189

Non-interfering transactions

Embodiments relate to non-interfering transactions. An aspect includes receiving, by a first transaction, a conflicting remote access request from a requester, the remote access request being directed to a memory area that is owned as part of at least one of a transactional read set and transactional write set by the first transaction. ... International Business Machines

12/29/16 / #20160379157

System and method for secure proximity-based signatures for parcel delivery

An apparatus, termed a destination validation device (dvd), comprises a sensor configured to sense physical presence of a parcel and to obtain metadata from said parcel; at least one data processor connected with at least one memory storing software instructions that when executed causes the dvd to at least determine from reading the obtained metadata whether a signature is required for delivery of the parcel, and prepare a destination delivery acknowledgement indicating whether said signature is required; and a transmitter configured to communicate the prepared destination delivery acknowledgement external of the dvd. In this manner a delivery service can verify that the parcel is at the physical delivery location. ... International Business Machines

12/29/16 / #20160379134

Cluster based desktop management services

Historical data and real-time data are collected for a plurality of computing resources. Based on the collected historical data, typical behavior of the plurality of computing resources is modeled and resulting models are stored in a model repository. ... International Business Machines

12/29/16 / #20160379130

Software request-filtering predictive technique based on resource usage probabilities

In filtering requests to be forwarded to a runtime environment, a filtering apparatus intercepts a new runtime request for the runtime environment and determines execution paths that may be traversed by the runtime request when executed in the runtime environment. The filtering apparatus assigns a probability of traversal by the runtime request to each of the execution paths and identifies at least one given execution path that reference a stressed resource of the runtime environment. ... International Business Machines

12/29/16 / #20160379129

Collaboration group recommendations derived from request-action correlations

In response to a user-initiated interaction request sent by a user using an electronic communication, subsequent actions performed by other users that received the user-initiated interaction request are analyzed. A determination is made as to whether the subsequent actions performed by the other users that received the user-initiated interaction request correlate to an intended interaction result of the user-initiated interaction request. ... International Business Machines

12/29/16 / #20160379127

Enhanced e-mail return receipts based on cognitive considerations

An embodiment of the invention provides a method for enhanced e-mail return receipts based on cognitive considerations. An input device receives an expected response time from a sender of an electronic message, wherein the expected response time includes the amount of time that the sender expects to receive a response to the electronic message. ... International Business Machines

12/29/16 / #20160379125

Provisioning service requests in a computer system

Disclosed is a system, computer program product, and method for provisioning a new service request. The computer-implemented method begins with receiving a new service request for computational resources in a computing system. ... International Business Machines

12/29/16 / #20160379120

Knowledge canvassing using a knowledge graph and a question and answer system

Mechanisms are provided for processing a knowledge canvassing request. The mechanisms receive a request specifying an entity of interest from an originator of the request and analyze the request to extract a feature of the request. ... International Business Machines

12/29/16 / #20160379110

Neuromorphic processing devices

A neuromorphic processing device has a device input, for receiving an input data signal, and an assemblage of neuron circuits. Each neuron circuit comprises a resistive memory cell which is arranged to store a neuron state, indicated by cell resistance, and to receive neuron input signals for programming cell resistance to vary the neuron state, and a neuron output circuit for supplying a neuron output signal in response to cell resistance traversing a threshold. ... International Business Machines

12/29/16 / #20160379086

Systems and methods for inferring gender by fusion of multimodal content

A method and systems are provided. A system includes a set of visual and textual classifiers for recognizing semantic concepts in a set of images and assigning semantic scores for the images to predict a gender of a user, and performing gender prediction from visual content and textual content in the images to respectively generate visual-based gender predictions and textual-based gender predictions. ... International Business Machines

12/29/16 / #20160379084

Determining user preferences for data visualizations

A method for determining user preferences for data visualizations is provided. The method may include receiving data visualizations. ... International Business Machines

12/29/16 / #20160379077

Pose detection using depth camera

A computer-implemented method, computerized apparatus and computer program product for detecting an object's pose using a depth image. An image of an object in a scene and depth data of the scene are obtained. ... International Business Machines

12/29/16 / #20160379010

Masking sensitive data in mobile applications

In an approach to masking data in a software application associated with a mobile computing device, one or more computer processors receive a request to display data in a software application on a mobile computing device. The one or more computer processors determine whether one or more masking rules apply to the data, where determining whether one or more masking rules apply to the data is performed by an instrumentation of application binary of the software application. ... International Business Machines

12/29/16 / #20160378995

Static security analysis using a hybrid representation of string values

A hybrid string constructor includes a database configured to store a set of known concretizations. A processor is configured to compare the one or more string components to the set of known concretizations to determine string components from input string information that may be represented concretely, to abstract all string components that could not be represented concretely, and to create a hybrid string representation that includes at least one concrete string component and at least one abstracted string component. ... International Business Machines

12/29/16 / #20160378987

Self-repair and distributed-repair of applications

A method is provided to instrument applications with an instrumentation policy that is visually configurable and allows for run-time modifications of the policy. Instrumentation is achieved without modifying the source code of the applications. ... International Business Machines

12/29/16 / #20160378974

Weak password support in a multi-user environment

Embodiments of the present invention provide a method, system and computer program product for supporting weak password authentication in a multi-user application environment. In an embodiment of the invention, a method for supporting weak password authentication in a multi-user application environment can be provided. ... International Business Machines

12/29/16 / #20160378908

Algebraic reconstruction of perturbed models of genetic populations

Embodiments are directed to a computer-based simulation system including an input circuit, a memory and a processor system communicatively coupled to the memory and the input circuit. The input circuit is configured to receive an input distribution. ... International Business Machines

12/29/16 / #20160378907

Algebraic reconstruction of perturbed models of genetic populations

Embodiments are directed to a computer-based simulation system including an input circuit, a memory and a processor system communicatively coupled to the memory and the input circuit. The input circuit is configured to receive an input distribution. ... International Business Machines

12/29/16 / #20160378904

Early overlay prediction and overlay-aware mask design

Various embodiments include computer-implemented methods, computer program products and systems for analyzing at least one feature in a layout representing an integrated circuit (ic) for an overlay effect. In some cases, approaches include a computer-implemented method including: modeling a topography of the ic by running at least one of a chemical mechanical polishing (cmp) model, a deposition model or an etch model on a data file representing the ic after formation of an uppermost layer; modeling the at least one feature in the ic for an overlay effect using the topography model of the ic; and modifying the data file representing the ic after formation of the uppermost layer in response to detecting the overlay effect in the at least one feature, the overlay effect occurring in a layer underlying the uppermost layer.. ... International Business Machines

12/29/16 / #20160378901

Applying random nets credit in an efficient static timing analysis

A method may include: specifying a random noise credit (rnc) statistic for nets subject to random noise in a static timing analysis of an initial integrated circuit (ic) design; performing an initial noise-free timing analysis of the ic design; calculating an upper bound for a delta delay of each net using the rnc statistic; identifying each net with a delta delay that exceeds the upper bound; marking all nets, including fan-in and fan-out cones, connected to each net that exceeds the upper bound; and performing a higher accuracy timing analysis for all nets that are marked. Using the upper bound for each delta delay of the nets subject to ransom noise, the delta delay of each net subject to a non-random noise, and the delta delay for all marked nets, to adjust the initial ic design, to close timing and generate a final ic design.. ... International Business Machines

12/29/16 / #20160378897

Modeling localized temperature changes on an integrated circuit chip using thermal potential theory

A temperature change of a device on an integrated circuit chip due to self-heating and thermal coupling with other device(s) is modeled considering inefficient heat removal from the backside of the chip. To perform such modeling, ratios of an imaginary heat amount to an actual heat amount for different locations on the ic chip must be predetermined using a test integrated circuit (ic) chip. ... International Business Machines

12/29/16 / #20160378888

Modeling transistor performance considering non-uniform local layout effects

In a system and method, a design layout defines a transistor, a local layout effect (lle)-inducing feature and shapes, including a non-uniform shape, that illustrate separation between the channel region and lle-inducing feature. Layout information for the non-uniform shape, including minimum and maximum distances between the channel region and lle-inducing feature, is extracted. ... International Business Machines

12/29/16 / #20160378881

Aggregating and summarizing sequences of hierarchical records

Sequences of hierarchical records are aggregated and summarized. A capture log that includes a plurality of operations of a workload is received. ... International Business Machines

12/29/16 / #20160378878

System to store user selection and provide easy retrieval and traversal

A computer implemented method and system for organizing file location bookmarks of navigations within corresponding applications. A plurality of navigation histories relating to an application are captured, in response to a user navigating a file system using an application and selecting resource locations within corresponding directories of the file system for saving. ... International Business Machines

12/29/16 / #20160378870

Profile driven presentation content displaying and filtering

The present disclosure provides for automatically detecting groups of people who may be interested in different types of content (e.g., different presentations, different presentation sections, different presentation styles). Further, the present disclosure provides for automatically providing presentation filters appropriate for each group of people.. ... International Business Machines

12/29/16 / #20160378852

Question and answer system emulating people and clusters of blended people

Embodiments are directed to an information processing system for generating answers in response to questions. The system includes a memory, a processor system communicatively coupled to the memory. ... International Business Machines

12/29/16 / #20160378851

Knowledge canvassing using a knowledge graph and a question and answer system

Mechanisms are provided for processing a knowledge canvassing request. The mechanisms receive a request specifying an entity of interest from an originator of the request and analyze the request to extract a feature of the request. ... International Business Machines

12/29/16 / #20160378844

Data synchronization using redundancy detection

Managing data in a cloud computing environment, including data transfers. File level and block level similarities are identified, including for archive and nested archive files, residing on datacenters and regional repositories. ... International Business Machines

12/29/16 / #20160378841

Visually indicating a calendar event among different time zones

A calendared event may be visually indicated. A proposed time for the calendared event can be identified and each of a plurality of event participants can be associated with the calendared event. ... International Business Machines

12/29/16 / #20160378837

Distributed processing of a search query with distributed posting lists

Provided are a computer program product, system, and method for distributed processing of a query with distributed posting lists. A dispatch map has entries, wherein each entry identifies one of a plurality of terms in a dictionary, wherein for each of the terms there is a posting list identifying zero or more objects including the term, wherein at least one of the dispatch map entries indicate at least one distributed processing element including the posting list for the term. ... International Business Machines

12/29/16 / #20160378833

Query processing using a dimension table implemented as decompression dictionaries

According to one embodiment of the present invention, a system may execute database queries and may comprise a computer system including at least one processor. The system may select a column of a first table as a candidate column for creating a dictionary, create tokens for a foreign key in a second table that corresponds to a primary key in the first table, generate the dictionary for the selected column using the created tokens as indexes in the dictionary and modify a query accessing the column of the first table to retrieve column values based on the dictionary. ... International Business Machines

12/29/16 / #20160378832

Efficient sorting of large data set with duplicate values

Techniques are disclosed for sorting an input data set. A sort tool determines a distribution of values of a data set that includes a plurality of data records. ... International Business Machines

12/29/16 / #20160378823

Distributed processing of a search query with distributed posting lists

Provided are a computer program product, system, and method for distributed processing of a query with distributed posting lists. A dispatch map has entries, wherein each entry identifies one of a plurality of terms in a dictionary, wherein for each of the terms there is a posting list identifying zero or more objects including the term, wherein at least one of the dispatch map entries indicate at least one distributed processing element including the posting list for the term. ... International Business Machines

12/29/16 / #20160378821

Expansion of a tree heirarchy

A method and associated system for selectively constructing a search result for a data requested by a search request specifying path information of a data node comprising the data. A template tree represents a hierarchy of the search result with expandable nodes which initially do not have actual data. ... International Business Machines

12/29/16 / #20160378820

Granular buffering of metadata changes for journaling file systems

Responsive to determining an in-memory image of a metadata disk block, a buffer is generated in memory and includes metadata updates made to the metadata disk block. Metadata updates to the disk block by a first transaction are recorded and stored in the buffer. ... International Business Machines

12/29/16 / #20160378818

Granular buffering of metadata changes for journaling file systems

Responsive to determining an in-memory image of a metadata disk block, a buffer is generated in memory and includes metadata updates made to the metadata disk block. Metadata updates to the disk block by a first transaction are recorded and stored in the buffer. ... International Business Machines

12/29/16 / #20160378812

Reduction of bind breaks

Embodiments of the present invention provide methods, computer program products, and systems for performing bind breaks. Embodiments of the present invention can be used to reduce bind breaks by saving a save sequence number that reflects a count associated with updates made to a data structure responsive to performing an update to a data structure, retrieving a done sequence number that reflects a count associated with completed bind breaks, and determining whether the save sequence number is less than the done sequence number. ... International Business Machines

12/29/16 / #20160378809

Massive time series correlation similarity computation

Disclosed is a novel system, computer program product, and method to compute correlation matrix with respect to massive of time-series where a threshold ε is specified such that the correlations greater than ε do not need to be computed. Correlations >=ε do not need to be computed. ... International Business Machines

12/29/16 / #20160378801

Efficient sorting of large data set with duplicate values

Techniques are disclosed for sorting an input data set. A sort tool determines a distribution of values of a data set that includes a plurality of data records. ... International Business Machines

12/29/16 / #20160378798

Aggregating and summarizing sequences of hierarchical records

Sequences of hierarchical records are aggregated and summarized. A capture log that includes a plurality of operations of a workload is received. ... International Business Machines

12/29/16 / #20160378794

Database comparison system

Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. ... International Business Machines

12/29/16 / #20160378793

Database comparison system

Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. ... International Business Machines

12/29/16 / #20160378783

Query processing using a dimension table implemented as decompression dictionaries

According to one embodiment of the present invention, a system may execute database queries and may comprise a computer system including at least one processor. The system may select a column of a first table as a candidate column for creating a dictionary, create tokens for a foreign key in a second table that corresponds to a primary key in the first table, generate the dictionary for the selected column using the created tokens as indexes in the dictionary and modify a query accessing the column of the first table to retrieve column values based on the dictionary. ... International Business Machines

12/29/16 / #20160378781

Log file analysis to locate anomalies

Method and system are provided for log file analysis to locate anomalies. The method includes comparing each line of a log file with other lines of the log file to determine duplicate and similar lines of the log file. ... International Business Machines

12/29/16 / #20160378780

Log file analysis to locate anomalies

Method and system are provided for log file analysis to locate anomalies. The method includes comparing each line of a log file with other lines of the log file to determine duplicate and similar lines of the log file. ... International Business Machines

12/29/16 / #20160378779

Free space management in a database

A row is inserted in a database table on a page having a first space reserved for inserting rows of the database table. A second space is reserved for adding data to the inserted row, wherein reserving the second space includes reserving the second space on the page responsive to inserting the row, so that the amount of space reserved for adding data to inserted rows grows as more rows are inserted. ... International Business Machines

12/29/16 / #20160378775

Maintaining versions of data in solid state memory

Various embodiments are directed to maintaining versions of data within a solid state memory. At least one request to write at least one dataset to a logical page of a solid state memory is received from a file system. ... International Business Machines

12/29/16 / #20160378760

Identification of life events within social media conversations

Identifying life events within social network feeds. The method may include receiving social media data. ... International Business Machines

12/29/16 / #20160378754

Fast query processing in columnar databases with gpus

According to one exemplary embodiment, a method for processing a query associated with a database is provided. The method may include receiving the query. ... International Business Machines

12/29/16 / #20160378751

Fast query processing in columnar databases with gpus

According to one exemplary embodiment, a method for processing a query associated with a database is provided. The method may include receiving the query. ... International Business Machines

12/29/16 / #20160378739

Editing one or more text files from an editing session for an associated text file

According to one embodiment of the present invention, a system edits text from a file inline with text from another file. The system displays text comprising content of a text file in a user interface of an editor. ... International Business Machines

12/29/16 / #20160378738

Editing one or more text files from an editing session for an associated text file

According to one embodiment of the present invention, a system edits text from a file inline with text from another file. The system displays text comprising content of a text file in a user interface of an editor. ... International Business Machines

12/29/16 / #20160378736

Managing a domain specific ontology collection

A domain specific ontology collection associated with a user is determined. At least one action of the user is received. ... International Business Machines

12/29/16 / #20160378731

Method and apparatus for intelligent capture of document object model events

A monitoring system intelligently captures document object model (dom) events. The dom events may provide state information that may not usually be captured during a web session. ... International Business Machines

12/29/16 / #20160378729

Verifying content of resources in markup language documents

A method and system for verifying content of a resource. A first computer creates, in a markup language document, a markup element including a first characteristic of the content of the resource stored at a second computer coupled to the first computer. ... International Business Machines

12/29/16 / #20160378723

Geo-cultural information based dynamic character variant rendering

For dynamically changing a rendering of content, the content including a textual character is received at a mobile device. An encoding of the textual character uses a first code point according to a character encoding standard. ... International Business Machines

12/29/16 / #20160378722

Geo-cultural information based dynamic character variant rendering

For dynamically changing a rendering of content, the content including a textual character is received at a mobile device. An encoding of the textual character uses a first code point according to a character encoding standard. ... International Business Machines

12/29/16 / #20160378712

Lock-free processing of stateless protocols over rdma

Methods, systems, and computer storage mediums including a computer program product for managing data in a computing network are provided. One method includes registering a plurality of buffers with a work queue in a server and assigning ownership to each of the plurality of buffers to a different working thread in a plurality of working threads. ... International Business Machines

12/29/16 / #20160378703

Management of allocation for alias devices

An input/output (i/o) request is received that indicates a priority for performing the received i/o request by a storage controller. If a base device is not available to handle the received i/o request, whether the received i/o request is eligible for performance throttling is determined. ... International Business Machines

12/29/16 / #20160378700

Non-interfering transactions

Embodiments relate to non-interfering transactions. An aspect includes receiving, by a first transaction, a conflicting remote access request from a requester, the remote access request being directed to a memory area that is owned as part of at least one of a transactional read set and transactional write set by the first transaction. ... International Business Machines

12/29/16 / #20160378694

Management of allocation for alias devices

Embodiments of the present invention provide systems, methods, and computer program products for managing computing devices to handle an input/output (i/o) request. In one embodiment, the i/o request may eligible for performance throttling based, at least in part, on the associated importance level for performing the received i/o request and one or more characteristics of the received i/o request. ... International Business Machines

12/29/16 / #20160378681

Page compression strategy for improved page out process

A page compression strategy classifies uncompressed pages selected for compression. Similarly classified pages are compressed and bound into a single logical page. ... International Business Machines

12/29/16 / #20160378675

Generating data tables

The method includes identifying a first data table that includes a set of rows and a structure. The method further includes creating a second data table and a third data table having a matching structure as the first table. ... International Business Machines

12/29/16 / #20160378673

Hybrid tracking of transaction read and write sets

Embodiments of the invention relate to tracking processor transactional read and write sets, thereby eliminating speculative mispredictions. Both non-speculative read set and write set indications are maintained for a transaction. ... International Business Machines

12/29/16 / #20160378670

Dynamic structural management of a distributed caching infrastructure

Embodiments of the present invention provide a method, system and computer program product for the dynamic structural management of an n-tier distributed caching infrastructure. In an embodiment of the invention, a method of dynamic structural management of an n-tier distributed caching infrastructure includes establishing a communicative connection to a plurality of cache servers arranged in respective tier nodes in an n-tier cache, collecting performance metrics for each of the cache servers in the respective tier nodes of the n-tier cache, identifying a characteristic of a specific cache resource in a corresponding one of the tier nodes of the n-tier crossing a threshold, and dynamically structuring a set of cache resources including the specific cache resource to account for the identified characteristic.. ... International Business Machines

12/29/16 / #20160378669

Multiple window based segment prefetching

A method, a computer program product, and a computer system for implementing multiple window based segment prefetch used for data pages that are out of sequence. A computer initiates a buffer for the segment prefetch. ... International Business Machines

12/29/16 / #20160378666

Client voting-inclusive in-memory data grid (imdg) cache management

A client application cache access profile is created that documents accesses over time to data cached within an in-memory data grid (imdg) cache by each of a set of client applications that utilize the imdg. A new data request is received from one of the set of client applications that includes a client-application data caching vote that specifies whether the requesting client application wants the newly-requested data cached. ... International Business Machines

12/29/16 / #20160378663

System operation queue for transaction

Embodiments relate to a system operation queue for a transaction. An aspect includes determining whether a system operation is part of an in-progress transaction of a central processing unit (cpu). ... International Business Machines

12/29/16 / #20160378662

Hybrid tracking of transaction read and write sets

Embodiments of the invention relate to tracking processor transactional read and write sets, thereby eliminating speculative mis-predictions. Both non-speculative read set and write set indications are maintained for a transaction. ... International Business Machines

12/29/16 / #20160378659

Hybrid tracking of transaction read and write sets

Embodiments of the invention relate to tracking processor transactional read and write sets, thereby eliminating speculative mis-predictions. Both non-speculative read set and write set indications are maintained for a transaction. ... International Business Machines

12/29/16 / #20160378658

Hybrid tracking of transaction read and write sets

Embodiments of the invention relate to tracking processor transactional read and write sets, thereby eliminating speculative mispredictions. Both non-speculative read set and write set indications are maintained for a transaction. ... International Business Machines

12/29/16 / #20160378657

Non-default instruction handling within transaction

Embodiments relate to non-default instruction handling within a transaction. An aspect includes entering a transaction, the transaction comprising a first plurality of instructions and a second plurality of instructions, wherein a default manner of handling of instructions in the transaction is one of atomic and non-atomic. ... International Business Machines

12/29/16 / #20160378654

Optimizing performance of tiered storage

Embodiments of the invention relate to a storage system organized into a hierarchy of storage tiers, with at least one tier reflecting a high performance tier and at least one tier reflecting a lower performance tier. The high performance tier has a capacity restriction and has a limited quantity of blocks and pages may be placed in the tier. ... International Business Machines

12/29/16 / #20160378649

Testing functional correctness and idempotence of software automation scripts

Various embodiments automatically test software automation scripts. In one embodiment, at least one software automation script is obtained. ... International Business Machines

12/29/16 / #20160378648

Dynamic ranking of performance issues for applications

Identification and dynamic ranking of performance issues. For an instance of a performance anti-pattern, identifying and recording information relating to a resultant performance issue, quantifying the magnitude of the performance issue, and dynamically ranking the performance issue against other performance issues.. ... International Business Machines

12/29/16 / #20160378645

Generating data tables

The method includes identifying a first data table that includes a set of rows and a structure. The method further includes creating a second data table and a third data table having a matching structure as the first table. ... International Business Machines

12/29/16 / #20160378644

Flexible configuration and control of a testing system

A method is provided to get a high test coverage through a large number of test cases with a minimum number of test programs. Tests are performed flexibly in various environments, using parameters in multiple dimensions. ... International Business Machines

12/29/16 / #20160378643

Creating software performance testing environment based on virtual machine

The present invention relates to a virtual machine, and specifically discloses a method and apparatus for creating a software performance testing environment based on a virtual machine, wherein the method comprises: in response to obtaining a hard disk read/write request triggered by a virtual cpu of the virtual machine, notifying a virtual cpu scheduler to record a cpu time quota t1 already consumed by the virtual cpu in a current cpu schedule period; in response to detecting completion of hard disk read/write processing corresponding to the hard disk read/write request, predicting a hard disk read/write latency t corresponding to the hard disk read/write request in a target environment; notifying the virtual cpu scheduler to determine a cpu time quota already consumed by the virtual cpu in the current cpu schedule period based on the recorded cpu time quota t1 and the hard disk read/write latency t; and adjusting a system clock of the virtual machine based on the determined cpu time quota already consumed by the virtual cpu in the current cpu schedule period. The method according to the embodiments of the present invention may obtain, in the created software performance testing environment, a software performance testing result consistent with the result obtained under a highly configured server in the target environment.. ... International Business Machines

12/29/16 / #20160378642

Evaluating user interface usability for task completion

According to one embodiment of the present invention, a system for tracking and presenting states of a user interface includes at least one processor. The at least one processor may be configured to track the visibility and usage of each of a plurality of areas of a user interface. ... International Business Machines

12/29/16 / #20160378638

Testing functional correctness and idempotence of software automation scripts

Various embodiments automatically test software automation scripts. In one embodiment, at least one software automation script is obtained. ... International Business Machines

12/29/16 / #20160378631

Validating power paths to it equipment

A computer-implemented method, computer program product, and computer system for identifying power line segments and power line redundancies in a datacenter are provided. The computer-implemented method for identifying power line segments and power line redundancies in a datacenter include; transmitting a data packet from equipment compilers to a host program, where the data packet includes unique datacenter equipment identifiers, the datacenter equipment includes it equipment and a power source; identifying one or more power line segments from the power source to the it equipment; and determining an existence of a power line redundancy between the power source and the it equipment.. ... International Business Machines

12/29/16 / #20160378627

Flexible configuration and control of a testing system

A method is provided to get a high test coverage through a large number of test cases with a minimum number of test programs. Tests are performed flexibly in various environments, using parameters in multiple dimensions. ... International Business Machines

12/29/16 / #20160378626

Efficiency of cycle-reproducible debug processes in a multi-core environment

An approach for improving efficiency of cycle-reproducible debug in a multi-core environment is provided. The approach executes an exerciser image on one or more cores, wherein the exerciser image includes one or more different seeds. ... International Business Machines

12/29/16 / #20160378625

Reverse resynchronization by a secondary data source when a data destination has more recent data

Methods, computing systems and computer program products implement embodiments of the present invention that include configuring a first storage system to mirror first storage regions to corresponding second storage regions in a second storage system via a first data connection, and to mirror the first storage regions to corresponding third storage regions in a third storage system via a second data connection. Upon the second storage system receiving, subsequent to detecting a failure of the first storage system, a host i/o request to retrieve data from a given second storage region and determining that the respective timestamp of the corresponding third storage region on the third storage system is more recent than the respective timestamp of the given second storage region on the second storage system, the second storage system retrieves, via a third data connection, the data from the corresponding third storage region on the third storage system.. ... International Business Machines

12/29/16 / #20160378618

Risk formula for erroneous software components detection

A method for performing software error detection and prediction. The method includes identifying a plurality of software components in a computer software product. ... International Business Machines

12/29/16 / #20160378610

Failure recovery of distributed control of power and thermal management

Component power consumption is collected from each of a plurality of controllers of a node having a plurality of components. The component power consumption is provided to each of the plurality of controllers. ... International Business Machines

12/29/16 / #20160378609

Alternative port error recovery with limited system impact

Various embodiments for troubleshooting a network device in a computing storage environment by a processor. A determination is made if a parity error in a specific port is either an instruction cache parity error or a recoverable data cache type parity error. ... International Business Machines

12/29/16 / #20160378600

File level defined de-clustered redundant array of independent storage devices solution

A raid (redundant array of independent storage devices) storage system where a file is stored at a physical protection level corresponding to a raid protection level defined by metadata included in and/or with the file to be stored.. . ... International Business Machines

12/29/16 / #20160378586

Validating system registry files in a dispersed storage network

A method for execution by a dispersed storage and task (dst) execution unit includes receiving system registry integrity data via a network that corresponds to a plurality of system registry files, a request for a subset of the plurality of system registry files is generated for transmission to a dispersed storage network (dsn) unit via the network. The subset of system registry files are received from the dsn unit via the network. ... International Business Machines

12/29/16 / #20160378581

Efficiency of cycle-reproducible debug processes in a multi-core environment

An approach for improving efficiency of cycle-reproducible debug in a multi-core environment is provided. The approach executes an exerciser image on one or more cores, wherein the exerciser image includes one or more different seeds. ... International Business Machines

12/29/16 / #20160378573

Scalable rcu callback offloading

In order to scale read-copy update (rcu) callback offloading from no-callbacks (no-cbs) cpus, a set of rcu callback offload kernel threads (rcuo kthreads) may be spawned and each may be assigned to one of the no-cbs cpus to invoke rcu callbacks generated by workloads running on the no-cbs cpus at cpus that are not no-cbs cpus. Groups of the rcuo kthreads may be established, with each rcuo kthread group having one leader kthread and one or more follower rcuo kthreads. ... International Business Machines

12/29/16 / #20160378572

Optimizing the initialization of a queue via a batch operation

A method, a computer program product, and a system for performing a batch processing are provided. The batch processing includes initializing a set of elements corresponding to a set of resources to produce an initialized group and chaining the initialized group to previously initialized elements to produce an element batch, when the previously initialized elements are available. ... International Business Machines

12/29/16 / #20160378571

Management of asynchronous and synchronous resource requests

Managing requests for acquiring resources in a computing environment. A first request to acquire resources is received. ... International Business Machines

12/29/16 / #20160378566

Runtime fusion of operators

The streams environment includes a plurality of operators coupled with processing elements including a first processing element coupled with a first operator instructed with a first programming instructions, and a second processing element coupled with a second operator instructed with a second programming instructions. A workload of the first processing element and a workload of the second processing element are measured. ... International Business Machines

12/29/16 / #20160378562

Job distribution within a grid environment

According to one aspect of the present disclosure, a technique for job distribution within a grid environment includes receiving jobs at a submission cluster for distribution of the jobs to at least one of a plurality of execution clusters where each execution cluster includes one or more execution hosts. Resource attributes are determined corresponding to each execution host of the execution clusters. ... International Business Machines

12/29/16 / #20160378561

Job distribution within a grid environment

According to one aspect of the present disclosure, a technique for job distribution within a grid environment includes receiving jobs at a submission cluster for distribution of the jobs to at least one of a plurality of execution clusters where each execution cluster includes one or more execution hosts. Resource attributes are determined corresponding to each execution host of the execution clusters. ... International Business Machines

12/29/16 / #20160378555

Generating timing sequence for activating resources linked through time dependency relationships

A method, and associated computer program product and computer system. A direct acyclic graph (dag) includes nodes and directed edges. ... International Business Machines

12/29/16 / #20160378550

Optimization of application workflow in mobile embedded devices

An aspect includes optimizing an application workflow. The optimizing includes characterizing the application workflow by determining at least one baseline metric related to an operational control knob of an embedded system processor. ... International Business Machines

12/29/16 / #20160378544

Intellective switching between tasks

Methods, computer program products, and system are presented. The methods include, for instance: identifying, by one or more processor, a current task, obtaining, by the one or more processor, an indicator of a commencement of a switching event, where the switching event includes a transition originating from the current task and concluding at a new task, obtaining, by the one or more processor, behavior analysis data relating to a plurality of past switching events, where each past switching event includes a transition originating from the current task and concluding at a target task. ... International Business Machines

12/29/16 / #20160378542

Multithreaded transactions

Embodiments relate to multithreaded transactions. An aspect includes assigning a same transaction identifier (id) corresponding to the multithreaded transaction to a plurality of threads of the multithreaded transaction, wherein the plurality of threads execute the multithreaded transaction in parallel. ... International Business Machines

12/29/16 / #20160378541

Address probing for transaction

Embodiments relate to address probing for a transaction. An aspect includes determining, before starting execution of a transaction, a plurality of addresses that will be used by the transaction during execution. ... International Business Machines

12/29/16 / #20160378540

Multithreaded transactions

Embodiments relate to multithreaded transactions. An aspect includes assigning a same transaction identifier (id) corresponding to the multithreaded transaction to a plurality of threads of the multithreaded transaction, wherein the plurality of threads execute the multithreaded transaction in parallel. ... International Business Machines

12/29/16 / #20160378539

Migrating virtual machines based on relative priority of virtual machine in the context of a target hypervisor environment

A method, system and computer program product for selecting a target hypervisor to run a migrated virtual machine. An “effective priority value,” representing the virtual machine's priority with respect to the other virtual machines running on the same hypervisor, is calculated for the virtual machine when it is running on the source hypervisor as well as if it were to run on a target hypervisor for each possible target hypervisor. ... International Business Machines

12/29/16 / #20160378531

Adjusting virtual machine migration plans based on alert conditions related to future migrations

Migration of virtual machines within a computing environment is facilitated. A processor obtains a current virtual machine to host mapping in the computing environment, as well as a plurality of future virtual machine to host mappings. ... International Business Machines

12/29/16 / #20160378523

Performance of virtual machine fault tolerance micro-checkpointing using transactional memory

Techniques disclosed herein generally describe providing fault tolerance in a virtual machine cluster using hardware transactional memory. According to one embodiment, a micro-checkpointing tool suspends execution of a virtual machine instance on a primary server. ... International Business Machines

12/29/16 / #20160378521

Automated test optimization

As disclosed herein a method, executed by a computer, includes receiving an indication from a test monitoring operation that an automated test has reached an input checkpoint on a first virtual machine, and receiving a plurality of input responses corresponding to the input checkpoint. The method further includes communicating with a hypervisor to request creation of at least one cloned virtual machine, corresponding to the first virtual machine, to provide a plurality of virtual machines. ... International Business Machines

12/29/16 / #20160378520

Adjusting virtual machine migration plans based on alert conditions related to future migrations

Migration of virtual machines within a computing environment is facilitated. A processor obtains a current virtual machine to host mapping in the computing environment, as well as a plurality of future virtual machine to host mappings. ... International Business Machines

12/29/16 / #20160378514

Automated testing of gui mirroring

Testing correct mirroring of a gui. Two gui specifications are received, a reference gui specification and a mirrored gui specification that corresponds to a horizontally mirrored version of the reference gui specification. ... International Business Machines

12/29/16 / #20160378508

Jni object access

Embodiments of the present invention disclose a method, system, and computer program product for a jni object access system. A computer receives a jni reference and obtains the pointer data and call site of the referenced object. ... International Business Machines

12/29/16 / #20160378505

System operation queue for transaction

Embodiments relate to a system operation queue for a transaction. An aspect includes determining whether a system operation is part of an in-progress transaction of a central processing unit (cpu). ... International Business Machines

12/29/16 / #20160378504

Techniques to wake-up dependent instructions for back-to-back issue in a microprocessor

Techniques are disclosed for back-to-back issue of instructions in a processor. A first instruction is stored in a queue position in an issue queue. ... International Business Machines

12/29/16 / #20160378503

Techniques to wake-up dependent instructions for back-to-back issue in a microprocessor

Techniques are disclosed for back-to-back issue of instructions in a processor. A first instruction is stored in a queue position in an issue queue. ... International Business Machines

12/29/16 / #20160378501

Split-level history buffer in a computer processing unit

A split level history buffer in a central processing unit is provided. A history buffer is partitioned into a first portion and a second portion, wherein the first portion includes a first tagged instruction. ... International Business Machines

12/29/16 / #20160378500

Split-level history buffer in a computer processing unit

A split level history buffer in a central processing unit is provided. A history buffer is partitioned into a first portion and a second portion, wherein the first portion includes a first tagged instruction. ... International Business Machines

12/29/16 / #20160378489

Register file mapping

An apparatus for processing instructions includes a mapping unit comprising a plurality of mappers wherein each mapper of the plurality of mappers maps a logical sub-register reference to a physical sub-register reference, a decoding unit configured to receive an instruction and determine a plurality of logical sub-register references therefrom, and an execution unit. The mapping unit may be configured to distribute the plurality of logical sub-register references amongst the plurality of mappers according to at least one bit in the instruction and provide a corresponding plurality of physical sub-register references. ... International Business Machines

12/29/16 / #20160378485

Efficient quantization of compare results

A set machine instruction is provided that has associated therewith a result location to be used with a set operation. The set machine instruction is executed, which includes checking contents of a selected field, and determining, based on the checking, whether the contents of the selected field indicate a first condition, a second condition or a third condition represented in one data type. ... International Business Machines

12/29/16 / #20160378482

Efficient quantization of compare results

A set machine instruction is provided that has associated therewith a result location to be used with a set operation. The set machine instruction is executed, which includes checking contents of a selected field, and determining, based on the checking, whether the contents of the selected field indicate a first condition, a second condition or a third condition represented in one data type. ... International Business Machines

12/29/16 / #20160378478

Instructions to count contiguous register elements having specific values

A machine instruction to find a condition location within registers, such as vector registers. The machine instruction has associated therewith a register to be examined and a result location. ... International Business Machines

12/29/16 / #20160378476

Non-default instruction handling within transaction

Embodiments relate to non-default instruction handling within a transaction. An aspect includes entering a transaction, the transaction comprising a first plurality of instructions and a second plurality of instructions, wherein a default manner of handling of instructions in the transaction is one of atomic and non-atomic. ... International Business Machines

12/29/16 / #20160378475

Instruction to perform a logical operation on conditions and to quantize the boolean result of that operation

A machine instruction is provided that has associated therewith a result location to be used for a set operation, a first source, a second source, and an operation select field configured to specify a plurality of selectable operations. The machine instruction is executed, which includes obtaining the first source, the second source, and a selected operation, and performing the selected operation on the first source and the second source to obtain a result in one data type. ... International Business Machines

12/29/16 / #20160378474

Conversion of boolean conditions

A set boolean machine instruction is provided that has associated therewith a result location to be used for a set boolean operation and a mask. The mask is configured to test a plurality of types of conditions, including simple conditions and composite conditions. ... International Business Machines

12/29/16 / #20160378469

Instruction to perform a logical operation on conditions and to quantize the boolean result of that operation

A machine instruction is provided that has associated therewith a result location to be used for a set operation, a first source, a second source, and an operation select field configured to specify a plurality of selectable operations. The machine instruction is executed, which includes obtaining the first source, the second source, and a selected operation, and performing the selected operation on the first source and the second source to obtain a result in one data type. ... International Business Machines

12/29/16 / #20160378468

Conversion of boolean conditions

A set boolean machine instruction is provided that has associated therewith a result location to be used for a set boolean operation and a mask. The mask is configured to test a plurality of types of conditions, including simple conditions and composite conditions. ... International Business Machines

12/29/16 / #20160378463

Selective notifications according to merge distance for software version branches within a software configuration management system

A computer-implemented method of controlling version branching within a software configuration management system (scms) can include, responsive to a user initiating a check-out operation of a file within the scms, identifying the file and a workspace of the user and searching nodes of the repositories of the scms for a successor version of the file. When a successor version of the file is located within a node that is within a predetermined distance of the workspace of the user, a notification that the successor version of the file is within the predetermined distance of the workspace of the user can be output. ... International Business Machines

12/29/16 / #20160378459

Systems management based on semantic models and low-level runtime state

Various embodiments manage deployable computing environments. In one embodiment, a semantic model of a computing environment is analyzed. ... International Business Machines

12/29/16 / #20160378405

Scheduling storage unit maintenance tasks in a dispersed storage network

A method for execution by a dispersed storage and task (dst) execution unit includes generating low-load prediction data, which includes selecting a time period corresponding to a predicted low-load, based on a plurality of historical load samplings. Maintenance task scheduling data is generated based on the low-load prediction data. ... International Business Machines

12/29/16 / #20160378403

Silent store detection and recording in memory storage

An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. ... International Business Machines

12/29/16 / #20160378399

Affinity-aware parallel zeroing of memory in non-uniform memory access (numa) servers

Embodiments disclosed herein generally relate to techniques for zeroing memory in computing systems where access to memory is non-uniform. One embodiment provides a method which includes receiving, via a system call, a request to delete a memory region. ... International Business Machines

12/29/16 / #20160378398

Off-line affinity-aware parallel zeroing of memory in non-uniform memory access (numa) servers

Embodiments disclosed herein generally relate to techniques for zeroing memory in computing systems where access to memory is non-uniform. One embodiment provides a method which includes receiving, via a system call, a request to delete a memory region. ... International Business Machines

12/29/16 / #20160378397

Affinity-aware parallel zeroing of pages in non-uniform memory access (numa) servers

Embodiments disclosed herein generally relate to techniques for zeroing memory in computing systems where access to memory is non-uniform. One embodiment provides a processor which performs an operation including receiving, via a system call, a request to delete a memory region. ... International Business Machines

12/29/16 / #20160378395

Rebalancing data storage in a dispersed storage network

A method for execution by a dispersed storage and task (dst) execution unit includes generating location weight data that includes a plurality of location weights assigned to a plurality of memory devices of the dst execution unit. A first one of the plurality of memory devices and a second one of the plurality of memory devices are selected for reallocation based on the location weight data. ... International Business Machines

12/29/16 / #20160378394

Shifting a defrag operation in a mirrored system

A method for defragmenting volumes in a mirrored system. The method includes suspending one or more updates from being mirrored from a first set of tracks on a first server to a second set of tracks on a second server. ... International Business Machines

12/29/16 / #20160378390

Reusing a duplexed storage resource

Embodiments of the present invention provide methods, program products, and systems for reusing a duplex storage medium resource. Embodiments of the present invention can be used to transition between duplex media by determining that a prior transition from a first duplex storage media to a second duplex storage media is being performed and reinitializing the second duplex storage media to receive, for storage, duplex data transferred from the first duplex storage media. ... International Business Machines

12/29/16 / #20160378388

Affinity-aware parallel zeroing of memory for initialization of large pages in non-uniform memory access (numa) servers

Embodiments disclosed herein generally relate to techniques for zeroing memory in computing systems where access to memory is non-uniform. Embodiments include a system having a processor and a memory storing a program; and other embodiments include a computer readable medium containing a program. ... International Business Machines

12/29/16 / #20160378386

Low power storage array with metadata access

A computer system for low power storage array with metadata access includes sequentially writing data to a currently active disk drive in a storage array and storing metadata relating to the writes in a preallocated portion of the currently active disk drive, determining when the currently active disk drive is nearing full capacity, activating a next disk drive and cloning the stored metadata from the preallocated portion of the currently active disk drive to a preallocated portion of the next disk drive. When the currently active disk drive is full, sequentially writing data to the next disk drive.. ... International Business Machines

12/29/16 / #20160378382

Address probing for transaction

Embodiments relate to address probing for a transaction. An aspect includes determining, before starting execution of a transaction, a plurality of addresses that will be used by the transaction during execution. ... International Business Machines

12/29/16 / #20160378380

Managing a set of blocks in a storage system

Disclosed aspects include management of a set of blocks in a storage system. A set of write requests is initiated to the set of blocks. ... International Business Machines

12/29/16 / #20160378378

Data access to a storage tier on a client in a multi-tiered storage system

Embodiments of the present disclosure may relate to methods and a computer program product for allowing writes based on a granularity level. The method for a storage server may include receiving a received granularity level for a particular volume of a storage device of a client computer including an effective duration for the received granularity level. ... International Business Machines

12/29/16 / #20160378374

Silent store detection and recording in memory storage

An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. ... International Business Machines

12/29/16 / #20160378372

Performance of virtual machine fault tolerance micro-checkpointing using transactional memory

Techniques disclosed herein generally describe providing fault tolerance in a virtual machine cluster using hardware transactional memory. According to one embodiment, a micro-checkpointing tool suspends execution of a virtual machine instance on a primary server. ... International Business Machines

12/29/16 / #20160378371

Host-side acceleration for improved storage grid performance

Various embodiments for data management in a storage grid, by a processor device, are provided. In one embodiment, a method comprises directing data input/output (i/o) operations from a host to an owning node according to a logical block address (lba) without a static assignment of ownership, notwithstanding any relationship between the host and the storage grid.. ... International Business Machines

12/29/16 / #20160378369

Performing post-processing operations for log file writes

A storage controller receives one or more host writes to a log file. A track is allocated to the log file. ... International Business Machines

12/29/16 / #20160378368

Performing preprocessing operations in anticipation of log file writes

A location of a log file is determined, wherein data corresponding to writes is written sequentially starting from a starting block of the log file. A determination is made in the log file of a range of blocks in which data corresponding to a next write is anticipated to be written. ... International Business Machines

12/29/16 / #20160378367

Silent store detection and recording in memory storage

An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. ... International Business Machines

12/29/16 / #20160378362

Reusing a duplexed storage resource

Embodiments of the present invention provide methods, program products, and systems for reusing a duplex storage medium resource. Embodiments of the present invention can be used to transition between duplex media by determining that a prior transition from a first duplex storage media to a second duplex storage media is being performed and reinitializing the second duplex storage media to receive, for storage, duplex data transferred from the first duplex storage media. ... International Business Machines

12/29/16 / #20160378350

Security checks for proxied requests

A method begins by a storage unit of a dispersed storage network (dsn) executing transitioning storage of one or more groups of encoded data slices. The method continues while transitioning storage of the one or more groups of encoded data slices with the storage unit receiving a proxied data access request regarding an encoded data slice from another storage unit of the dsn. ... International Business Machines

12/29/16 / #20160378343

Non-volatile memory drive partitions within microcontrollers

A method for managing data on a microcontroller. The method includes a computer processor receiving data to write to the memory of a microcontroller of a field-replaceable unit (fru). ... International Business Machines

12/29/16 / #20160378342

Adaptive storage-aware multipath management

Various embodiments for multipath management in a storage grid, by a processor device, are provided. In one embodiment, a method comprises continuously monitoring and comparing current data path devices against the current storage structure, and changing routing decision configurations when it is detected there is a more efficient data path.. ... International Business Machines

12/29/16 / #20160378341

Non-volatile memory drive partitions within microcontrollers

A method for managing data on a microcontroller. The method includes a computer processor receiving data to write to the memory of a microcontroller of a field-replaceable unit (fru). ... International Business Machines

12/29/16 / #20160378339

Reducing stress on raids under rebuild

A method for reducing stress on a raid under rebuild is disclosed herein. In one embodiment, such a method includes performing the following actions while the raid is undergoing a rebuild process: (1) redirect writes intended for the raid to a temporary storage area located on a same primary storage system as the raid, and (2) redirect reads intended for the raid to a secondary storage system configured to store a copy of data in the raid. ... International Business Machines

12/29/16 / #20160378338

Selective write control

Provided are a computer program product, system, and method for selective write control in accordance with the present description. In one aspect, a write operation which is associated with a read operation, may be selectively discarded if write operations have been disabled and if the write operation is directed to update a designated write operation acceptance area such as metadata associated with the target data set, for example. ... International Business Machines

12/29/16 / #20160378328

Inferring insights from enhanced user input

A method and associated systems for inferring insights from enhanced user input. A computerized messaging system identifies a user operating a mobile, location-enabled, “scribble” device and associates the user or the device with a domain of interest or with other metadata that characterizes the user. ... International Business Machines

12/29/16 / #20160378313

Moving an object displayed on a display screen

A method, system, and/or computer program product moves a movable object displayed on a display screen using an electronic device. The method comprises the electronic device displaying a first frame around a first area on a display screen, and displaying a second frame around a second area on the display screen. ... International Business Machines

12/29/16 / #20160378309

Reconfiguring a user interface according to interface device deterioration

For reconfiguring a user interface (ui) layout according to a deterioration of an interface device, a ui layout is analyzed to determine a position of a ui element on the interface device according to the ui layout determination is made that the ui element is positioned in a first area of the interface device, the first area having a first sensitivity to touch, where the first sensitivity is below a level of sensitivity. A second area of the interface device is identified, the second area having a second sensitivity to touch, where the second sensitivity is at least equal to the level of sensitivity. ... International Business Machines

12/29/16 / #20160378304

Automated testing of gui mirroring

Testing correct mirroring of a gui. Two gui specifications are received, a reference gui specification and a mirrored gui specification that corresponds to a horizontally mirrored version of the reference gui specification. ... International Business Machines

12/29/16 / #20160378289

Reconfiguring a user interface according to interface device deterioration

For reconfiguring a user interface (ui) layout according to a deterioration of an interface device, a ui layout is analyzed to determine a position of a ui element on the interface device according to the ui layout determination is made that the ui element is positioned in a first area of the interface device, the first area having a first sensitivity to touch, where the first sensitivity is below a level of sensitivity. A second area of the interface device is identified, the second area having a second sensitivity to touch, where the second sensitivity is at least equal to the level of sensitivity. ... International Business Machines

12/29/16 / #20160378288

Moving an object displayed on a display screen

A method, system, and/or computer program product moves a movable object displayed on a display screen using an electronic device. The method comprises the electronic device displaying a first frame around a first area on a display screen, and displaying a second frame around a second area on the display screen. ... International Business Machines

12/29/16 / #20160378275

Screen reader improvements

One or more aspects relate to providing a user interface menu in a screen reader reading an application. A graphical user interface (gui) is screen scraped to determine gui components and a user option menu is created including user options corresponding to the determined gui components. ... International Business Machines

12/29/16 / #20160378274

Usability improvements for visual interfaces

One or more aspects relate to a screen reader. Markup code for a visual interface containing at least one visual control is located. ... International Business Machines

12/29/16 / #20160378235

Rotating ring for device control

A ring device to be worn on a digit of a user is provided. The ring device includes an inner ring suitable to be worn on a digit of a user and a housing rotatably coupled to the inner ring. ... International Business Machines

12/29/16 / #20160378214

Mobile application interaction guide via tactile feedback

A method includes detecting, by a contact sensing layer, a position of one or more fingers of a mobile device user, the contact sensing layer is located in a back area of a mobile device and the one or more fingers of the mobile device user are in direct contact with the contact sensing layer, receiving the detected position of the one or more fingers, identifying a plurality of advanced features contained in at least one software application running on the mobile device, selecting a feedback type based on the plurality of advanced features, and sending the selected feedback type to an interactive layer of the mobile device causing the interactive layer to generate a notification which is detectable by the one or more fingers, the notification communicates at least one of the advanced features to the mobile device user.. . ... International Business Machines

12/29/16 / #20160378201

Dynamic alteration of input device parameters based on contextualized user model

A method for dynamically altering computer input device parameters based on a contextualized user model, including measuring environmental factors that effect a user's input device, monitoring a user's historical use of a computing device to determine the user's input device parameters, using environmental factors and user's input device parameters to parameterize a cognitive model for the user and expected state transitions, using the cognitive model to predict optimal settings of the user input devices, and comparing the predicted optimal settings to desired user interface modifications, and adjusting the input device to generate these modifications.. . ... International Business Machines

12/29/16 / #20160378188

Mobile application interaction guide via tactile feedback

A method includes detecting, by a contact sensing layer, a position of one or more fingers of a mobile device user, the contact sensing layer is located in a back area of a mobile device and the one or more fingers of the mobile device user are in direct contact with the contact sensing layer, receiving the detected position of the one or more fingers, identifying a plurality of advanced features contained in at least one software application running on the mobile device, selecting a feedback type based on the plurality of advanced features, and sending the selected feedback type to an interactive layer of the mobile device causing the interactive layer to generate a notification which is detectable by the one or more fingers, the notification communicates at least one of the advanced features to the mobile device user.. . ... International Business Machines

12/29/16 / #20160378184

Rotating ring for device control

A ring device to be worn on a digit of a user is provided. The ring device includes an inner ring suitable to be worn on a digit of a user and a housing rotatably coupled to the inner ring. ... International Business Machines

12/29/16 / #20160378163

Clustering execution in a processing system to increase power savings

Embodiments relate to clustering execution in a processing system. An aspect includes accessing a control flow graph that defines a data dependency and an execution sequence of a plurality of tasks of an application that executes on a plurality of system components. ... International Business Machines

12/29/16 / #20160378162

Validating power paths to it equipment

A computer-implemented method for identifying power line segments and power line redundancies in a datacenter are provided. The computer-implemented method for identifying power line segments and power line redundancies in a datacenter include; transmitting a data packet from equipment compilers to a host program, where the data packet includes unique datacenter equipment identifiers, the datacenter equipment includes it equipment and a power source; identifying one or more power line segments from the power source to the it equipment; and determining an existence of a power line redundancy between the power source and the it equipment.. ... International Business Machines

12/29/16 / #20160378161

Clustering execution in a processing system to increase power savings

Embodiments relate to clustering execution in a processing system. An aspect includes accessing a control flow graph that defines a data dependency and an execution sequence of a plurality of tasks of an application that executes on a plurality of system components. ... International Business Machines

12/29/16 / #20160378158

Failure recovery of distributed control of power and thermal management

An apparatus includes a plurality of components and a plurality of component controllers. Each of the plurality of component controllers is associated with at least one component of the plurality of components. ... International Business Machines

12/29/16 / #20160378124

Active perforation for advanced server cooling

Embodiments of the present disclosure generally relate to the thermal management and regulation of electronic equipment. Microfluidic channels are utilized to actively change the aerodynamics of a surface, which may allow for the ability to change a surface texture from flat to raised, or dimpled, or from open to closed. ... International Business Machines

12/29/16 / #20160378100

Prosthetic device control with a wearable device

A method, computer program product and computer system for mode selection of a prosthesis is provided. A processor of a wearable device receives a first input from a user. ... International Business Machines

12/29/16 / #20160378081

Collaborative adjustment of resources within a managed environment

A method for adjusting a resource within an area utilizing voting by users. The method includes a computer processor receiving a request from one or more of the users to adjust a resource. ... International Business Machines

12/29/16 / #20160377817

Single-mode polymer waveguide connector

Waveguide connectors and methods of forming the same include heating a polymer waveguide having one or more waveguide cores and alignment features to a first temperature. A ferrule having alignment features is heated to the first temperature, the ferrule having a different coefficient of thermal expansion from the polymer waveguide. ... International Business Machines

12/29/16 / #20160377816

Single-mode polymer waveguide connector

Waveguide connectors include a ferrule having first alignment features. A polymer waveguide has one or more a topclad portions, each with a waveguide core, second alignment features fastened to the first alignment features, and underclad portion that is thicker than the one or more topclad portions. ... International Business Machines

12/29/16 / #20160377806

Multilevel waveguide structure

Integrated optical structures include a first wafer layer, a first insulator layer directly connected to the top of the first wafer layer, a second wafer layer directly connected to the top of the first insulator layer, a second insulator layer directly connected to the top of the second wafer layer, and a third wafer layer directly connected to the top of the second insulator layer. Such structures include: a first optical waveguide positioned within the second wafer layer; an optical coupler positioned within the second wafer layer, the second insulator layer, and the third wafer layer; and a second optical waveguide positioned within the third wafer layer. ... International Business Machines

12/29/16 / #20160377805

Mems based photonic devices and methods for forming

Various particular embodiments include a primary waveguide including an end section; cantilevered waveguides, each cantilevered waveguide including an end section disposed adjacent the end section of the primary waveguide; and control pins for applying an electrical bias to the cantilevered waveguides to selectively displace the end sections of the cantilevered waveguides away from the end section of the primary waveguide.. . ... International Business Machines

12/29/16 / #20160377680

Efficiency of cycle-reproducible debug processes in a multi-core environment

An approach for improving efficiency of cycle-reproducible debug in a multi-core environment is provided. The approach executes an exerciser image on one or more cores, wherein the exerciser image includes one or more different seeds. ... International Business Machines

12/29/16 / #20160377674

Integrated circuit chip reliability qualification using a sample-specific expected fail rate

Disclosed is a method for performing reliability qualification of manufactured integrated circuit (ic) chips. In the method, ic chips are manufactured according to a design and sorted into groups, which correspond to different process windows within a process distribution for the design. ... International Business Machines

12/29/16 / #20160377672

On-chip combined hot carrier injection and bias temperature instability monitor

Methods and circuits for monitoring circuit degradation include measuring degradation in a plurality of on-chip test oscillators that vary according to a quantity that influences hot carrier injection (hci) degradation. The measured degradation for the plurality of test oscillators is extrapolated to determine a bias temperature instability (bti) contribution to the measured degradation. ... International Business Machines

12/29/16 / #20160377654

Non-permanent termination structure for microprobe measurements

A structure and method of facilitating testing of an electronic device (device under test or dut) using a non-permanent and reusable structure to terminate contact pads and contact pin holes on a surface of the dut.. . ... International Business Machines

12/29/16 / #20160377653

Non-permanent termination structure for microprobe measurements

A structure and method of facilitating testing of an electronic device (device under test or dut) using a non-permanent and reusable structure to terminate contact pads and contact pin holes on a surface of the dut.. . ... International Business Machines

12/29/16 / #20160377566

Carbon based cmos sensor ring oscillator

A structure is provided for sensing an analyte in an environment. The structure may include a ring oscillator on a semiconductor substrate, the ring oscillator includes an and gate, an odd number of inverters, and a carbon device connected in series, the carbon device is exposed to an environment such that a frequency of the ring oscillator changes when the carbon device is exposed to the analyte in the environment.. ... International Business Machines

12/29/16 / #20160377447

Cognitive needs-based trip planning

A route-determination module (rdm) is provided, with the rdm having as input one or more cognitive preferences of a traveler. Further, the rdm receives input on a current or a forecasted cognitive state of the traveler, along with the cognitive load associated with one or more potential routes for traveling to a destination. ... International Business Machines

12/29/16 / #20160377444

Cognitive needs-based trip planning

A route-determination module (rdm) is provided, with the rdm having as input one or more cognitive preferences of a traveler. Further, the rdm receives input on a current or a forecasted cognitive state of the traveler, along with the cognitive load associated with one or more potential routes for traveling to a destination. ... International Business Machines

12/29/16 / #20160377441

Quantifying anomalous behavior by identifying anomalies at subtrajectories

Methods and arrangements for identifying at least one anomaly in a path taken by a plurality of objects. A plurality of trajectories are input, wherein each trajectory comprises a data set indicative of a path taken by a plurality of objects from a starting point to an ending point, wherein the starting point and ending point are substantially similar for each trajectory. ... International Business Machines

12/29/16 / #20160377432

Electronic roll pitch and yaw sensor using conductive fluid

A method and apparatus for determining a rotational orientation of an object is provided. Embodiments of the present invention utilize an electrically conductive fluid enclosed within a shell attached to the object such that the conductive fluid contacts different portions of electrically conductive nodes, located on the inner wall of the shell, depending on the rotational orientation of the shell. ... International Business Machines

12/29/16 / #20160377430

Airborne particulate source detection system

A method comprises receiving data associated with a detection of the odor, the data associated with the detection of the odor comprising a location of the detection of the odor and a time of the detection of the odor, retrieving weather data corresponding to the detection of the odor, the weather data including a wind speed and direction in the location of the detection of the odor at the time of the detection of the odor, calculating a location of the source of the odor as a function of the location of the detection of the odor, the time of the location of the odor and the wind speed and direction in the location of the detection of the odor, and outputting to a user on a display a graphical representation of a likely area that includes the location of the source of the odor.. . ... International Business Machines

12/29/16 / #20160377429

Airborne particulate source detection system

A method comprises receiving data associated with a detection of the odor, the data associated with the detection of the odor comprising a location of the detection of the odor and a time of the detection of the odor, retrieving weather data corresponding to the detection of the odor, the weather data including a wind speed and direction in the location of the detection of the odor at the time of the detection of the odor, calculating a location of the source of the odor as a function of the location of the detection of the odor, the time of the location of the odor and the wind speed and direction in the location of the detection of the odor, and outputting to a user on a display a graphical representation of a likely area that includes the location of the source of the odor.. . ... International Business Machines

12/29/16 / #20160377358

Bypassing a removed element in a liquid cooling system

A source of liquid provided an input of liquid into a liquid cooling system. The liquid from the source of liquid flows through a check valve assembly which includes an input, a first output, and a second output. ... International Business Machines

12/29/16 / #20160376424

Polymer comprising mesoporous flame retardant

Embodiments of the disclosure generally provide flame retardant compositions and methods comprising organic polymers, mineral fillers, high surface area mineral fillers and process aids. Compositions of the disclosure additionally are comprised of high surface area hydrated metal carbonate fillers, including the mesoporous amorphous magnesium carbonate filler upsalite. ... International Business Machines

12/29/16 / #20160376392

Polylactic acid (pla) with low moisture vapor transmission rates by grafting through of hydrophobic polymers directly to pla backbone

Polylactic acid-backbone graft and bottlebrush copolymers with low moisture vapor transmission rates are synthesized by polymerizing a lactide-functionalized hydrophobic macromonomer using ring-opening polymerization (rop). In some embodiments of the present invention, the macromonomer is a lactide-functionalized hydrophobic polymer that may be synthesized by, for example, polymerizing a hydrophobic monomer (e.g., a fluorinated vinyl monomer such as 2,2,2-trifluroethyl methacrylate) capable of undergoing radical polymerization (e.g., styrenic, vinylic, acrylic, etc.) using a brominated lactide initiator via atom transfer radical polymerization (atrp). ... International Business Machines

12/29/16 / #20160376250

Butadiene sequestration via sulfur dioxide charged zeolite beds

In an example, a method of butadiene sequestration includes receiving an input stream that includes butadiene. The method includes directing the input stream to a first sulfur dioxide charged zeolite bed for butadiene sequestration via a first chemical reaction of butadiene and sulfur dioxide to form sulfolene.. ... International Business Machines

12/29/16 / #20160376207

Butadiene sequestration via sulfur dioxide charged zeolite beds

In an example, a method of butadiene sequestration includes receiving an input stream that includes butadiene. The method includes directing the input stream to a first sulfur dioxide charged zeolite bed for butadiene sequestration via a first chemical reaction of butadiene and sulfur dioxide to form sulfolene.. ... International Business Machines

12/29/16 / #20160375363

Multiple user single avatar video game input system

An avatar in a video game is controlled based on input from multiple users. An input composition system receives a first input from a first user. ... International Business Machines

12/29/16 / #20160374835

Prosthetic device control with a wearable device

A method, computer program product and computer system for mode selection of a prosthesis is provided. A processor of a wearable device receives a first input from a user. ... International Business Machines

12/22/16 / #20160374231

Cooling system for electronics

A method and apparatus for conveying heat away from an electronic component. The apparatus may include, a conformable thermal interface sleeve adapted to embrace the electronic component. ... International Business Machines

12/22/16 / #20160374143

Distributed cellular client network

A second cellular client delegates cellular communication to a first cellular client. The first cellular client determines that the first cellular client has been assigned to perform cellular communication for the second cellular client. ... International Business Machines

12/22/16 / #20160374131

Distributed cellular client network

A second cellular client delegates cellular communication to a first cellular client. The first cellular client determines that the first cellular client has been assigned to perform cellular communication for the second cellular client. ... International Business Machines

12/22/16 / #20160373941

Reconfiguring a mobile network based on cellular network state information

Techniques for reconfiguring mobile networks based on network state information are provided. In one aspect, a method for managing a mobile network is provided. ... International Business Machines

12/22/16 / #20160373896

Management of moving objects

A system comprising a plurality of mobile object servers respectively assigned to a plurality of regions in a geographic space, the plurality of mobile object servers including at least one mobile object server including a mobile object agent assigned to a moving object in the assigned region; and a plurality of event servers operable to manage events occurring in the geographic space; wherein each mobile object server is operable to transfer the mobile object agent to one of the plurality of mobile object servers assigned to a neighboring region in response to the moving object moving to the neighboring region, and execute the mobile object agent to collect information of events from at least one event server, and provide the moving object with information that assists the moving object with traveling in the geographic space.. . ... International Business Machines

12/22/16 / #20160373895

Distributed cellular client tracking

A first cellular client determines its geographic location from a second cellular client. As part of this determination, the first cellular client disables its cellular functionality. ... International Business Machines

12/22/16 / #20160373892

Management of moving objects

A system comprising a plurality of first subsystems respectively operable to manage a plurality of first regions in a geographic space; and a plurality of second subsystems respectively operable to manage a plurality of second regions in the geographic space, wherein the plurality of first regions and the plurality of second regions are arranged such that at least one of the first regions covers a border of one or more of the second regions and at least of the second regions covers a border of one or more of the first regions.. . ... International Business Machines

12/22/16 / #20160373887

Distributed cellular client tracking

A first cellular client determines its geographic location from a second cellular client. As part of this determination, the first cellular client disables its cellular functionality. ... International Business Machines

12/22/16 / #20160373573

Cognitive alert control framework for mobile devices

A method for providing a cognitive alert control framework for a mobile device, wherein the mobile device includes an alert mechanism is provided. The method may include detecting, by a processor, a call being initiated by a caller using a first mobile device to a recipient using a second mobile device. ... International Business Machines

12/22/16 / #20160373552

Automatically enforcing uniform resource locator workflow presentation

Presenting urls on a user interface to guide users on a specific url browsing path over an internet. A plurality of urls for a user to view on a user interface running in a computing environment may be received. ... International Business Machines

12/22/16 / #20160373539

Monitoring system for tracking user activities for completing thoughts, ideas, or tasks of the user

A computer-implemented method for tracking the beginning and completion of tasks and nesting of sub-tasks, of the tasks, of a plurality of users, based opening and closing of applications or documents of the tasks, across a plurality of devices, based on activities of the tasks, of the plurality of users, is provided. The computer-implemented method includes receiving at least one input into at least one of the devices, wherein the received at least one input comprises the beginning or the completion of one of the tasks or nesting of sub-tasks, of one the tasks, determining one of the opened applications and documents, or topics associated with the opened applications and documents, that are connected with the inputs of the plurality of devices and, classifying the topics and sub-topics into a hierarchy, based on topics and processing time of the applications and documents.. ... International Business Machines

12/22/16 / #20160373536

Displaying relevant information on wearable computing devices

A wearable computing device receives user preferences, wherein the user preferences include information detailing one or more types of information to display based on one or more criteria being satisfied. The wearable computing device determines information to display on the wearable computing device based on the user preferences. ... International Business Machines

12/22/16 / #20160373524

Geographic space management

At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual event information for events occurring in a management target region of the at least one subsystem among the plurality of regions and adjacent event information for events occurring in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an event selecting section operable to select events about which the moving object is to be informed, from the individual event information and the adjacent event information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160373487

Ip based real-time communications over a mobile network

Techniques for improving real-time communications over a mobile network are provided. In one aspect, a method for managing data transfer in a mobile network wherein user equipment transmit data through one or more cell towers is provided. ... International Business Machines

12/22/16 / #20160373472

Capturing correlations between activity and non-activity attributes using n-grams

Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the computer. A system log is partitioned into a plurality of segments, each segment associated with a characteristic found in an event, each segment including one or more events having a same characteristic value. ... International Business Machines

12/22/16 / #20160373470

Managing security breaches in a networked computing environment

Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. ... International Business Machines

12/22/16 / #20160373450

Dynamic extensible application server management

A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational functionality of application server plugins deployed at a group of application servers. One of request-level application server functionality and server-level application server functionality of at least one of the group of application servers is changed by issuing a real-time application-server plugin command received from the real-time plugin command-driven administrative control interface to a deployed application server plugin.. ... International Business Machines

12/22/16 / #20160373442

User identity based on location patterns of non-associated devices

Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier for the present location. Verification of the user location supports authentication where a conventional user logon actions are insufficient.. ... International Business Machines

12/22/16 / #20160373429

Automatically altering and encrypting passwords in systems

In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach includes a processor identifies a resource protected by a password. ... International Business Machines

12/22/16 / #20160373422

User identity based on location patterns of non-associated devices

Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier for the present location. Verification of the user location supports authentication where a conventional user logon actions are insufficient.. ... International Business Machines

12/22/16 / #20160373413

Encrypted transit information for shipments

A computer-implemented method includes receiving transit information from a first data logger, wherein the first data logger is associated with a first shipment. The method identifies a first user based on an identifier associated with the first shipment. ... International Business Machines

12/22/16 / #20160373407

Regional firewall clustering in a networked computing environment

An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. ... International Business Machines

12/22/16 / #20160373400

Determining post velocity

Establishing the likely duration and precision with which the post was written is disclosed. An analysis may be used to infer how confident the user is of the subject matter they are writing. ... International Business Machines

12/22/16 / #20160373395

Selecting subsets of participants in electronic message threads

Embodiments of the present invention provide methods, computer program products, and systems for selecting subsets of participants in electronic message threads. Embodiments of the present invention can be used to exclude participants based, at least in part, on activity level from message conversations, thereby streamlining message conversation and reducing unwanted message communications.. ... International Business Machines

12/22/16 / #20160373377

Managing a set of assets of a shared pool of configurable computing resources

Disclosed aspects manage a set of assets of a shared pool of configurable computing resources. A set of usage data is established by the shared pool of configurable computing resources. ... International Business Machines

12/22/16 / #20160373340

Determining shortcut rules for bypassing waypoint network device(s)

Methods, computer program products, and systems are presented. The methods include, for instance: obtaining, by one or more processor, metadata of at least one packet of a network stream; and determining, by the one or more processor, a shortcut rule for the network stream to bypass at least one waypoint network, the shortcut rule being determined using the metadata of the at least one packet of the network stream. ... International Business Machines

12/22/16 / #20160373337

Managing data flows in software-defined network using network interface card

Embodiments relate to managing data flows at a network interface card (nic). A computer program product for managing data flows at a network interface card (nic) of a host, the nic comprising a port, includes a tangible storage medium readable by a processing circuit that stores instructions for execution by the processing circuit for performing a method. ... International Business Machines

12/22/16 / #20160373332

Web site reachability management for content browsing

Embodiments of the invention provide for web site reachability management in content browsing. A method of the invention includes monitoring different requests for different resources at respectively different resource location addresses initiating from different content browsers of different end users. ... International Business Machines

12/22/16 / #20160373310

Automated configuration of software defined network controller

A method and system are provided. The method includes automatically transferring configuration information from at least one network device to at least one software defined networking controller. ... International Business Machines

12/22/16 / #20160373298

Dynamic middlebox redirection based on client characteristics

Traffic redirection methods include determining a quality-affective factor comprising a quality-affective factor in an existing connection between a client and a server in a network. The quality-affective factor is compared to a threshold to determine whether the connection would benefit from a network processing function. ... International Business Machines

12/22/16 / #20160373295

In-band ldap over ficon

Methods, systems, and computer program product embodiments for exchanging data information packets, by a processor device, include receiving an internet protocol (ip) information unit by a host node executing a fibre connection (ficon) software library; writing the ip information unit to a transport layer; and transmitting data including the ip information unit to a target node over a ficon network.. . ... International Business Machines

12/22/16 / #20160373289

Ensuring regulatory compliance during application migration to cloud-based containers

A method, system, and/or computer program product ensures regulatory compliance during application migration to cloud-based containers. In response to receiving a message directing an application to be migrated to a container cloud, the application is matched to multiple containers described in a container registry, where each container is matched to a service that provides a server. ... International Business Machines

12/22/16 / #20160373259

Dual-party session key derivation

A session key is negotiated to secure a user session executed in a host computer. An electronic hardware security module (hsm) located in the host computer generates a first session key. ... International Business Machines

12/22/16 / #20160373256

Chip authentication technology using carbon nanotubes

Embodiments relate to the authentication of a semiconductor. An identification circuit disposed within a package of an integrated circuit, and the identification circuit includes carbon-nanotube transistors configured to generate an encryption key.. ... International Business Machines

12/22/16 / #20160373255

Chip authentication technology using carbon nanotubes

Embodiments relate to the authentication of a semiconductor. An identification circuit disposed within a package of an integrated circuit, and the identification circuit includes carbon-nanotube transistors configured to generate an encryption key.. ... International Business Machines

12/22/16 / #20160373130

Increasing storage capacity and data transfer speed in genome data backup

Methods and systems for storing data includes inflating received data having a first compression format. Blocks are created from the inflated data for a second compression format. ... International Business Machines

12/22/16 / #20160373100

Fine delay structure with programmable delay ranges

A circuit includes a first node, a first inverter connected to the first node and a second node. A variable resistive element is connected to the second node and a third node. ... International Business Machines

12/22/16 / #20160373099

Fine delay structure with programmable delay ranges

A circuit includes a first node, a first inverter connected to the first node and a second node. A variable resistive element is connected to the second node and a third node. ... International Business Machines

12/22/16 / #20160373098

Reconfigurable voltage desensitization circuit to emulate system critical paths

A circuit for controlling a clock signal may include a voltage source that provides a bias voltage, and at least one delay element having a non-linear capacitive load coupled to an output of the delay element. The non-linear capacitive load receives the bias from the voltage source and controls a delay magnitude applied to a plurality of pulses of the clock signal by the delay element. ... International Business Machines

12/22/16 / #20160373097

Reconfigurable voltage desensitization circuit to emulate system critical paths

A circuit for controlling a clock signal may include a voltage source that provides a bias voltage, and at least one delay element having a non-linear capacitive load coupled to an output of the delay element. The non-linear capacitive load receives the bias from the voltage source and controls a delay magnitude applied to a plurality of pulses of the clock signal by the delay element. ... International Business Machines

12/22/16 / #20160372658

Perpendicular magnetic anisotropy bcc multilayers

A magnetic material includes a cobalt layer between opposing iron layers. The iron layers include iron and are body-centered cubic (bcc), the cobalt layer comprises cobalt and is bcc or amorphous, and the magnetic material has a perpendicular magnetic anisotropy (pma).. ... International Business Machines

12/22/16 / #20160372617

Thin film solar cell backside contact

Embodiments relate to a thin film solar cell backside contact. A planar substrate is provided and an associated backside of the substrate is modified to form one or more pedestals. ... International Business Machines

12/22/16 / #20160372613

Thin film solar cell backside contact manufacturing process

Embodiments of the invention related to a method for manufacturing a thin film solar cell backside contact. Prior to application of materials, a planar substrate is provided and an associated backside of the substrate is modified to form one or more pedestals. ... International Business Machines

12/22/16 / #20160372600

Contact-first field-effect transistors

Device structures and fabrication methods for a fin-type field-effect transistor. A first contact, a second contact, and a gate electrode are formed on a fin comprised of a semiconductor material. ... International Business Machines

12/22/16 / #20160372596

Low parasitic capacitance and resistance finfet device

Described herein is a semiconductor structure and method of manufacture. The semiconductor structure includes a plurality of semiconductor fins on a substrate and a plurality of raised active regions, wherein each raised active region is located on sidewalls of a corresponding semiconductor fin among said plurality of semiconductor fins. ... International Business Machines

12/22/16 / #20160372594

Fully depleted silicon-on-insulator device formation

A p-type metal-oxide-semiconductor (pmos) planar fully depleted silicon-on-insulator (fdsoi) device and a method of fabricating the pmos fdsoi are described. The method includes processing a silicon germanium (sige) layer disposed on an insulator layer to form gaps on a surface opposite a surface that is disposed on the insulator layer, each of the gaps extending into the sige layer to a depth less than or equal to a thickness of the sige layer, and forming a gate conductor over a region of the sige layer corresponding to a channel region of the pmos. ... International Business Machines

12/22/16 / #20160372589

Punch through stopper in bulk finfet device

A method of forming a semiconductor device that includes forming a fin structure from a bulk semiconductor substrate and forming an isolation region contacting a lower portion of a sidewall of the fin structure, wherein an upper portion of the sidewall of the fin structure is exposed. A sacrificial spacer is formed on the upper portion of the sidewall of the fin structure. ... International Business Machines

12/22/16 / #20160372552

Method and apparatus providing improved thermal conductivity of strain relaxed buffer

A structure includes a substrate and a strain relaxed buffer (srb) that has a bottom surface disposed on the substrate and an opposite top surface. The srb is formed to have a plurality of pairs of layers, where a given pair of layers is composed of a layer of sil−xgex and a layer of si. ... International Business Machines

12/22/16 / #20160372551

Silicon germanium fin formation via condensation

A method of forming a finfet device comprises forming a fin in a silicon layer of a substrate, forming a hardmask layer on a top surface of the fin, forming an insulating layer over the fin and the hardmask layer, removing a portion of the insulating layer to expose a portion of the hardmask layer, removing the exposed portion of the hardmask layer to form a cavity that exposes a portion of the silicon layer of the fin, epitaxially growing a silicon germanium (sige) material on exposed portions of the silicon layer of the fin in the cavity, and annealing the grown sige to drive germanium atoms into the silicon layer of the fin.. . ... International Business Machines

12/22/16 / #20160372550

Fully depleted silicon-on-insulator device formation

A p-type metal-oxide-semiconductor (pmos) planar fully depleted silicon-on-insulator (fdsoi) device and a method of fabricating the pmos fdsoi are described. The method includes processing a silicon germanium (sige) layer disposed on an insulator layer to form gaps on a surface opposite a surface that is disposed on the insulator layer, each of the gaps extending into the sige layer to a depth less than or equal to a thickness of the sige layer, and forming a gate conductor over a region of the sige layer corresponding to a channel region of the pmos. ... International Business Machines

12/22/16 / #20160372546

Forming multi-stack nanowires using a common release material

A method for forming a multi-stack nanowire device includes forming a common release layer on a substrate, the common release layer comprising a common release material. The method also includes forming a first multi-layer stack on a first portion of the common release layer, the first multi-layer stack comprising at least two layers separated by at least one layer comprising the common release material, and forming a second multi-layer stack on a second portion of the common release layer, the second multi-layer stack comprising at least two layers separated by at least one layer comprising the common release material. ... International Business Machines

12/22/16 / #20160372545

Method to form soi fins on a bulk substrate with suspended anchoring

A method of fabricating non-tilted, electrically isolated fins from a bulk substrate is provided. A plurality of semiconductor fins is formed extending upwards from a remaining portion of a bulk semiconductor substrate. ... International Business Machines

12/22/16 / #20160372502

Monolithic visible-infrared focal plane array on silicon

A structure includes a silicon substrate; silicon readout circuitry disposed on a first portion of a top surface of the substrate and a radiation detecting pixel disposed on a second portion of the top surface of the substrate. The pixel has a plurality of radiation detectors connected with the readout circuitry. ... International Business Machines

12/22/16 / #20160372485

Fully-depleted silicon-on-insulator transistors

A fully-depleted silicon-on-insulator (fdsoi) semiconductor structure includes: a first pfet, a second pfet, and a third pfet each having a different threshold voltage and each being over an n-well that is biased to a first voltage; and a first nfet, a second nfet, and a third nfet each having a different threshold voltage and each being over a p-type substrate that is biased to a second voltage. The second voltage is different than the first voltage.. ... International Business Machines

12/22/16 / #20160372473

Method to form dual channel semiconductor material fins

A silicon fin precursor is formed in an nfet device region and a fin stack comprising alternating material portions, and from bottom to top, of silicon and a silicon germanium alloy is formed in a pfet device region. A thermal anneal is then used to convert the fin stack into a silicon germanium alloy fin precursor. ... International Business Machines

12/22/16 / #20160372471

Integrated circuit having dual material cmos integration and method to fabricate same

In one aspect thereof the invention provides a structure that includes a substrate having a surface and a plurality of fins supported by the surface of the substrate. The plurality of fins are formed of group iva-based crystalline semiconductor material and are spaced apart and generally parallel to one another. ... International Business Machines

12/22/16 / #20160372470

Fet trench dipole formation

A semiconductor structure includes a layered dipole structure formed upon a fin sidewall within a fin trench. The layered dipole structure includes a dipole layer of opposite polarity relative to the polarity of the fin and reduces source to drain leakage. ... International Business Machines

12/22/16 / #20160372430

Conductive pillar shaped for solder confinement

Pillar-type connections and methods for fabricating a pillar-type connection. A conductive layer is formed on a bond pad. ... International Business Machines

12/22/16 / #20160372416

Backside device contact

A back-side device structure with a silicon-on-insulator substrate that includes a device layer, a buried insulator layer, a trench that extends through the device layer and that partially extends through the buried insulator layer, at least one dielectric layer that is formed on the device layer and includes a first opening that communicates with the trench and a contact plug that fills the trench. A final substrate is connected to the buried insulator layer such that the contact plug contacts metallization of the final substrate. ... International Business Machines

12/22/16 / #20160372391

Time temperature monitoring system

A time temperature monitoring system and method for use with a microchip or similar structure. A disclosed system includes: a substrate having an active region; a dopant source located proximate the active region; an activation system for activating a diffusion of the dopant source into the active region; and a set of spatially distributed electrodes embedded in the active region of the substrate, wherein the electrodes are configured to detect the diffusion in the active region at varying distances from the dopant source to provide time temperature information.. ... International Business Machines

12/22/16 / #20160372384

Silicon germanium fin formation via condensation

A method of forming a finfet device comprises forming a fin in a silicon layer of a substrate, forming a hardmask layer on a top surface of the fin, forming an insulating layer over the fin and the hardmask layer, removing a portion of the insulating layer to expose a portion of the hardmask layer, removing the exposed portion of the hardmask layer to form a cavity that exposes a portion of the silicon layer of the fin, epitaxially growing a silicon germanium (sige) material on exposed portions of the silicon layer of the fin in the cavity, and annealing the grown sige to drive germanium atoms into the silicon layer of the fin.. . ... International Business Machines

12/22/16 / #20160372383

Method of source/drain height control in dual epi finfet formation

A method of forming field effect transistors (fets), and forming integrated circuit (ic) chip including the fets. Gates are formed on said semiconductor fins to define multi fin field effect transistors (finfets). ... International Business Machines

12/22/16 / #20160372379

Method for forming a semiconductor structure containing high mobility semiconductor channel materials

A method of forming a semiconductor structure is provided. The method includes providing a substrate comprising, from bottom to top, a handle substrate, an insulator layer and a germanium-containing layer. ... International Business Machines

12/22/16 / #20160372372

Backside contact to final substrate

Device structures and fabrication methods for a backside contact to a final substrate an electrically-conducting connection is formed that extends through a device layer of a silicon-on-insulator substrate and partially through a buried insulator layer of the silicon-on-insulator substrate. After the electrically-conducting connection is formed, a handle wafer of the silicon-on-insulator substrate is removed. ... International Business Machines

12/22/16 / #20160372337

Interposer with lattice construction and embedded conductive metal structures

A lattice structure is formed in a non-silicon interposer substrate to create large cells that are multiples of through hole pitches to act as islands for dielectric fields. Each unit cell is then filled with a dielectric material. ... International Business Machines

12/22/16 / #20160372192

Method and apparatus for faster deterimation of cell state of a resistive memory cell using a parallel resistor

A device for determining an actual cell state of a resistive memory cell having a plurality m of programmable cell states comprising a sensing circuit, a settling circuit, a prebiasing circuit, and a resistor coupled in parallel to the resistive memory cell, wherein the resistor is configured to reduce an effective resistance seen by the prebiasing circuit. The sensing circuit is configured to sense a sensing voltage of the resistive memory cell and output a resultant value in response to the sensing voltage which is indicative for the actual cell state. ... International Business Machines

12/22/16 / #20160372187

Determining a cell state of a resistive memory cell

A sensing circuit senses a sensing voltage of a resistive memory cell and outputs a resultant value in response to the sensing voltage which is indicative for the actual cell state. A settling circuit includes a plurality of current mirrors for settling the sensing voltage to a certain target voltage representing one of m programmable cell states. ... International Business Machines

12/22/16 / #20160372179

Hardware-based compression ratio improvement

A plurality of stored data sequences that match one or more search data sequences are determined. Each of the stored data sequences of the plurality of stored data sequences comprise a plurality of data elements and the stored data sequences are stored in a content addressable memory array. ... International Business Machines

12/22/16 / #20160372164

Latching current sensing amplifier for memory array

A latching current sensing amplifier circuit for memory arrays and a current sensing technique using the latching current sensing amplifier circuit are provided. The current sense-amplifier circuit includes a first and second pair of series connected transistors configured with a common gate node for a sense operation and reconfigurable as a cross-coupled pair for a latching operation.. ... International Business Machines

12/22/16 / #20160372153

Editing media on a mobile device before transmission

According to one exemplary embodiment, a method for editing at least one media file on a device is provided. The method may include receiving the at least one media file. ... International Business Machines

12/22/16 / #20160372150

Time-varying filter for high-frequency reel disturbance rejection

Methods, systems, and computer program product embodiments for improving track-follow control in a tape storage system, by a processor device, are provided. In one embodiment, a method comprises, time-varying filtering an error feedback signal within a closed-loop tape controller to dampen varying motor and harmonic disturbances.. ... International Business Machines

12/22/16 / #20160372142

Hardening chromium oxide films in a magnetic tape head and other structures

A chromium oxide film is formed at room temperature. The chromium oxide film has at least one partially polycrystalline portion and/or at least one amorphous portion depending upon the substrate(s) over which the chromium oxide film is formed. ... International Business Machines

12/22/16 / #20160372108

Displaying relevant information on wearable computing devices

A wearable computing device receives user preferences, wherein the user preferences include information detailing one or more types of information to display based on one or more criteria being satisfied. The wearable computing device determines information to display on the wearable computing device based on the user preferences. ... International Business Machines

12/22/16 / #20160372107

Reconciliation of transcripts

The method includes identifying a plurality of transcripts of an audio event. The method further identifying a difference between two or more of the plurality of transcripts of the audio event. ... International Business Machines

12/22/16 / #20160372088

Fingerprint directed screen orientation

Embodiments of the present invention relate to directing orientation on a screen by determining an orientation of a user's fingerprint. A user's finger position may be determined when the user's finger is a predetermined distance from or in contact with a touch-sensitive device. ... International Business Machines

12/22/16 / #20160372007

Intelligent glasses for the visually impaired

An approach for communicating navigation information on a physical environment to a user. The approach includes a computer receiving digital images of a physical environment of the user captured by digital video devices and converting the digital images into a three-dimensional image. ... International Business Machines

12/22/16 / #20160371992

Providing question answering responses to how-to procedural questions

Selecting an instructional video is provided. It is determined that a query is requesting information on how to perform a procedure. ... International Business Machines

12/22/16 / #20160371976

Management of moving objects

A system comprising a plurality of mobile object servers respectively assigned to a plurality of regions in a geographic space, the plurality of mobile object servers including at least one mobile object server including a mobile object agent assigned to a moving object in the assigned region; and a plurality of event servers operable to manage events occurring in the geographic space; wherein each mobile object server is operable to transfer the mobile object agent to one of the plurality of mobile object servers assigned to a neighboring region in response to the moving object moving to the neighboring region, and execute the mobile object agent to collect information of events from at least one event server, and provide the moving object with information that assists the moving object with traveling in the geographic space.. . ... International Business Machines

12/22/16 / #20160371975

Management of moving objects

A system comprising a plurality of mobile object servers respectively assigned to a plurality of regions in a geographic space, the plurality of mobile object servers including at least one mobile object server including a mobile object agent assigned to a moving object in the assigned region; and a plurality of event servers operable to manage events occurring in the geographic space; wherein each mobile object server is operable to transfer the mobile object agent to one of the plurality of mobile object servers assigned to a neighboring region in response to the moving object moving to the neighboring region, and execute the mobile object agent to collect information of events from at least one event server, and provide the moving object with information that assists the moving object with traveling in the geographic space.. . ... International Business Machines

12/22/16 / #20160371870

Alternative representations of virtual content in a virtual universe

An invention for generating an alternative representation of virtual content in a virtual universe is provided. In one embodiment, there is an alternative representation tool, including a visual component configured to determine a visual capacity of a user of a virtual universe. ... International Business Machines

12/22/16 / #20160371864

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a plurality of subsystems operable to respectively manage maps of a plurality of regions obtained by dividing the geographic space, and a region manager operable to adjust loads of the subsystems by dynamically changing a boundary of at least one region among the plurality of regions. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371814

Generating a tree map

A method for generating a tree map for tree map visualization includes obtaining node information of a plurality of nodes to be processed, the plurality of nodes to be processed being sub-nodes sharing a same parent node and the node information comprising at least sizes of the nodes; determining from the plurality of nodes a plurality of candidate nodes whose sizes are less than a threshold size; determining at least one super node including the plurality of candidate nodes based on the node information of the determined plurality of candidate nodes, a screen size, and the threshold size, such that when displaying in a zooming-in mode the super node on the screen, all candidate nodes in the super node are displayed at display sizes not less than the threshold size; and determining data required for displaying the tree map based on the determined super node.. . ... International Business Machines

12/22/16 / #20160371809

Memory-aware matrix factorization

Embodiments include method, systems and computer program products for performing memory-aware matrix factorization on a graphics processing unit. Aspects include determining one or more types of memory on the graphics processing unit and determining one or more characteristics of each of the one or more types of memory. ... International Business Machines

12/22/16 / #20160371806

Identifying word-senses based on linguistic variations

One or more words are received. A set of frequency of occurrence values of the received word(s) within a set of domain tables is determined. ... International Business Machines

12/22/16 / #20160371728

Content targeting with probabilistic presentation time determination

For targeted presentation of information on a mobile device, a presence of the device is detected at a given time at in a zone. A pause is detected in a movement of the device in the zone. ... International Business Machines

12/22/16 / #20160371697

Transaction fraud detection

An apparatus, method, system, and program product are disclosed for transaction fraud detection. A region determination module determines a valid region for a transaction. ... International Business Machines

12/22/16 / #20160371658

Methods and systems to identify and manage recyclable materials

A method to identify and manage recyclable materials. The method includes the steps of: (i) identifying, using a mobile device, a recyclable material based on a detected oscillation frequency of an oscillator associated with the recyclable material; (ii) communicating, using the mobile device, information about the recyclable material to a controller, the information comprising an identification of the recyclable material and a location of the recyclable material; and (iii) creating, by the controller, scheduling instructions for the identified recyclable material.. ... International Business Machines

12/22/16 / #20160371655

Scheduling events based on messages produced by a message program

Provided are a method, system, and program for scheduling events based on messages produced by a message program. A message from a scheduler is scanned for terms including a schedule action specifying an event to schedule including an event time and indication of invitee names. ... International Business Machines

12/22/16 / #20160371649

Encrypted transit information for shipments

A computer-implemented method includes receiving transit information from a first data logger, wherein the first data logger is associated with a first shipment. The method identifies a first user based on an identifier associated with the first shipment. ... International Business Machines

12/22/16 / #20160371626

Monitoring events in a project or organization

A method, system, and computer program product includes a processing device extracting content from a user's communications associated with a project, where the project includes events, and where the events are assigned to a user. The processing device monitors the extracted content and stores the extracted content in a repository for patterns. ... International Business Machines

12/22/16 / #20160371621

Comparing utility and warranty of services

An invention for comparing utility and warranty of services in an information (it) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (it) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. ... International Business Machines

12/22/16 / #20160371612

Data quality management using business process modeling

A business process modeling framework is used for data quality analysis. The modeling framework represents the sources of transactions entering the information processing system, the various tasks within the process that manipulate or transform these transactions, and the data repositories in which the transactions are stored or aggregated. ... International Business Machines

12/22/16 / #20160371601

Quality-directed adaptive analytic retraining

A quality-directed adaptive analytic retraining is provided. Training example data with which to retrain a machine learning model that has been previously trained is received. ... International Business Machines

12/22/16 / #20160371597

Incident prediction system

The present invention may be a method, computer program product, and system for predicting future safety incidents. The embodiments may receive a first set of incident data about a first safety incident. ... International Business Machines

12/22/16 / #20160371587

Disambiguation in concept identification

A method, a disambiguation decoder and a system is provided for disambiguation in concept identification. A set of candidate concepts of a surface form in a sequence of surface forms in a plaintext is obtained. ... International Business Machines

12/22/16 / #20160371586

Goal-oriented process generation

An apparatus comprises a memory and a processor device operatively coupled to the memory. The processor device is configured to receive a set of process metrics, evaluate the set of received process metrics to determine a set of process classifications, determine a set of process parameters, and generate one or more processes based at least in part on the set of process parameters and the set of process classifications, each of the one or more processes having respective sets of process metrics similar to the set of received process metrics.. ... International Business Machines

12/22/16 / #20160371583

Communicating postsynaptic neuron fires to neuromorphic cores

A system for communicating postsynaptic neuron states. The system includes a first neuromorphic core and a second neuromorphic core. ... International Business Machines

12/22/16 / #20160371582

Artificial neuron apparatus

A resistive memory cell is connected in circuitry which has a first input terminal for applying neuron input signals including a read portion and a write portion. The circuitry includes a read circuit producing a read signal dependent on resistance of the memory cell, and an output terminal providing a neuron output signal, dependent on the read signal in a first state of the memory cell. ... International Business Machines

12/22/16 / #20160371560

Background understanding in video data

Long-term understanding of background modeling includes determining first and second dimension gradient model derivatives of image brightness data of an image pixel along respective dimensions of two-dimensional, single channel image brightness data of a static image scene. The determined gradients are averaged with previous determined gradients of the image pixels, and with gradients of neighboring pixels as a function of their respective distances to the image pixel, the averaging generating averaged pixel gradient models for each of a plurality of pixels of the video image data of the static image scene that each have mean values and weight values. ... International Business Machines

12/22/16 / #20160371548

Locating objects using images from portable devices

A method assists in locating objects using their images. One or more processors receive a set of one or more machine readable reference images of an object, and then distribute the set of one or more machine readable reference images to a plurality of computing devices, where each computing device from the plurality of computing devices is capable of capturing an image. ... International Business Machines

12/22/16 / #20160371525

Processing visible coding sequence, playing visible coding sequence

Embodiments of the present invention generally relate to data processing, and further the embodiments of the invention relate to a method of processing a visible coding sequence and a system thereof, a method of playing a visible coding sequence and a system thereof. The present invention creatively proposes a scheme of determining sampling rate with synchronized frames to realize effective processing of a visible coding sequence. ... International Business Machines

12/22/16 / #20160371499

Deleting information to maintain security level

A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. ... International Business Machines

12/22/16 / #20160371486

Capturing correlations between activity and non-activity attributes using n-grams

Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the computer. A system log is partitioned into a plurality of segments, each segment associated with a characteristic found in an event, each segment including one or more events having a same characteristic value. ... International Business Machines

12/22/16 / #20160371477

Secure authentication of users of devices using tactile and voice sequencing with feedback

A method for securely authenticating users of a device which uses pairings of a verbal passphrase and user interactions. The user interactions may be finger position on an interface of the device, number of taps on the interface of the device, or touching of the interface in a predefined area. ... International Business Machines

12/22/16 / #20160371418

Routing of nets of an integrated circuit

A routing specification is received for nets of an integrated circuit connecting source cells and sink cells in the integrated circuit. A target performance parameter is received for each of the nets, the target performance parameters specifying a propagation property of electrical signals in the nets. ... International Business Machines

12/22/16 / #20160371417

Signal via positioning in a multi-layer circuit board

One aspect is a method that includes identifying a substantially uniform distribution of signal vias for a multi-layer circuit board based on a design file defining a layout that includes via groups in a two-to-one signal-to-ground via ratio configuration. A signal via pitch is determined as a center-to-center distance between a neighboring pair of signal vias. ... International Business Machines

12/22/16 / #20160371416

Signal via positioning in a multi-layer circuit board

One aspect is a method that includes identifying a substantially uniform distribution of signal vias for a multi-layer circuit board based on a design file defining a layout that includes via groups in a two-to-one signal-to-ground via ratio configuration. A signal via pitch is determined as a center-to-center distance between a neighboring pair of signal vias. ... International Business Machines

12/22/16 / #20160371413

Integrated circuit chip reliability using reliability-optimized failure mechanism targeting

Disclosed are methods for improving integrated circuit (ic) chip reliability. Ic chips are manufactured and sorted into groups corresponding to process windows within a process distribution for the design. ... International Business Machines

12/22/16 / #20160371404

Result caching for improving statistical efficiency of composite simulation models

Embodiments of the present invention provide a method for result caching to improve the statistical efficiency of a composite model comprising a first component model and at least one other component model. The method comprises developing at least one metamodel for at least one component model of the composite model, computing a re-use factor that maximizes an asymptotic efficiency measure based on the metamodel, determining a number of executions to run for the composite model, and determining a number of executions to run for the first component model based on the re-use factor and the number of executions to run for the composite model. ... International Business Machines

12/22/16 / #20160371401

Routing of nets of an integrated circuit

A routing specification is received for nets of an integrated circuit connecting source cells and sink cells in the integrated circuit. A target performance parameter is received for each of the nets, the target performance parameters specifying a propagation property of electrical signals in the nets. ... International Business Machines

12/22/16 / #20160371393

Defining dynamic topic structures for topic oriented question answer systems

According to one exemplary embodiment, a method for dynamically defining topics from content objects used to answer a question in a question answering system is provided. The method may include receiving the content objects. ... International Business Machines

12/22/16 / #20160371370

Using ontologies to comprehend regular expressions

Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. . ... International Business Machines

12/22/16 / #20160371367

Document order management via relaxed node indexing

An illustrative embodiment includes processing parse tree data. A parse tree data structure that is representative of a document object model (dom) tree data structure is received. ... International Business Machines

12/22/16 / #20160371347

Conversion of forms of user data segment ids in a deduplication system

Various embodiments for managing data in a data storage having data deduplication. For a back reference data structure incorporating reference information for at least one user data segment to a storage block, using a plurality of hash functions to convert between a plurality of form types of user data segment identification (id's) representative of the at least one user data segment.. ... International Business Machines

12/22/16 / #20160371345

Preprocessing heterogeneously-structured electronic documents for data warehousing

Preprocessing heterogeneously-structured electronic documents for data warehousing, by semantically filtering a set of electronic documents, where each of the electronic documents is representable as a structural tree of nodes representing items of data, determining a distance between a plurality of pairs of the structural trees, identifying a plurality of clusters of the electronic documents based on the distances between the structural trees of the electronic documents, and removing any of the clusters based on predefined cluster filtering criteria.. . ... International Business Machines

12/22/16 / #20160371337

Partitioned join with dense inner table representation

To perform a join operation on database objects, data structures contained in a first database object are distributed across database partitions in accordance with a partitioning scheme. Data structures of the first database object are associated with respective indices computed complementarily to the partitioning scheme. ... International Business Machines

12/22/16 / #20160371336

Partitioned join with dense inner table representation

To perform a join operation on database objects, data structures contained in a first database object are distributed across database partitions in accordance with a partitioning scheme. Data structures of the first database object are associated with respective indices computed complementarily to the partitioning scheme. ... International Business Machines

12/22/16 / #20160371332

Partition access method for query optimization

In an approach to determining an access method for a partition in a partition table, a computer receives a query and determines if there is a partition table utilized by the query. When there is a partition table utilized by the query, then the computer determines that a partition in the partition table meets the plurality of conditions of the query. ... International Business Machines

12/22/16 / #20160371328

Partition access method for query optimization

In an approach to determining an access method for a partition in a partition table, a computer receives a query and determines if there is a partition table utilized by the query. When there is a partition table utilized by the query, then the computer determines that a partition in the partition table meets the plurality of conditions of the query. ... International Business Machines

12/22/16 / #20160371326

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a subsystem operable to manage a map of the geographic space, and an update manager operable to change a boundary of an update block, which is a unit of an update contained in the map, according to an extent to which the update block is updated. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371323

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a subsystem operable to manage a map of the geographic space, and an update manager operable to change a boundary of an update block, which is a unit of an update contained in the map, according to an extent to which the update block is updated. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371313

Document order management via relaxed node indexing

An illustrative embodiment includes processing parse tree data. A parse tree data structure that is representative of a document object model (dom) tree data structure is received. ... International Business Machines

12/22/16 / #20160371308

Back referencing of deduplicated data

Various embodiments for managing data in a data storage having data deduplication. A back reference data structure is configured for user data segments as a mechanism to identify an affected storage block to which information in the back reference data structure refers. ... International Business Machines

12/22/16 / #20160371299

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a subsystem operable to manage a map of the geographic space, and an update manager operable to change a boundary of an update block, which is a unit of an update contained in the map, according to an extent to which the update block is updated. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371295

Removal of reference information for storage blocks in a deduplication system

Various embodiments for managing data in a data storage having data deduplication. For a back reference data structure incorporating reference information for at least one user data segment to a storage block, a user data segment identification (id) representative of the at least one user data segment is removed from the back reference data structure.. ... International Business Machines

12/22/16 / #20160371294

Detection of data affected by inaccessible storage blocks in a deduplication system

Various embodiments for managing data in a data storage having data deduplication. In response to a portion of the data storage determined to be inaccessible, an identifier of a user data segment is queried by examining a corresponding back reference data structure, the back reference data structure implemented as an approximation of a relationship between the user data segment and a particular storage block in the data storage. ... International Business Machines

12/22/16 / #20160371285

Prioritization of e-mail files for migration

For each of a plurality of e-mail files contained in a first data repository, at least one score for the e-mail file can be determined. Determining the at least one score can include determining whether the e-mail file contains at least one design element and, responsive to determining that the e-mail file contains at least one design element, determining whether the design element is authored by a template developer. ... International Business Machines

12/22/16 / #20160371283

Control of web content tagging

The integrity of an existing tag set associated with a web module is protected by reviewing user-generated proposed additions to the tag set to determine whether the proposed addition is appropriate. An initial test is made to determine whether a proposed addition is trivial; e.g., includes strings of the same character. ... International Business Machines

12/22/16 / #20160371282

Geographic space management

At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual event information for events occurring in a management target region of the at least one subsystem among the plurality of regions and adjacent event information for events occurring in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an event selecting section operable to select events about which the moving object is to be informed, from the individual event information and the adjacent event information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371281

Geographic space management

At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual route information for routes in a management target region of the at least one subsystem among the plurality of regions and adjacent route information for routes positioned in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an identifying section operable to identify the route on which the moving object is positioned based on the observation position, by using the individual route information and the adjacent route information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371277

Defining dynamic topic structures for topic oriented question answer systems

According to one exemplary embodiment, a method for dynamically defining topics from content objects used to answer a question in a question answering system is provided. The method may include receiving the content objects. ... International Business Machines

12/22/16 / #20160371271

Identification of target audience for content delivery in social networks by quantifying semantic relations and crowdsourcing

A mechanism is provided in a data processing system for content delivery. The mechanism identifies a candidate user of a social networking service. ... International Business Machines

12/22/16 / #20160371255

Domain specific representation of document text for accelerated natural language processing

Provided are techniques for a domain specific representation of document text for accelerated natural language processing. A document is selected from a set of documents to be analyzed. ... International Business Machines

12/22/16 / #20160371253

Augmented text search with syntactic information

An approach is provided in which a knowledge manager generates syntactic annotation tokens that correspond to syntactic relationships between terms included in a source document. The knowledge manager creates a knowledge structure that stores the syntactic annotation tokens in parallel fields and stores the source document terms in original text fields, which align to the parallel fields. ... International Business Machines

12/22/16 / #20160371252

Disambiguation in concept identification

A method, a disambiguation decoder and a system is provided for disambiguation in concept identification. A set of candidate concepts of a surface form in a sequence of surface forms in a plaintext is obtained. ... International Business Machines

12/22/16 / #20160371247

Augmented text search with syntactic information

An approach is provided in which a knowledge manager generates syntactic annotation tokens that correspond to syntactic relationships between terms included in a source document. The knowledge manager creates a knowledge structure that stores the syntactic annotation tokens in parallel fields and stores the source document terms in original text fields, which align to the parallel fields. ... International Business Machines

12/22/16 / #20160371244

Collaboratively reconstituting tables

Reconstituting an attribute associated with data. Data in a tabular form may be received. ... International Business Machines

12/22/16 / #20160371243

Building and maintaining information extraction rules

Methods and arrangements for managing development of information extraction rules. One or more documents are opened for extraction. ... International Business Machines

12/22/16 / #20160371239

Domain specific representation of document text for accelerated natural language processing

Provided are techniques for a domain specific representation of document text for accelerated natural language processing. A document is selected from a set of documents to be analyzed. ... International Business Machines

12/22/16 / #20160371236

Optimizing update operations in hierarchically structured documents

Optimizing update instructions in hierarchically structured documents is provided. A pending update list including a first plurality of items is received. ... International Business Machines

12/22/16 / #20160371234

Reconciliation of transcripts

The method includes identifying a plurality of transcripts of an audio event. The method further identifying a difference between two or more of the plurality of transcripts of the audio event. ... International Business Machines

12/22/16 / #20160371232

Font personalization

Method and system are provided for font personalization. The method carried out at a client includes: receiving a user-specific font transformation at a first client for storing at the first client, wherein the user-specific font transformation is a font transformation of a base font for an author user to which the font transformation applies; receiving content associated with the author user, wherein the content associated with the author user is received with an identifier of the user-specific font transformation of the author user; receiving the base font at the first client for storing at the first client for use with the user-specific font transformation; and applying the user-specific font transformation to the base font when rendering the content associated with the author user.. ... International Business Machines

12/22/16 / #20160371202

Priority level adaptation in a dispersed storage network

A processing system in a dispersed storage network is configured to access write sequence information corresponding to a write sequence; determine whether to elevate a priority level of the write sequence; when the processing system determines to elevate the priority level of the write sequence, elevate the priority level of the write sequence; determine whether to lower the priority level of the write sequence; and when the processing system determines to lower the priority level of the write sequence, the processing system lowers the priority level of the write sequence.. . ... International Business Machines

12/22/16 / #20160371193

Caching policies for selection and replacement of objects

In one embodiment, a computer-implemented method includes inserting a set of accessed objects into a cache, where the set of accessed objects varies in size. An object includes a set of object components, and responsive to receiving a request to access the object, it is determined that the object does not fit into the cache given the set of accessed objects and a total size of the cache. ... International Business Machines

12/22/16 / #20160371171

Stream-based breakpoint for too many tuple creations

Techniques are disclosed for inserting breakpoints during debugging of a streams processing environment. A distributed application of the streams processing environment has a plurality of processing elements executing in a runtime environment. ... International Business Machines

12/22/16 / #20160371166

Stream-based breakpoint for too many tuple creations

Techniques are disclosed for inserting breakpoints during debugging of a streams processing environment. A distributed application of the streams processing environment has a plurality of processing elements executing in a runtime environment. ... International Business Machines

12/22/16 / #20160371165

Analysis system, analysis method and program

Analysis system, analysis method and program. The system includes: trace means for acquiring a command issued by software executed in an information processing system and a physical address of a memory used by the command as trace data, and recording the trace data to storage means; event detecting means for detecting an event caused to occur by the software and acquiring event information; conversion means for converting the event information to a memory access pattern configured with a plurality of commands for accessing the memory and a plurality of physical addresses; and memory accessing means for accessing the memory using the converted memory access pattern, causing the trace means to acquire trace data and record the trace data to the storage means.. ... International Business Machines

12/22/16 / #20160371160

Maintaining two-site configuration for workload availability between sites at unlimited distances for products and services

A system for maintaining a two-site configuration for continuous availability over long distances may include a first computing site configured to execute a first instance associated with a priority workload, the first instance being designated as an active instance; a second computing site configured to execute a second instance of the priority workload, the second instance being designated as a standby instance; a software replication module configured to replicate a unit of work data associated with the priority workload from a first data object associated with the active instance to a second data object associated with the standby instance, and a hardware replication module configured to replicate an image from a first storage volume to a copy on a second storage volume, wherein the first storage volume is associated with the first computing site, and the second storage volume is associated with a third computing site.. . ... International Business Machines

12/22/16 / #20160371159

Synchronization and order detection in a memory system

Embodiments relate to out-of-synchronization detection and out-of-order detection in a memory system. One aspect is a system that includes a plurality of channels, each providing communication with a memory buffer chip and a plurality of memory devices. ... International Business Machines

12/22/16 / #20160371158

Multi-site disaster recovery consistency group for heterogeneous systems

Methods and arrangements for managing a consistency group for computing sites. A plurality of computing sites contained within a consistency group are communicated with by using an aggregator, each of the plurality of computing sites comprising one or more of a virtual machine and a server. ... International Business Machines

12/22/16 / #20160371148

Converting volatile memory module devices to flashless non-volatile memory module devices

Embodiments of the present invention provide an apparatus and methods for converting a volatile memory module device to a non-volatile memory module device. In one embodiment, a male contact edge of a memory module device is inserted to a first memory module device socket of a memory module device adaptor, the memory module device adaptor having a first male contact edge. ... International Business Machines

12/22/16 / #20160371146

Slice rebuilding in a dispersed storage network

A processing system associated with a dispersed storage network is configured to detect a plurality of encoded data slices to be rebuilt, wherein the plurality of encoded data slices are associated with the dst execution unit; identify a plurality of slice names associated with the plurality of encoded data slices; obtain a slice name to slice memory device mapping for the dst execution unit; determine a schedule of rebuilding the plurality of encoded data slices, based on the mapping; and facilitate rebuilding the plurality of encoded data slices in accordance with the schedule of rebuilding.. . ... International Business Machines

12/22/16 / #20160371143

Securing data in a dispersed storage network

A method includes receiving a retrieval request regarding an encoded key stream slice of a set of encoded key stream slices and an encoded and encrypted data slice of a set of encoded and encrypted data slices. The method further includes partially dispersed storage error decoding the encoded key stream slice to produce a partially decoded key stream vector. ... International Business Machines

12/22/16 / #20160371140

Data storage device control with power hazard mode

In response to a warning that power may be interrupted, a non-volatile data storage sub-system of a host computer system re-orders machine readable instructions that the non-volatile data storage sub-system is going to perform. This re-ordering of instructions decreases the probability that important data will be lost. ... International Business Machines

12/22/16 / #20160371128

Transactional lock elision with delayed lock checking

A computer-implemented method includes the following operations. A transactional lock elision transaction including a critical section is executed. ... International Business Machines

12/22/16 / #20160371126

Scheduling mapreduce jobs in a cluster of dynamically available servers

There is provided a method, a system and a computer program product for improving performance and fairness in sharing a cluster of dynamically available computing resources among multiple jobs. The system collects at least one parameter associated with availability of a plurality of computing resources. ... International Business Machines

12/22/16 / #20160371125

Managing a set of assets of a shared pool of configurable computing resources

Disclosed aspects manage a set of assets of a shared pool of configurable computing resources. A set of usage data is established by the shared pool of configurable computing resources. ... International Business Machines

12/22/16 / #20160371120

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a plurality of subsystems operable to respectively manage maps of a plurality of regions obtained by dividing the geographic space, and a region manager operable to adjust loads of the subsystems by dynamically changing a boundary of at least one region among the plurality of regions. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160371103

Dynamic code injection

Embodiments of the present invention disclose an approach for inserting code into a running thread of execution. A computer sets a first set of bits to a first value, wherein the first value indicates that a first set of instructions should be inserted onto a stack. ... International Business Machines

12/22/16 / #20160371091

Techniques for improving issue of instructions with variable latencies in a microprocessor

Techniques are disclosed for issuing instructions in a processor. According to one embodiment of the present disclosure, an instruction tag is broadcast to wake up a plurality of instructions stored in an issue queue that are dependent on an issued instruction associated with the instruction tag. ... International Business Machines

12/22/16 / #20160371090

Techniques for improving issue of instructions with variable latencies in a microprocessor

Techniques are disclosed for issuing instructions in a processor. According to one embodiment of the present disclosure, an instruction tag is broadcast to wake up a plurality of instructions stored in an issue queue that are dependent on an issued instruction associated with the instruction tag. ... International Business Machines

12/22/16 / #20160371088

Split-level history buffer in a computer processing unit

A split level history buffer in a central processing unit is provided. A history buffer is partitioned into a first portion and a second portion, wherein the first portion includes a first tagged instruction. ... International Business Machines

12/22/16 / #20160371087

Split-level history buffer in a computer processing unit

A split level history buffer in a central processing unit is provided. A history buffer is split into a first portion and a second portion. ... International Business Machines

12/22/16 / #20160371079

Correcting non-compliant source code in an integrated development environment

Approaches presented herein enable correction of source code that fails to comply with an established coding standard in a code base within an integrated development environment (ide). Specifically, a non-compliant segment of code, which requires correction, and that was coded by a first developer, is assembled into a stand-alone artifact that is dispatched to a second developer. ... International Business Machines

12/22/16 / #20160371073

Feature exploitation evaluator

In one embodiment, a computer-implemented method includes maintaining a feature repository that includes one or more current feature descriptors describing one or more current features currently incorporated into a computer system. A new feature descriptor is read describing a new feature. ... International Business Machines

12/22/16 / #20160371072

Feature exploitation evaluator

In one embodiment, a computer-implemented method includes maintaining a feature repository that includes one or more current feature descriptors describing one or more current features currently incorporated into a computer system. A new feature descriptor is read describing a new feature. ... International Business Machines

12/22/16 / #20160371030

Virtual accounting container for supporting small volumes of data

Embodiments of the present invention provide a method for storing small volumes of data within a grid-scale storage system. The method includes creating a container within a storage disk. ... International Business Machines

12/22/16 / #20160371029

Virtual accounting container for supporting small volumes of data

Embodiments of the present invention provide a method for storing small volumes of data within a grid-scale storage system. The method includes creating a container within a storage disk. ... International Business Machines

12/22/16 / #20160371027

Selective memory dump using usertokens

Embodiments of the present invention provide systems and methods for selectively dumping memory by using usertokens to specify an address range from 64-bit storage to be included or excluded from a memory dump. Embodiments of the present invention can be used to reduce the requirement for programs to manage lists of address ranges which represent pertinent data for applications.. ... International Business Machines

12/22/16 / #20160371023

Point in time copy technique using a block level of granularity

A method is provided for performing a point in time copy using a block level of granularity. The method includes identifying an index node for a file, and translating data block locations identified by the index node to physical track locations. ... International Business Machines

12/22/16 / #20160371022

Virtual accounting container for supporting small volumes of data

Embodiments of the present invention provide a method, computer program product, and system for storing small volumes of data. The method includes creating a container within a storage disk. ... International Business Machines

12/22/16 / #20160371021

Secured multi-tenancy data in cloud-based storage environments

A mechanism is provided for multi-tenancy data security. A storage device receives a request for storage from a client device. ... International Business Machines

12/22/16 / #20160371017

Processing read and write requests

Provided are a method, system, and computer program product for processing read and write requests in a storage controller. A host adaptor in the storage controller receives a write request from a host system for a storage address in a storage device. ... International Business Machines

12/22/16 / #20160371013

Implementing multiple raid level configurations in a data storage device

Embodiments of the present invention provide systems, methods, and computer program products for implementing multiple raid level configurations in a computer storage device. In one embodiment, performance or resiliency of application data being executed to a single computer storage device can be prioritized. ... International Business Machines

12/22/16 / #20160371011

Assigning device adaptors to use to copy source extents to target extents in a copy relationship

Provided are a computer program product, system, and method for assigning device adaptors to use to copy source extents in source ranks to target extents in target ranks in a copy relation. A determination is made of an order of the target ranks in the copy relation. ... International Business Machines

12/22/16 / #20160371005

Memory-aware matrix factorization

Embodiments include method, systems and computer program products for performing memory-aware matrix factorization on a graphics processing unit. Aspects include determining one or more types of memory on the graphics processing unit and determining one or more characteristics of each of the one or more types of memory. ... International Business Machines

12/22/16 / #20160370972

Adjusting appearance of icons in an electronic device

Adjusting appearance of icons in an electronic device includes determining, for icons proximate to one another on a display of the electronic device, a visual property of each icon, wherein the determining includes a computer system computing a quantitative indication of the visual property for each icon. The visual properties of the icons are compared, wherein the comparing includes the computer system determining at least one quantitative difference for the visual properties of the icons. ... International Business Machines

12/22/16 / #20160370962

Automated electronic message filing system

A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. ... International Business Machines

12/22/16 / #20160370953

Managing the presentation of elements via a user interface of a computing device.

Managing the presentation of elements via a user interface of a computing device, by selecting a candidate element from a plurality of candidate elements for presentation via a user interface of a computing device, where each of the candidate elements is associated with a level of detail in a hierarchy of multiple levels of detail, where the level of detail of the selected candidate element is at or above a current presentation level of detail in the hierarchy of multiple levels of detail, and where the current presentation level of detail is applicable to a current presentation context of a software application that is executed by the computing device, and presenting the selected candidate element in the current presentation context of the software application via the user interface of the computing device.. . ... International Business Machines

12/22/16 / #20160370907

Fingerprint directed screen orientation

Embodiments of the present invention relate to directing orientation on a screen by determining an orientation of a user's fingerprint. A user's finger position may be determined when the user's finger is a predetermined distance from or in contact with a touch-sensitive device. ... International Business Machines

12/22/16 / #20160370682

Synaptic electronic devices with electrochromic device

A synaptic electronic device includes a substrate including a one or more of a semiconductor and an insulator; a photosensitive layer disposed on a surface of the substrate; an electrochromic stack disposed on the photosensitive layer, the electrochromic stack including a first transparent electrode layer, a cathodic electrochromic layer, a solid electrolyte layer, an anodic electrochromic layer, and a second transparent electrode layer; and a pair of electrodes disposed on the photosensitive layer and on opposing sides of the electrochromic stack.. . ... International Business Machines

12/22/16 / #20160370681

Synaptic electronic devices with electrochromic device

A synaptic electronic device includes a substrate including a one or more of a semiconductor and an insulator; a photosensitive layer disposed on a surface of the substrate; an electrochromic stack disposed on the photosensitive layer, the electrochromic stack including a first transparent electrode layer, a cathodic electrochromic layer, a solid electrolyte layer, an anodic electrochromic layer, and a second transparent electrode layer; and a pair of electrodes disposed on the photosensitive layer and on opposing sides of the electrochromic stack.. . ... International Business Machines

12/22/16 / #20160370339

Air-pollution anomaly location mechanism

A mechanism is provided for detecting air-pollution anomalies. A historical air-pollution pattern is identified for each of a plurality of air-pollution monitoring stations. ... International Business Machines

12/22/16 / #20160370333

Generating fine resolution air pollution estimates

Embodiments include methods, systems and computer program products for storing graph data for a directed graph in a relational database. Aspects include receiving historic and real-time air quality data from a plurality of air quality measurement stations in a geographic area and dividing the geographic area into a plurality of locations. ... International Business Machines

12/22/16 / #20160370332

Generating fine resolution air pollution estimates

Embodiments include methods, systems and computer program products for storing graph data for a directed graph in a relational database. Aspects include receiving historic and real-time air quality data from a plurality of air quality measurement stations in a geographic area and dividing the geographic area into a plurality of locations. ... International Business Machines

12/22/16 / #20160370311

Capacitive measurements of divots in semiconductor devices

Approaches for characterizing a shallow trench isolation (sti) divot depth are provided. The approach includes measuring a first capacitance at a first region of a substrate where at least one first gate line crosses over a boundary junction between a sti region and an active region. ... International Business Machines

12/22/16 / #20160370271

Floor covering having adjustable hardness

Embodiments include method, systems and computer program products for adjusting a hardness of a floor covering. Aspects include monitoring a user on the floor covering and detecting a triggering event associated with the user. ... International Business Machines

12/22/16 / #20160370198

Transport option selection to serve well-being objectives

Aspects generate customized routes that select between human-powered and motorized transport option segments to maximize well-being objective in navigating a traveler to a destination. Amounts of human-powered transport options that a traveler is willing, able or recommended to perform via the traveler's own physical exertions in reaching a destination are determined as a function of well-being or cost objectives and performance limits. ... International Business Machines

12/22/16 / #20160370196

Geographic space management

At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual event information for events occurring in a management target region of the at least one subsystem among the plurality of regions and adjacent event information for events occurring in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an event selecting section operable to select events about which the moving object is to be informed, from the individual event information and the adjacent event information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160370195

Geographic space management

At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual route information for routes in a management target region of the at least one subsystem among the plurality of regions and adjacent route information for routes positioned in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an identifying section operable to identify the route on which the moving object is positioned based on the observation position, by using the individual route information and the adjacent route information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160370190

Geographic space management

At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual route information for routes in a management target region of the at least one subsystem among the plurality of regions and adjacent route information for routes positioned in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an identifying section operable to identify the route on which the moving object is positioned based on the observation position, by using the individual route information and the adjacent route information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160370186

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a plurality of subsystems operable to respectively manage maps of a plurality of regions obtained by dividing the geographic space, and a region manager operable to adjust loads of the subsystems by dynamically changing a boundary of at least one region among the plurality of regions. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160370185

Geographic space management

A system is provided that manages a geographic space including a route on which a moving object moves, including a plurality of subsystems operable to respectively manage maps of a plurality of regions obtained by dividing the geographic space, and a region manager operable to adjust loads of the subsystems by dynamically changing a boundary of at least one region among the plurality of regions. Also provided is a method and computer program product.. ... International Business Machines

12/22/16 / #20160369504

Floor covering having adjustable hardness

Embodiments include method, systems and computer program products for adjusting a hardness of a floor covering. Aspects include monitoring a user on the floor covering and detecting a triggering event associated with the user. ... International Business Machines

12/22/16 / #20160368821

Method of glass fabric production including resin adhesion for printed circuit board formation

Embodiments generally relate to devices and methods for production of fibers and threads for use in electronic device manufacturing. Described here, fibers can be produced and manipulated using a dual-surfaced sizing material. ... International Business Machines

12/22/16 / #20160368820

Method of glass fabric production including resin adhesion for printed circuit board formation

Embodiments generally relate to devices and methods for production of fibers and threads for use in electronic device manufacturing. Described here, fibers can be produced and manipulated using a dual-surfaced sizing material. ... International Business Machines

12/22/16 / #20160367984

Fabrication of a microfluidic chip package or assembly with separable chips

The present invention is notably directed to methods of fabrication of a microfluidic chip package or assembly (1), comprising: providing (s1) a substrate (10, 30) having at least one block (14, 14a) comprising one or more microfluidic structures on a face (f) of the substrate; partially cutting (s2) into the substrate to obtain partial cuts (10c), such that a residual thickness of the substrate at the level of the partial cuts (10c) enables singulation of said at least one block (14, 14a); cleaning (s4) said at least one block; and applying (s5-s7) a cover-film (62) to cover said at least one block (14, 14a), whereby at least one covered block is obtained, the applied cover film still enabling singulation of each covered block, wherein each covered block corresponds to a microfluidic chip after singulation. The present invention is further directed to microfluidic chips, packing or assembly, obtainable with such methods.. ... International Business Machines

12/15/16 / #20160366789

Active control for two-phase cooling

Methods and devices for active control for two-phase cooling include a cooling volume that has cavities and active coolant flow controls in the cavities configured to adjust coolant flow through the cavities. A reservoir in fluid communication with the cavities and there is a two-phase coolant in the reservoir and cavities. ... International Business Machines

12/15/16 / #20160366785

Cooling system for electronic devices employing adjacent fan cages with interflow passages

Cooling systems employing adjacent fan cages having cage walls with interflow passages are disclosed. A cooling system includes cooling fans disposed in adjacent fan cages. ... International Business Machines

12/15/16 / #20160366784

Cooling system for electronic devices employing adjacent fan cages with interflow passages

Cooling systems employing adjacent fan cages having cage walls with interflow passages are disclosed. A cooling system includes cooling fans disposed in adjacent fan cages. ... International Business Machines

12/15/16 / #20160366723

Direct data transfer among communication devices

A method for transferring data among communication devices. The method includes a first communication device receiving, from a second communication device, data to be transferred and a condition defining a range of data transfer. ... International Business Machines

12/15/16 / #20160366712

Querying data from devices in an ad-hoc network

A mobile data network supports making subscriber data addressable as devices in a mobile data network. Each data chunk is assigned a device address in the mobile data network. ... International Business Machines

12/15/16 / #20160366648

Association of applications to clusters mapped to logical battery partitions

An approach for association of one or more apps to one or more app clusters mapped to one or more logical battery partitions on a mobile device is provided. The approach retrieves the one or more apps on the mobile device. ... International Business Machines

12/15/16 / #20160366583

Making subscriber data addressable as a device in a mobile data network

A mobile data network supports making subscriber data addressable as devices in a mobile data network. Each data chunk is assigned a device address in the mobile data network. ... International Business Machines

12/15/16 / #20160366582

Querying data from devices in an ad-hoc network

A mobile data network supports making subscriber data addressable as devices in a mobile data network. Each data chunk is assigned a device address in the mobile data network. ... International Business Machines

12/15/16 / #20160366581

Distributing subscriber data in a mobile data network

A mobile data network supports making subscriber data addressable as devices in a mobile data network. Each data chunk is assigned a device address in the mobile data network. ... International Business Machines

12/15/16 / #20160366580

Distributing subscriber data in a mobile data network

A mobile data network supports making subscriber data addressable as devices in a mobile data network. Each data chunk is assigned a device address in the mobile data network. ... International Business Machines

12/15/16 / #20160366568

Navigation by using instant messaging

A method for navigating is provided. The method comprises, in response to input on user equipment of a first member of a group who is travelling to a destination, one or more processors acquiring current position information of the user equipment of the first member. ... International Business Machines

12/15/16 / #20160366555

Direct data transfer among communication devices

A method for transferring data among communication devices. The method includes a first communication device receiving, from a second communication device, data to be transferred and a condition defining a range of data transfer. ... International Business Machines

12/15/16 / #20160366495

Adaptive sampling of smart meter data

In an approach for adaptive sampling of smart meter data, a computer retrieves one or more balancing constraints associated with one or more smart meter sensors. The computer retrieves meter sensor data from the one or more smart meter sensors according to the one or more balancing constraints. ... International Business Machines

12/15/16 / #20160366484

Selection and display of differentiating key frames for similar videos

A method, system, and or computer program product selects and displays keyframes for multiple video files on a graphical user interface (gui). A first set of keyframes for a first video file and a second set of keyframes for a second video file are received and compared to one another. ... International Business Machines

12/15/16 / #20160366280

Managing access to a conference call

Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of participants to be included in a conference call, identifying, from the list of participants, a first portion of the participants that have personal passcodes, generating guest passcodes for a second portion of the participants associated with the list of participants that do not have the personal passcodes, and permitting, based on the personal passcodes or the guest passcodes, each of the participants to participate in the conference call.. . ... International Business Machines

12/15/16 / #20160366268

Rapid serial visual presentation to deliver messages in social spaces

A private message can be delivered by a computer system to a user in an environment, using a display in the environment, a user device, and sensors in the space. The device is detected and connected to a system once it enters a space. ... International Business Machines

12/15/16 / #20160366264

Transferring information during a call

Embodiments of the present invention provide systems and methods for sending information during a call. In one embodiment, an individual receives a request for information while using a device. ... International Business Machines

12/15/16 / #20160366252

Orchestrating resources in a multilayer computing environment by sending an orchestration message between layers

Software that generates a message containing program instructions for multiple layers in a multi-layer environment, by performing the following operations: (i) receiving an operation to perform across a multilayer computing environment; (ii) generating a message for performing the operation across the multilayer computing environment, wherein the message includes a plurality of layer portions, wherein each layer portion corresponds to a respective layer in the multilayer computing environment and includes computer program instructions for performing a set of sub-operation(s) of the operation; and (iii) orchestrating, by one or more processors, performance of the operation by sending the message between layers in the multilayer computing environment, wherein when the message is located at a respective layer, the layer performs its respective set of sub-operation(s) according to the computer program instructions included in the layer's respectively corresponding layer portion of the message.. . ... International Business Machines

12/15/16 / #20160366243

Request processing according to degradation monitoring

In an approach for adjusting an order of actions to process a request, a processor receives a request that includes a set of actions to be performed in a first order. A processor receives monitored information of a service utilized to perform at least one action of the set of actions. ... International Business Machines

12/15/16 / #20160366241

Saving bandwidth in transmission of compressed data

A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. ... International Business Machines

12/15/16 / #20160366231

Utilization of computing services

A method to connect an application to an application service includes accessing code corresponding to an application to determine a reference to an application service, determining a service connection driver corresponding to the application service, invoking the service connection driver, and receiving connection information in response to the service connection driver establishing a service connection between the application and the application service. A corresponding computer program product and computer system are also disclosed herein.. ... International Business Machines

12/15/16 / #20160366224

Dynamic node group allocation

Provided are techniques for improving data locality for parallel applications running in a big data distributed file system with a dynamic node group. In response to a consumer job starting to read one or more files in a big data distributed file system having multiple nodes, node group information for the one or more files to be read is retrieved, wherein the node group information identifies nodes from the multiple nodes on which a producer job wrote the one or more files, and the consumer job is assigned to the nodes identified by the node group information to allow for local reading of the one or more files by the consumer job.. ... International Business Machines

12/15/16 / #20160366218

Allocating and managing cloud computing resources for disaster recovery

A method, executed by a computer, for allocating resources includes assigning resiliency attributes to a server having a workload, linking each server to a partner resource, duplicating the workload of each server in an offsite location accessible to the partner resource, detecting a disaster event, and transferring the workload of the server automatically to the partner resource. In some embodiments, the partner resource is a plurality of pool servers. ... International Business Machines

12/15/16 / #20160366217

Clone efficiency in a hybrid storage cloud environment

An efficient cloning mechanism is provided for a distributed storage environment, where, for example, a private cloud computing environment and a public cloud computing environment are included in a hybrid cloud computing environment (on-premise object storage to off-premise computation resources), to improve computation workloads. The disclosed algorithm forms an efficient cloning mechanism in a hybrid storage environment where the read/write speed of data from the disk is not limited by its angular velocity.. ... International Business Machines

12/15/16 / #20160366216

In-memory data store replication through remote memory sharing

A method for sharing memory of a backup server with a primary server for data replication is provided. The method may include maintaining a plurality of identical memory regions between the primary server and the backup server. ... International Business Machines

12/15/16 / #20160366215

Maintaining service configuration consistency across nodes of a clustered file system

A computer program product is provided for extending a clustered file system. The computer program product comprises a computer readable storage medium having program instructions embodied therewith. ... International Business Machines

12/15/16 / #20160366209

Transmission of hierarchical data files based on content selection

A method, a computer program product, and a computer system for transmitting a hierarchical data file from a first computer device to a second computer device. The first computer device receives a request for transmitting a first hierarchical data file. ... International Business Machines

12/15/16 / #20160366201

Suppressing stream functionality to expedite preferred data

A controller analyzes a tuple in an operator graph. The controller determines that the tuple includes one or more selected characteristics. ... International Business Machines

12/15/16 / #20160366140

Dynamic extensible application server management

A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational functionality of application server plugins deployed at a group of application servers. One of request-level application server functionality and server-level application server functionality of at least one of the group of application servers is changed by issuing a real-time application-server plugin command received from the real-time plugin command-driven administrative control interface to a deployed application server plugin.. ... International Business Machines

12/15/16 / #20160366135

Configuration management for virtual machine environment

A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for connecting the physical device to the virtual machine and determining whether the virtual machine satisfies a first connection permission condition and whether the physical device satisfies a second connection permission condition. In response to a determination that the virtual machine does not satisfy the first connection permission condition, a configuration of the virtual machine is changed to satisfy the first connection permission condition. ... International Business Machines

12/15/16 / #20160366104

Container-based system administration

Methods, computing systems and computer program products implement embodiments of the present invention that include defining a first multiple of software container configurations and a second multiple of permission sets, and receiving, by a first computer, a request to perform a service operation on a second computer having multiple resources. Upon identifying one or more of the resources that are required for the service operation, a given software container configuration and a given permission set are selected based on the identified one or more resources, and the given software container configuration and the given permission set are conveyed to the second computer. ... International Business Machines

12/15/16 / #20160366091

Email thread sequence management

Email thread sequence management includes monitoring outgoing email messages of an email server and creating a metadata record for an email thread of multiple email messages relating to a subject, where the metadata record includes an entry of metadata for each email message in the email thread, and where each entry has a sequence number. A sequence number is added to an outgoing email message according to the sequence number of the email message in the metadata record for the email thread. ... International Business Machines

12/15/16 / #20160366089

Eliciting positive responses to a social media posting

Communicating social media content over a computer network via one or more social media services, in one aspect, may include receiving content from a first node of an online social network. A set of topics in the content is generated. ... International Business Machines

12/15/16 / #20160366088

Ensuring that a composed message is being sent to the appropriate recipient

A method, system and computer program product for ensuring that the composed message is being sent to the appropriate recipient. A message being composed by an author is detected. ... International Business Machines

12/15/16 / #20160366083

Tracking conversation threads among electronic communications

A method for identifying a conversation thread among electronic communications. The method includes a computer processor identifying that a user is accessing a first electronic communication from a plurality of electronic communications. ... International Business Machines

12/15/16 / #20160366082

Tracking conversation threads among electronic communications

A method for identifying a conversation thread among electronic communications. The method includes a computer processor identifying that a user is accessing a first electronic communication from a plurality of electronic communications. ... International Business Machines

12/15/16 / #20160366080

Electronic rumor cascade management in computer network communications

Controlling cascade of information transmitted and received via one or more online data sharing platforms and electronic communication network. A message to be shared is detected. ... International Business Machines

12/15/16 / #20160366074

Online communication modeling and analysis

A method for modeling and analyzing online communications is provided. The method may include detecting at least one online conversation. ... International Business Machines

12/15/16 / #20160366068

Framework for qos in embedded computer infrastructure

Various embodiments providing a framework for quality of service (qos) within and between globally distributed computing components by a processor. At least one resource required for a computing process is estimated by examining information associated with a resource template. ... International Business Machines

12/15/16 / #20160366067

Allocating a global resource in a distributed grid environment

A technique for allocating a global resource in a distributed grid environment includes a master resource manager (mrm), and a plurality of slave resource managers (srms) each configured to allocate a global resource within a respectively controlled region of a distributed grid computing environment. The mrm receives from each srm use data and demand data associated with the global resource by each consumer in the respective region controlled by the respective srm. ... International Business Machines

12/15/16 / #20160366050

Locating service endpoints from a service registry

A method, operable by a service registry in a service orientated architecture system, for providing a service within the system. A service request is received from a service requester in the system. ... International Business Machines

12/15/16 / #20160366047

Temperature sensitive routing of data in a computer system

An apparatus and method routes data over network links based on a temperature of the network links. When the temperature of a link meets a first threshold a routing mechanism re-routes a portion of the network traffic over a lower temperature link to reduce the likelihood that the link will exceed a second threshold that necessitates that the link be throttled back or disabled. ... International Business Machines

12/15/16 / #20160366046

Support for high availability of service appliances in a software-defined network (sdn) service chaining infrastructure

In one embodiment, a controller includes a processor and logic integrated with and/or executable by the processor, the logic being configured to receive a query from a network device for instruction regarding where to send network traffic, the query including a first cookie, determine whether the first cookie is legitimate, and send a message to the network device, the message including either: the first cookie in response to a determination that the first cookie is legitimate or a second cookie which indicates a second next hop device determined by the controller in response to a determination that the first cookie is not legitimate. Other systems, methods, and computer program products are described in more embodiments.. ... International Business Machines

12/15/16 / #20160366042

Limiting data output from windowing operations

A method for regulating output from stream operators performing a windowing operation may include receiving stream of tuples to be processed by a plurality of processing elements, each processing element having one or more stream operators. The method may also include receiving a first stream of tuples at a first stream operator, the first stream operator being configured to generate a stream of accumulated tuples according to a set of windowing conditions. ... International Business Machines

12/15/16 / #20160366037

Performance monitoring of wait times

Embodiments of the present disclosure include a method, a system, and a computer program product for determining wait times of tuples within a streaming environment. The method includes monitoring one or more tuples being processed within an operator graph where the operator graph includes a first processing element and a queue of the first processing element. ... International Business Machines

12/15/16 / #20160366016

Virtualization of consistency groups

In an approach for provisioning a server utilizing a virtual consistency group, a processor receives a request to provision a first server utilizing a first application consistency group, wherein the first application consistency group is a virtualized consistency group. A processor defines a storage consistency group. ... International Business Machines

12/15/16 / #20160366011

Making subscriber data addressable as a device in a mobile data network

A mobile data network supports making subscriber data addressable as devices in a mobile data network. Each data chunk is assigned a device address in the mobile data network. ... International Business Machines

12/15/16 / #20160365872

Pad encoding and decoding

A system, method and computer program product for encoding an input string of binary characters representing alphanumeric characters. A system includes: a character writing engine for writing a binary character to an empty cell of a multi-dimensional shape beginning with a starting empty cell; a next cell determination engine for determining a next empty cell by traversing neighboring cells in the multi-dimensional shape until an empty cell is located; a loop facilitator for looping back to the character writing engine and the next cell determining engine until there are no more data characters or a next empty cell is not determined; and a serialization engine for serializing the cells into a one dimensional binary string of characters representing an encoded string of alphanumeric characters.. ... International Business Machines

12/15/16 / #20160365864

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines

12/15/16 / #20160365863

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines

12/15/16 / #20160365862

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines

12/15/16 / #20160365861

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines

12/15/16 / #20160365858

High speed level translator

A high speed vpp level translator circuit using thin-oxide field effect transistors (fets) and methods of use are disclosed. The level translator includes a resistor divider and a one-shot circuit in parallel with the resistor divider. ... International Business Machines

12/15/16 / #20160365682

Cable connector grouping apparatus

The embodiments relate to an apparatus allowing for the insertion and removal of multiple like and/or unlike connectors simultaneously without requiring permanent connector modification. The apparatus includes at least a first housing and a second housing. ... International Business Machines

12/15/16 / #20160365473

Mis-il silicon solar cell with passivation layer to induce surface inversion

The present invention relates generally to a photovoltaic solar cell device and more particularly, to a structure and method of inducing charge inversion in a silicon substrate by using a highly charged passivation layer on an upper side of the silicon substrate. A positively charged passivation layer comprising hafnium oxide may be formed on an insulating layer covering an upper surface of a p-doped silicon substrate and on a metal contact to induce a strong inversion layer in an upper portion of the p-doped silicon substrate.. ... International Business Machines

12/15/16 / #20160365432

Punch through stopper in bulk finfet device

A method of forming a semiconductor device that includes forming a fin structure from a bulk semiconductor substrate and forming an isolation region contacting a lower portion of a sidewall of the fin structure, wherein an upper portion of the sidewall of the fin structure is exposed. A sacrificial spacer is formed on the upper portion of the sidewall of the fin structure. ... International Business Machines

12/15/16 / #20160365424

Self-aligned trench silicide process for preventing gate contact to silicide shorts

A method of forming a finfet device includes forming a plurality of fins on a substrate; forming a plurality of dummy gate structures over the plurality of fins, the dummy gate structures including gate sidewall spacers; performing an epitaxial growth process to merge the plurality of fins at locations not covered by the dummy gate structures; forming an interlevel dielectric (ild) layer over the dummy gate structures and merged fins, the ild layer comprising a first dielectric material; removing portions of the ild layer and the merged fins so as to define trenches; and filling the trenches with a second dielectric material having an etch selectivity with respect to the first dielectric material, and wherein the gate sidewall spacers also comprise the second dielectric material such that regions of the merged fins in active areas are surrounded by the second dielectric material.. . ... International Business Machines

12/15/16 / #20160365420

Self-aligned channel-only semiconductor-on-insulator field effect transistor

In one example, a field effect transistor includes a fin. The fin includes a conducting channel formed from semiconductor-on-insulator and source/drain regions formed on opposite ends of the conducting channel, wherein the source/drain regions are formed from a material other than semiconductor-on-insulator. ... International Business Machines

12/15/16 / #20160365347

Alternative threshold voltage scheme via direct metal gate patterning for high performance cmos finfets

Multiple gate stack portions are formed in a gate cavity by direct metal gate patterning to provide finfets having different threshold voltages. The different threshold voltages are obtained by selectively incorporating metal layers with different work functions in different gate stack portions.. ... International Business Machines

12/15/16 / #20160365329

Chip-on-chip structure and methods of manufacture

Sintered connection structures and methods of manufacture are disclosed. The method includes placing a powder on a substrate and sintering the powder to form a plurality of pillars. ... International Business Machines

12/15/16 / #20160365328

Chip-on-chip structure and methods of manufacture

Sintered connection structures and methods of manufacture are disclosed. The method includes placing a powder on a substrate and sintering the powder to form a plurality of pillars. ... International Business Machines

12/15/16 / #20160365314

Capacitors

Back end of the line (beol) capacitors and methods of manufacture are provided. The method includes forming wiring lines on a substrate, with spacing between adjacent wiring lines. ... International Business Machines

12/15/16 / #20160365312

Capacitors

Back end of the line (beol) capacitors and methods of manufacture are provided. The method includes forming wiring lines on a substrate, with spacing between adjacent wiring lines. ... International Business Machines

12/15/16 / #20160365297

Tim strain mitigation in electronic modules

A heat spreading lid including a lid body and a wing portion having a thermal interface material disposed on the wing portion such that the wing portion flexibly moves with the thermal interface material independently from the lid body.. . ... International Business Machines

12/15/16 / #20160365292

Method and structure for enabling controlled spacer rie

A method and structure to enable reliable dielectric spacer endpoint detection by utilizing a sacrificial spacer fin are provided. The sacrificial spacer fin that is employed has a same pitch as the pitch of each semiconductor fin and the same height as the dielectric spacers on the sidewalls of each semiconductor fin. ... International Business Machines

12/15/16 / #20160365291

Vertically integrated memory cell

A method of forming a vertically integrated memory cell including a deep trench extending into a substrate, a trench capacitor located within the deep trench, and a vertical transistor at least partially embedded within the deep trench above the trench capacitor, the vertical transistor is in direct contact with and electrically coupled to the trench capacitor.. . ... International Business Machines

12/15/16 / #20160365287

Self-aligned hard mask for epitaxy protection

A method includes isolating a first and at least a second region on a semiconductor substrate, and forming one or more devices on each of the first and at least second regions. Forming the one or more devices includes forming at least one gate structures in each of the first and at least second regions on a first surface of the substrate, depositing a spacer over the gate structures in each of the first and the at least second regions and over the first surface of the substrate, etching horizontal portions of the spacer in the first region, growing epitaxial portions in the first region in alignment with said at least one gate structure in the first region, oxidizing exposed surfaces of the epitaxial portions in the first region, and repeating the etching, growing and oxidizing steps for the at least second region.. ... International Business Machines

12/15/16 / #20160365286

Semiconductor fins for finfet devices and sidewall image transfer (sit) processes for manufacturing the same

A method of forming a semiconductor structure includes providing a semiconductor substrate, forming at least one precursor semiconductor fin from the semiconductor substrate, etching through at least a portion of the at least one precursor semiconductor fin to form at least one patterned precursor semiconductor fin having a gap therein. The at least one patterned precursor semiconductor fin includes a first vertical surface and a second vertical surface with the gap therebetween. ... International Business Machines

12/15/16 / #20160365285

Self-aligned low defect segmented iii-v finfet

A method includes forming one or more fin structures on a substrate, the one or more fin structures comprising a first material comprising a first lattice structure and the substrate comprising a second material comprising a second lattice structure. Forming the one or more fin structures on the substrate includes forming one or more trenches in the substrate, and growing the first material in the one or more trenches. ... International Business Machines

12/15/16 / #20160365281

Flip chip alignment mark exposing method enabling wafer level underfill

Alignment marks on a semiconductor device surface are exposed and exposed surfaces cleaned after an obscuring coating is applied over the surface and marks. The surface can be an attachment surface of the device and can include c4 solder bumps of a flip-chip type device and the coating can include a wafer level underfill coating that is substantially optically opaque. ... International Business Machines

12/15/16 / #20160365280

Chemoepitaxy etch trim using a self aligned hard mask for metal line to via

A method of forming metal lines that are aligned to underlying metal features that includes forming a neutral layer atop a hardmask layer that is overlying a dielectric layer. The neutral layer is composed of a neutral charged di-block polymer. ... International Business Machines

12/15/16 / #20160365268

Module testing utilizing wafer probe test equipment

A module plate is provided for use with a wafer handler and testing mechanism. The module plate has a diameter equivalent to an integrated circuit wafer and a height equivalent to or less than a height of a module lid associated with each module in a plurality of modules associated with the module plate. ... International Business Machines

12/15/16 / #20160365252

Method of lateral oxidation of nfet and pfet high-k gate stacks

A method for fabricating a semiconductor circuit includes obtaining a semiconductor structure having a gate stack of material layers including a high-k dielectric layer; oxidizing in a lateral manner the high-k dielectric layer, such that oxygen content of the high-k dielectric layer is increased first at the sidewalls of the high-k dielectric layer; and completing fabrication of a n-type field effect transistor from the gate stack after laterally oxidizing the high-k dielectric layer of the gate stack.. . ... International Business Machines

12/15/16 / #20160365156

Built-in self-test (bist) circuit and associated bist method for embedded memories

Disclosed is a chip with a built-in self-test (bist) circuit that incorporates a bist engine that tests memories in parallel and that, prior to testing, dynamically sets the size of the address space to be swept. The bist engine comprises an address generator that determines a superset of address space values associated with all the memories. ... International Business Machines

12/15/16 / #20160365146

Tcam structures with reduced power supply noise

A ternary content addressable memory (tcam) structure may activate individual groups of subarrays in the tcam structure, during a non-search mode, at configurable intervals of time. The activating causes the tcam structure to select locations and sequences in which subarrays of the tcam structure are activated or deactivated. ... International Business Machines

12/15/16 / #20160365139

Circuit to improve sram stability

Approaches for stability of cells in a static random access memory (sram) array are provided. A circuit includes a precharging circuit configured to precharge bitlines of a static random access memory (sram) array to a first voltage potential for a non-read operation and to a second voltage potential for a read operation. ... International Business Machines

12/15/16 / #20160365130

Current-mode sense amplifier

A current sense amplifier is provided comprising a reference current input terminal, a control line input terminal, a sense current input terminal and a first output terminal. The amplifier further comprises a first nand gate comprising first and second gate input terminals, and a second output terminal being coupled to the first output terminal of the amplifier. ... International Business Machines

12/15/16 / #20160365110

Symbol timing recovery scheme for parallel recording channel systems

An apparatus includes a loop filter that receives a plurality of input signals. Each of the input signals is based on a different timing error detector output signal. ... International Business Machines

12/15/16 / #20160365094

Management of voice commands for devices in a cloud computing environment

Provided is a lightweight computational device that is configured to be in communication with a cloud both directly and via a smart computational device. The lightweight computational device receives a voice command from a user, wherein the lightweight computational device does not have adequate processing power to convert the voice command to a text command. ... International Business Machines

12/15/16 / #20160365091

Analysis of professional-client interactions

One or more processors receive recording data of a meeting between a first individual and a second individual. One or more processors analyze the recording data to identify one or more characteristics of the first individual. ... International Business Machines

12/15/16 / #20160364993

Providing targeted, evidence-based recommendations to improve content by combining static analysis and usage analysis

Providing targeted, evidence-based recommendations to improve digital content quality, in one aspect, may include partitioning digital content into a sequence of logical content modules. Quality scores for the logical content modules along a plurality of quality dimensions may be determined. ... International Business Machines

12/15/16 / #20160364992

Teaching aid using predicted patterns in spelling errors

Teaching aid for improving the spelling competency of a student. The framework provides differentiated instruction and tailors interventions specific to the needs of the student by taking into account relative performance of peers and the root cause of an identified spelling error.. ... International Business Machines

12/15/16 / #20160364919

Accuracy and efficiency of road user charging

In an approach to improving road user charging, a computer retrieves one or more zone records and at least a first zone sequence from a computing device associated with a vehicle, where the one or more zone records include one or more distances traveled by the vehicle. The computer calculates a second zone sequence from the retrieved zone records. ... International Business Machines

12/15/16 / #20160364918

Accuracy and efficiency of road user charging

In an approach to improving road user charging, one or more computer processors retrieve one or more zone records and at least a first zone sequence from a computing device associated with a vehicle, where the one or more zone records include one or more distances traveled by the vehicle. The one or more computer processors calculate a second zone sequence from the retrieved zone records. ... International Business Machines

12/15/16 / #20160364824

Managing transportation deployment using customer activity

A transportation company uses transportation vehicles. The transportation company receives a plurality of transportation needs. ... International Business Machines

12/15/16 / #20160364786

Automated in store shopping system

Embodiments of the present invention provide a method for automated grocery shopping. The method includes generating a route to grocery items within a store and directing a robotic cart to collect the grocery items according to the generated route. ... International Business Machines

12/15/16 / #20160364785

Automated in store shopping system

Embodiments of the present invention provide a method, computer program product, and system for automated shopping. The method includes generating a route to items within a location and directing a robotic cart to collect the items according to the generated route. ... International Business Machines

12/15/16 / #20160364780

Analysis of professional-client interactions

One or more processors receive recording data of a meeting between a professional and a client. One or more processors analyze the recording data to make one or more determinations. ... International Business Machines

12/15/16 / #20160364779

Visual comparisons using personal objects

Embodiments of the present invention provide automated systems and methods for visualizing a product using standard and personal objects. An image can be retrieved from the shopping history or shopping cart of a user, and the dimensions of the image can be automatically adjusted to make an accurate relative size comparison to a product for purchase.. ... International Business Machines

12/15/16 / #20160364754

Personalized marketing by deriving the sentiments from telephonic and textual conversation over a mobile device

A method for creating a personalized marketing strategy for a user involved in an online conversation associated with a mobile device is provided. The method may include receiving a strategy and execution plan. ... International Business Machines

12/15/16 / #20160364733

Attitude inference

Embodiments relate to a tool for predicting an attitude of a user towards a target without directly surveying the user. Social media data associated with or related to a target is collected and stored. ... International Business Machines

12/15/16 / #20160364702

System and method for payment promise transfers based on preferences

A method includes electronically receiving at a user device of a second party a digital promise to pay a certain amount of money in exchange for goods or services from the second party, the digital promise to pay being generated by a user device of a first party; electronically sending a request from the user device of the second party to a user device of a third party to electronically transfer the digital promise to pay to the user device of the third party in exchange for goods or services from the third party. Sending the request includes sending at least one set of preferences defined at least by the first party. ... International Business Machines

12/15/16 / #20160364698

Conflict management for calendar events

Conflict management for calendar events is provided. A schedule of a user has one or more schedule entries, each corresponding to an event that the user is available to attend. ... International Business Machines

12/15/16 / #20160364697

Conflict management for calendar events

Conflict management for calendar events is provided. A schedule of a user has one or more schedule entries, each corresponding to an event that the user is available to attend. ... International Business Machines

12/15/16 / #20160364696

Meeting scheduler for automated face-to-face meeting generation

Approaches are provided for rescheduling a meeting as a face-to-face meeting. An approach includes collecting location information from each attendee of a scheduled meeting. ... International Business Machines

12/15/16 / #20160364682

Wired hierarchical inventory system

The system for inventory management includes a plurality of tags, a root tag connected via a wire to at least one tag of the plurality of tags, and a reading device. Each tag of the plurality of tags corresponds to an item and each tag of the plurality of tags is connected via a wire to at least one other tag of the plurality of tags. ... International Business Machines

12/15/16 / #20160364657

Managing user transportation needs without user intervention

A software application on a device manages transportation procurement for a user. The software application collects application data. ... International Business Machines

12/15/16 / #20160364653

Modular array of vertically integrated superconducting qubit devices for scalable quantum computing

A technique relates to an assembly for a quantum computing device. A quantum bus plane includes a first set of recesses. ... International Business Machines

12/15/16 / #20160364652

Attitude inference

Embodiments relate predicting an attitude of a user towards a target without directly surveying the user. Social media data associated with or related to a target is collected and stored. ... International Business Machines

12/15/16 / #20160364628

Visual comparisons using personal objects

Embodiments of the present invention provide automated systems and methods for visualizing a product using standard and personal objects. An image can be retrieved from the shopping history or shopping cart of a user, and the dimensions of the image can be automatically adjusted to make an accurate relative size comparison to a product for purchase.. ... International Business Machines

12/15/16 / #20160364584

Utilization of multiple keypads for password inputs

A computer system includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first portion includes a first value and a second value. The program instructions receive the first portion, wherein the first portion includes a first number of keys selected equal to the first value and the second value present in the first number of keys selected. ... International Business Machines

12/15/16 / #20160364578

Cloud data protector

A method and system for performing an operation on protected sensitive data. A processor of a data processing system receives, from a computing system: (i) the protected sensitive data, (ii) an identification of an operation that accesses and utilizes the protected sensitive data during performance of the operation, and (iii) a request to perform the operation, wherein the computing system is external to the data processing system. ... International Business Machines

12/15/16 / #20160364572

Input device for preventing password theft by thermal imaging

Exemplary embodiments of the present invention provide an input device including a keyboard having at least two keys. A heating or cooling element is connected to each key. ... International Business Machines

12/15/16 / #20160364571

Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history

A method to augment a plurality of ips or siem evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system. ... International Business Machines

12/15/16 / #20160364563

Managing access to an electronic system

A method, system or computer usable program product for managing access to an electronic system through a touchscreen device including presenting a display of a first and a second scrolling stream of icons; responsive to user input, detecting contemporaneous selection of a first icon from the first scrolling stream and a second icon from the second scrolling stream; and responsive to the selection of the first and second icon matching an established unlock pattern, unlocking the electronic system.. . ... International Business Machines

12/15/16 / #20160364557

User authentication

A method and system for authenticating a user is provided. The method includes receiving keyboard entries from a user while a cursor of a computer screen is positioned in a password field of the user. ... International Business Machines

12/15/16 / #20160364554

Identifying usage of code

As disclosed herein a method, executed by a computer, includes receiving a deployed computer application to be staged, where the deployed computer application includes monitored items corresponding to a downloaded code package, verifying the integrity of the downloaded code package included in the deployed computer application, and staging the deployed computer application to provide a staged computer application. The method further includes monitoring the staged computer application for usage of monitored items corresponding to the downloaded code package and billing a customer according to usage of the monitored items. ... International Business Machines

12/15/16 / #20160364519

Timing analysis of circuits using sub-circuit timing models

Examples of techniques for analyzing and generating timing reports for circuits are described herein. A computer-implemented method includes splitting a netlist or cross section of a circuit into sub-circuits. ... International Business Machines

12/15/16 / #20160364518

Addressing early mode slack fails by book decomposition

A computer implemented method for correcting early mode slack fails in an electronic circuit can include generating a logical description of an electronic circuit having a path from first circuit to a second circuit. The method then include compiling the logical description into a technology specific representation of the circuit. ... International Business Machines

12/15/16 / #20160364516

Composite views for ip blocks in asic designs

A computing device for a generating composite view for an intellectual property (ip) core may obtain constraints for multiple application specific integrated circuits (asic) designs in which the ip core is used; and determine composite constraints for the ip core based on the constraints for the multiple asic designs. The composite constraints may be within all constraints for the multiple asic designs. ... International Business Machines

12/15/16 / #20160364513

Variable accuracy parameter modeling in statistical timing

Systems and methods compute a mean timing value of an integrated circuit design for variables using a first timing calculation of relatively higher accuracy; and calculate a first timing value of the integrated circuit design for the variables, using a second timing calculation having a relatively lower accuracy. Such systems and methods calculate second timing values of the integrated circuit design for additional sets of variables using the second timing calculation; and calculate finite differences of each of the second timing values to the first timing value. ... International Business Machines

12/15/16 / #20160364506

Automating system on a chip customized design integration, specification, and verification through a single, integrated service

A user specified high level design selects a plurality of ip cores for placement in a customized system on a chip. A single integrated service automatically performs each of a design integration phase, specification phase, and verification phase for the user specified high level design to generate an integration file specifying stitching between a plurality of pins of each of the plurality of ip cores, a specification file specifying one or more characteristics of the customized system on a chip based on the user specified high level design, and a verification testbench for verification of the user specified high level design.. ... International Business Machines

12/15/16 / #20160364501

Performance monitoring of wait times

Embodiments of the present disclosure include a method, a system, and a computer program product for determining wait times of tuples within a streaming environment. The method includes monitoring one or more tuples being processed within an operator graph where the operator graph includes a first processing element and a queue of the first processing element. ... International Business Machines

12/15/16 / #20160364500

Synthetic events to chain queries against structured data

An approach is provided in which a knowledge manager analyzes parent/child hierarchies between semi-structured items included in a semi-structured resource. The knowledge manager generates synthetic events based upon the parent/child hierarchy analysis and creates a structured resource utilizing the synthetic events. ... International Business Machines

12/15/16 / #20160364499

Spatially-oriented traversal animations for network address transitions

A device for providing spatially-oriented traversal animations during web navigation. The device is configured to perform operations that include receiving a destination internet address for a destination web page into a graphical web browser that is displaying a current web page having a current internet address on an electronic display. ... International Business Machines

12/15/16 / #20160364493

Declarative and adaptive content management

A computer-implemented method for content management across multiple server computers includes receiving operational information associated with each of two or more local server computers. The computer determines a strategy for transferring a file between a central server computer and a client device using the two or more local server computers based, at least in part, on the operational information associated with each of the two or more local server computers. ... International Business Machines

12/15/16 / #20160364483

Modification of search subject in predictive search sentences

A method for modification of search subjects in a set of predictive search terms in which a set of search terms from a user is received and communicated to a search engine. One or more sets of predictive search terms from the search engine based on the set of search terms is received from the search engine and one or more search subjects within the one or more sets of predictive search terms is identified. ... International Business Machines

12/15/16 / #20160364473

Source code search engine

A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. ... International Business Machines

12/15/16 / #20160364472

Functional space-time trajectory clustering

A method, apparatus and computer program product for functional space-time trajectory clustering. The method comprises receiving collections of data structures comprising location and time descriptors. ... International Business Machines

12/15/16 / #20160364468

Database index for constructing large scale data level of details

An index for large databases is disclosed. Data is grouped into clusters and the clusters are grouped into levels of detail. ... International Business Machines

12/15/16 / #20160364463

Ordering records for timed meta-data generation in a blocked record environment

Embodiments of the present invention provide a method, computer program product, and computer system for ordering records in a blocked record environment. The method includes generating metadata associated with blocked records. ... International Business Machines

12/15/16 / #20160364462

Data processing flow optimization

One or more processors evaluate whether a subset of a dataset is sorted. One or more processors process the dataset if it is determined that the subset of the dataset is sorted.. ... International Business Machines

12/15/16 / #20160364461

Data processing flow optimization

One or more processors evaluate whether a subset of a dataset is sorted. One or more processors process the dataset if it is determined that the subset of the dataset is sorted.. ... International Business Machines

12/15/16 / #20160364452

Traversing a sparql query and translation to a semantic equivalent sql

In an approach for semantically translating data. Aspects of an embodiment of the present invention include an approach for semantically translating data, wherein the approach includes a processor selecting a first node. ... International Business Machines

12/15/16 / #20160364451

Suppressing stream functionality to expedite preferred data

A controller analyzes a tuple in an operator graph. The controller determines that the tuple includes one or more selected characteristics. ... International Business Machines

12/15/16 / #20160364450

Tracking tuples to reduce redundancy in a graph

A stream of tuples can assigned identifiers to tuples to store only the nonduplicative tuples. In a streams processing environment, a stream application actor like an operator can receive a series of tuples, process them, and output another series of tuples. ... International Business Machines

12/15/16 / #20160364449

Cognitive architecture with content provider managed corpus

A method for controlled sharing, in a cognitive computing system having a memory and a processor, of content from a variety of content providers may include receiving, by the cognitive computing system, an inquiry, wherein the inquiry is directed to at least one content topic. The method may then include identifying, by the cognitive computing system, the at least one content topic, and determining that a cognitive component of the cognitive computing system managed by a content provider has access to a content repository addressing the at least one content topic. ... International Business Machines

12/15/16 / #20160364446

Modification of search subject in predictive search sentences

A computer implemented method for modification of search subjects in a set of predictive search terms in which a set of search terms from a user is received. One or more sets of predictive search terms generated and one or more search subjects within the one or more sets of predictive search terms is identified and communicated to the user. ... International Business Machines

12/15/16 / #20160364439

Verification of record based systems

The method includes generating, by one or more computer processors, a first piece of data based on a defined set of data characteristics. The method further includes generating a first bit, wherein the first bit corresponds to the first generated piece of data. ... International Business Machines

12/15/16 / #20160364438

Authorizing distributed task processing in a distributed storage network

A method begins by a distributed storage (ds) processing module transmitting a set of requests to a set of ds units regarding a set of data elements and receiving a set of respective requests from the set of ds units. When the set of respective requests is in accordance with a current distributed task/data responsibility allocation period, the method continues with the ds processing module issuing a set of responses to the set of ds units. ... International Business Machines

12/15/16 / #20160364436

Predicting validity of data replication prior to actual replication in a transaction processing system

Validating a write of a replica record to a replica data store in a transaction processing system. The source record is written to a location in the source data store, and the location is recorded in a transaction log file. ... International Business Machines

12/15/16 / #20160364432

Automatic conflict resolution during software catalog import

Aspects of the present invention disclose a method, computer program product, and system for managing conflicts in an import operation. The method includes one or more processors identifying a conflict in an import operation of an incoming set of data into an existing database, wherein the incoming set of data includes an incoming entry, and the existing database includes an existing entry that corresponds to the identified conflict. ... International Business Machines

12/15/16 / #20160364431

Verification of record based systems

The method includes generating, by one or more computer processors, a first piece of data based on a defined set of data characteristics. The method further includes generating a first bit, wherein the first bit corresponds to the first generated piece of data. ... International Business Machines

12/15/16 / #20160364425

Hierarchical diff files

A method, according to one embodiment, includes identifying data to be stored in one or more tables on a bucket, where the bucket is an allocation of a partitioned storage in a node of one or more nodes of a swarm database, the bucket having at least one replica, and where no two identical bucket replicas reside on a single node. An identifier and a data storage hierarchical level are assigned to the data. ... International Business Machines

12/15/16 / #20160364424

Partition-based index management in hadoop-like data stores

A method for processing a dataset in a partitioned distributed storage system having data stored in a base table and an index stored in an index table, may include receiving base and index table metadata from the partitioned distributed storage system, where the base and index table metadata includes respective table partition information. The method may further include partitioning the dataset into a set of base-delta files according to the base table metadata, and generating a set of index-delta files corresponding with the base-delta files according to the index table metadata. ... International Business Machines

12/15/16 / #20160364421

Database index for constructing large scale data level of details

An index for large databases is disclosed. Data is grouped into clusters and the clusters are grouped into levels of detail. ... International Business Machines

12/15/16 / #20160364418

Identifying and displaying related content

The method includes identifying, by one or more computer processors, a first content consumed by a user. The method further includes identifying, by one or more computer processors, objects in the first content. ... International Business Machines

12/15/16 / #20160364417

Maintaining a master schema

As disclosed herein a method, executed by a computer, includes accessing a master schema defining one or more reference models, the master schema comprising a plurality of model elements each model element thereof comprising an element name and an element definition and fragmenting the master schema to provide a plurality of sub-projects. The method further includes identifying a change in a sub-project model element, updating the master schema according to the identified change to the sub-project model element, and distributing the updated master schema changes to other sub-projects that include the changed model element. ... International Business Machines

12/15/16 / #20160364416

Maintaining a master schema

As disclosed herein a method, executed by a computer, includes accessing a master schema defining one or more reference models, the master schema comprising a plurality of model elements each model element thereof comprising an element name and an element definition and fragmenting the master schema to provide a plurality of sub-projects. The method further includes identifying a change in a sub-project model element, updating the master schema according to the identified change to the sub-project model element, and distributing the updated master schema changes to other sub-projects that include the changed model element. ... International Business Machines

12/15/16 / #20160364406

Integrating external services with a clustered file system

A computer program product is provided for extending a clustered file system. The computer program product comprises a computer readable storage medium having program instructions embodied therewith. ... International Business Machines

12/15/16 / #20160364405

Aggregating modifications to a database for journal replay

Aggregating database entry modifications for replay of database changes includes: inserting, in a journal modification table, of database entry modifications, where each database entry is associated with a relative record number; and, for each relative record number: aggregating, in the journal modification table, a plurality of the modifications into a single modification.. . ... International Business Machines

12/15/16 / #20160364403

Tracking tuples to reduce redundancy in a graph

A stream of tuples can assigned identifiers to tuples to store only the nonduplicative tuples. In a streams processing environment, a stream application actor like an operator can receive a series of tuples, process them, and output another series of tuples. ... International Business Machines

12/15/16 / #20160364401

Storage data reduction analysis and forecast

Methods, computing systems and computer program products implement embodiments of the present invention that include configuring a storage system to store multiple storage entities for access by one or more host computers in communication with the storage system, and specifying a compression condition including a minimum compression ratio. The storage system can then estimate an expected compression ratio for a given storage entity, compress the given storage entity upon the expected compression ratio meeting the compression condition, and provide, to a given host computer, access to the compressed given storage entity.. ... International Business Machines

12/15/16 / #20160364399

Aggregating modifications to a database for journal replay

Aggregating database entry modifications for replay of database changes includes: inserting, in a journal modification table, of database entry modifications, where each database entry is associated with a relative record number; and, for each relative record number: aggregating, in the journal modification table, a plurality of the modifications into a single modification.. . ... International Business Machines

12/15/16 / #20160364394

Mobile application discovery using an electronic map

In an approach to mobile application usage detection, one or more computer processors detect mobile application usage data of one or more computing devices in a first geographic area during a first time period. The one or more computer processors display the mobile application usage data on an electronic map, where the electronic map depicts at least the first geographic area.. ... International Business Machines

12/15/16 / #20160364391

Demographic-based learning in a question answering system

A first question may be received. A first tag may be identified. ... International Business Machines

12/15/16 / #20160364388

Selective exposure of document tags for search, access, and feed based on user groups

A method for selective exposure of document tags associated with a plurality of online search engine content based on a predetermined user criteria is provided. The method may include annotating a content tag associated with the plurality of search engine content with a plurality of metadata, whereby the plurality of metadata includes a text and an access control. ... International Business Machines

12/15/16 / #20160364381

Open microphone perpetual conversation analysis

A conversation analytics system including multiple microphones that each respectively capture at least a part of a single real world natural language conversation. The natural language data (for example, audio of natural language, or audio of natural language converted to text) from each of the multiple microphones is combined into a single combined piece of natural language data (for example, a combined audio file, or a combined piece of text). ... International Business Machines

12/15/16 / #20160364374

Visual indication for images in a question-answering system

An answer to an input question may be formulated using a first corpus of information. Using the answer, a group of candidate images related to the answer from a second corpus of information may be identified. ... International Business Machines

12/15/16 / #20160364370

Optimization for rendering web pages

In one embodiment, there is provided a method for rendering a web page. The method comprises parsing a hypertext markup language (html) document for a web page to generate a document object model (dom) tree. ... International Business Machines

12/15/16 / #20160364369

Optimization for rendering web pages

In one embodiment, there is provided a method for rendering a web page. The method comprises parsing a hypertext markup language (html) document for a web page to generate a document object model (dom) tree. ... International Business Machines

12/15/16 / #20160364368

Organizing messages in a hierarchical chat room framework based on topics

A first message may be displayed within a main chat room. The first message may be associated with a first topic. ... International Business Machines

12/15/16 / #20160364364

Low latency data exchange between processing elements

Direct communication of data between processing elements is provided. An aspect includes sending, by a first processing element, data over an inter-processing element chaining bus. ... International Business Machines

12/15/16 / #20160364361

Access and protection of i2c interfaces

A method, computer program product, and system to implement access control from a master device to a slave device over an inter-integrated circuit (i2c) interface are described. The method includes generating, using a processor, a control block defining the access control to the slave device over the i2c interface. ... International Business Machines

12/15/16 / #20160364352

Low latency data exchange between processing elements

Direct communication of data between processing elements is provided. An aspect includes sending, by a first processing element, data over an inter-processing element chaining bus. ... International Business Machines

12/15/16 / #20160364344

Cache structure for a computer system providing support for secure objects

A method (and structure) protects confidentiality and integrity of information in a secure object from other software on the system. An object-id value that identifies software currently executing on a cpu (central processing unit) is stored, the value having a predetermined standard value when software that is not a secure object is executing. ... International Business Machines

12/15/16 / #20160364339

Reserving a storage area and building page frame table entries

In one embodiment, a computer-implemented method includes receiving a large frame area (lfarea) request, including a request for a plurality of page frame table entries (pftes) to back a plurality of frames in an lfarea of main memory. Each of the plurality of frames has one of a first size and a second size, where the second size is larger than the first size. ... International Business Machines

12/15/16 / #20160364336

Sizing a write cache buffer based on emergency data save parameters

Embodiments relate to saving data upon loss of power. An aspect includes sizing a write cache buffer based on parameters related to carrying out this emergency data save procedure. ... International Business Machines

12/15/16 / #20160364332

Dynamic detection and software correction of incorrect lock and atomic update hint bits

A hint bit detection and correction method uses two additional bits as part of every cache directory. These bits represent the lwarx and stwcx instructions (larx disp, stcx disp). ... International Business Machines

12/15/16 / #20160364329

Providing service address space for diagnostics collection

A method and technique are provided for providing a service address space. The method includes providing a service co-processor with a service address space attached to a main processor. ... International Business Machines

12/15/16 / #20160364328

Garbage collection and other management of memory heaps

A memory heap management facility is provided that is able to perform various management tasks, including, but not limited to, garbage collection, compaction, and/or re-ordering of objects within a heap. One or more of these management tasks improve system performance by limiting movement of pages in and out of virtual memory. ... International Business Machines

12/15/16 / #20160364327

Sparsity-driven matrix representation to optimize operational and storage efficiency

Embodiments of the invention relate to sparsity-driven matrix representation. In one embodiment, a sparsity of a matrix is determined and the sparsity is compared to a threshold. ... International Business Machines

12/15/16 / #20160364324

Dynamic test topology visualization

An approach for dynamic test topology visualization is provided. The approach retrieves test data from one or more databases. ... International Business Machines

12/15/16 / #20160364320

Dynamic test topology visualization

An approach for dynamic test topology visualization is provided. The approach retrieves test data from one or more databases. ... International Business Machines

12/15/16 / #20160364319

Enhanced bug resolution

As disclosed herein a method, executed by a computer, includes launching a session corresponding to a test environment, saving a session context to provide a saved session context, and associating the saved session context with a defect record entered in a defect tracking system. The method further includes receiving a request to recreate the test environment using the saved session context and reconnecting to a session corresponding to the saved session context, in response to receiving the request to recreate the test environment. ... International Business Machines

12/15/16 / #20160364318

Enhanced bug resolution

As disclosed herein a method, executed by a computer, includes launching a session corresponding to a test environment, saving a session context to provide a saved session context, and associating the saved session context with a defect record entered in a defect tracking system. The method further includes receiving a request to recreate the test environment using the saved session context and reconnecting to a session corresponding to the saved session context, in response to receiving the request to recreate the test environment. ... International Business Machines

12/15/16 / #20160364316

Dynamic tracing framework for debugging in virtualized environments

Embodiments of the present invention provide a system and method for a dynamic tracing framework for debugging in a virtualized environment. Embodiment of the present invention can include selecting a home node and a set of remote nodes to which apply a set of probes. ... International Business Machines

12/15/16 / #20160364312

Eliminate corrupted portions of cache during runtime

In an approach for taking corrupt portions of cache offline during runtime, a notification of a section of a cache to be taken offline is received, wherein the section includes one or more sets in one or more indexes of the cache. An indication is associated with each set of the one or more sets in a first index of the one or more indexes, wherein the indication marks the respective set as unusable for future operations. ... International Business Machines

12/15/16 / #20160364310

Managing a set of tests based on other test failures

In an approach for managing a set of tests to run on a set of platforms, a processor identifies a set of tests to run on a set of platforms and one or more priorities associated with the set of tests. A processor sends the set of tests and the one or more priorities associated with the set of tests to the set of platforms. ... International Business Machines

12/15/16 / #20160364303

Reestablishing synchronization in a memory system

Embodiments relate to reestablishing synchronization across multiple channels in a memory system. One aspect is a computer implemented method that includes receiving an out-of-synchronization indication associated with at least one of a plurality of channels in the memory system. ... International Business Machines

12/15/16 / #20160364302

Rebuilding damaged areas of a volume table using a volume data set

Provided a computer program product, system, and method for rebuilding damaged areas of a volume table using a volume data set for managing data sets assigned data units in a volume in a storage. A determination is made of damaged areas in a volume table providing information on data sets allocated in the volume. ... International Business Machines

12/15/16 / #20160364301

Backup service with managed file transformation

Data files can be backed up by copying, in response to a backup request, files from a client device to a backup archive and recording the status of the files. Transformed copies of files in the backup archive can be created by automatically applying a transform to the files received from the client device. ... International Business Machines

12/15/16 / #20160364300

Calculating bandwidth requirements for a specified recovery point objective

Determining the bandwidth required for data replication for disaster recovery. Given a specified recovery point objective (rpo), bandwidth requisitioning and usage is determined according to meet the rpo based on observed factors.. ... International Business Machines

12/15/16 / #20160364296

Synchronization policies among nodes

Services associated with first and second nodes are managed. As part of the management, the first node receives a request to modify the services. ... International Business Machines

12/15/16 / #20160364295

Adaptive dispersed storage network (dsn) and system

A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and a processing module operably coupled to the interface and to the memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. When additional unique pillar combinations of at least read threshold number of encoded data slices (edss) supported by edss may be needed, the computing device dispersed error encodes each data segment in accordance to generate additional pluralities of edss and distributedly stores the additional pluralities of edss associated respectively with the data object across the plurality of sus within the dsn to support the additional unique pillar combinations of the at least read threshold number of edss.. ... International Business Machines

12/15/16 / #20160364288

Event logging and error recovery

A method, computer program product, and system to control event logging and error recovery in a system including adapters, ports, and channels are described. The method includes storing a recovery threshold for each event type among a plurality of event types and storing a level-specific logging threshold for each event type, implementing event handlers for each of the channels, the ports, and the adapters of the system, and implementing a threshold manager for the events identified by the event handlers based on the level-specific logging threshold and the recovery threshold for each of the respective event types of each of the events. ... International Business Machines

12/15/16 / #20160364286

Resolving and preventing computer system failures caused by changes to the installed software

A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. ... International Business Machines

12/15/16 / #20160364284

Selective memory dump using usertokens

Embodiments of the present invention provide efficient systems and methods for selectively dumping memory by using usertokens to specify an address range from 64-bit storage to be included or excluded from a memory dump. Embodiments of the present invention can be used to reduce the requirement for programs to manage lists of address ranges which represent pertinent data for applications.. ... International Business Machines

12/15/16 / #20160364279

Generating problem signatures from snapshots of time series data

Software that generates statistical models of events impacting computer systems and uses those models to detect similar events in the future. The software performs the following operations: (i) receiving a snapshot of a first event impacting a computer system, where the snapshot includes a first set of values for a plurality of metrics occurring over a first time period corresponding to the first event; (ii) extracting a first set of feature vectors from the first set of values; (iii) generating a first statistical model representing the first event based, at least in part, on the extracted first set of feature vectors; and (iv) determining that a second event is similar to the first event by comparing the first statistical model to a second set of values for the plurality of metrics occurring over a second time period corresponding to the second event.. ... International Business Machines

12/15/16 / #20160364274

Allocating a global resource in a distributed grid environment

A technique for allocating a global resource in a distributed grid environment includes receiving from slave resource managers use and demand data associated with the global resource by each consumer in a respective region. A master resource manager computes an allocation of the global resource for each consumer and for each region based on the use data and the demand data. ... International Business Machines

12/15/16 / #20160364270

Thread-based cache content saving for task switching

Embodiments relate to thread-based cache content savings for task switching in a computer processor. An aspect includes determining a cache entry in a cache of the computer processor that is owned by the first thread, wherein the determination is made based on a hardware thread identifier (id) of the first thread matching a hardware thread id in the cache entry. ... International Business Machines

12/15/16 / #20160364266

Relationship management of application elements

A method for artifact management is provided. A first artifact in a user interface is detected, wherein the first artifact is in use. ... International Business Machines

12/15/16 / #20160364265

Managed services coordinator

A method is provided for applying tasks. The method can include receiving a plurality of tasks for a plurality of applications, an application of the plurality of applications is hosted by a computing environment utilizing a monitoring agent, and a task is performed for an operation of the application during a first period of time. ... International Business Machines

12/15/16 / #20160364263

Managed services coordinator

A method is provided for applying tasks. The method can include receiving a plurality of tasks for a plurality of applications, an application of the plurality of applications is hosted by a computing environment utilizing a monitoring agent, and a task is performed for an operation of the application during a first period of time. ... International Business Machines

12/15/16 / #20160364257

Import efficiency for whole-instance migration

In one approach, a computer mounts a computing device to a target instance, where the computing device stores one or more virtual disks of a source instance, and wherein the target instance includes one or more local disks. The computer detects a disk layout of the source instance. ... International Business Machines

12/15/16 / #20160364255

Optimizing provisioning through automated virtual machine template generation

Software that dynamically updates virtual machine templates at deterministic intervals in order to reduce patching time, by performing the following operations: (i) identifying a virtual machine (vm) provisioned according to a first vm template; (ii) initiating a patching process that applies a set of patch(es) to the vm, thereby creating a patched vm; (iii) determining that an amount of time taken to complete the patching process is greater than a predetermined threshold; and (iv) responsive to determining that the amount of time taken to complete the patching process is greater than the predetermined threshold, generating a second vm template based, at least in part, on the patched vm.. . ... International Business Machines

12/15/16 / #20160364252

Migrating servers into a secured environment

In one approach, one or more computer processors provision an instance in a cloud computing environment, wherein the instance includes one or more local disks. The one or more computer processors boot the instance from a boot image such that an operating system exists in a main memory of the instance. ... International Business Machines

12/15/16 / #20160364242

Load queue entry reuse for operand store compare history table update

Embodiments relate to load queue entry reuse for operand store compare (osc) history table update. An aspect includes allocating a load queue entry in a load queue to a load instruction that is issued into an instruction pipeline, the load queue entry comprising a valid tag that is set and a keep tag that is unset. ... International Business Machines

12/15/16 / #20160364235

Automatic comment creation for computer files

Embodiments of the present invention include a method, computer program product, and system for inserting text content into a computer file as a comment in a determined comment convention. In an embodiment, a comment convention is determined in a file. ... International Business Machines

12/15/16 / #20160364234

Context-specific view of a hierarchical data structure

Dynamic ontological working sets support the automatic identification of a context-specific working set (or a visualization of a tree in a hierarchical data structure) that displays those tree nodes that are most relevant to an identified context. Pre-defined rules are used to determine a level of relevance to be applied when identifying the context-specific working set. ... International Business Machines

12/15/16 / #20160364233

Automatically complete a specific software task using hidden tags

A method to detect and diagnose where an error occurs in a source code that is associated with a software program or a website is provided. The method may include receiving a log report associated with the software program or the website, whereby by the log report is sent based on a hidden tag associated with the software program or the website. ... International Business Machines

12/15/16 / #20160364218

Joining operator graph elements via whole program optimization

Techniques disclosed herein describe joining processing elements (e.g., of a streams processing environment) using optimization techniques, such as by whole program optimization. An optimization tool evaluates multiple processing elements based on one or more optimization rules. ... International Business Machines

12/15/16 / #20160364217

Joining operator graph elements via whole program optimization

Techniques disclosed herein describe joining processing elements (e.g., of a streams processing environment) using optimization techniques, such as by whole program optimization. An optimization tool evaluates multiple processing elements based on one or more optimization rules. ... International Business Machines

12/15/16 / #20160364214

Context-specific view of a hierarchical data structure

Dynamic ontological working sets support the automatic identification of a context-specific working set (or a visualization of a tree in a hierarchical data structure) that displays those tree nodes that are most relevant to an identified context. Pre-defined rules are used to determine a level of relevance to be applied when identifying the context-specific working set. ... International Business Machines

12/15/16 / #20160364213

Automatic generation of license terms for service application marketplaces

One or more processors receive information regarding a program module that includes a description of a function, license terms, and non-functional properties of the program module. The license terms, the description of function, and the non-functional properties of the program module are identified, based on an analysis of the information. ... International Business Machines

12/15/16 / #20160364210

System, apparatus, and method to facilitate management of agile software development projects

An apparatus to facilitate management of agile software development projects includes a feature profile module, a task profile module, a resource profile module, an implementation tracking module, a resource planning module, and an feature tracking module. The feature profile module stores, for each feature, a status, priority, set of tasks, and work allotted. ... International Business Machines

12/15/16 / #20160364169

Selective memory dump using usertokens

Embodiments of the present invention provide efficient systems and methods for selectively dumping memory by using usertokens to specify a address range from 64-bit storage to be included or excluded from a memory dump. Embodiments of the present invention can be used to reduce the requirement for programs to manage lists of address ranges which represent pertinent data for applications.. ... International Business Machines

12/15/16 / #20160364168

Reserving a storage area and building page frame table entries

In one embodiment, a computer-implemented method includes receiving a large frame area (lfarea) request, including a request for a plurality of page frame table entries (pftes) to back a plurality of frames in an lfarea of main memory. Each of the plurality of frames has one of a first size and a second size, where the second size is larger than the first size. ... International Business Machines

12/15/16 / #20160364166

Temporary spill area for volume defragmentation

A method for volume defragmentation utilizing a temporary spill area is disclosed. The method includes analyzing a volume, and, based on the analysis, determining to temporarily extend the volume. ... International Business Machines

12/15/16 / #20160364165

Reducing new extent failures on target device during non-disruptive logical data set migration

A method, according to one embodiment, includes selecting a source data set for migration; determining a predicted future total space allocation based on characteristics of the source data set; determining whether a target volume is capable of accommodating the predicted future total space allocation; migrating the source data set to the target volume in response to determining that the target volume is capable of accommodating the predicted future total space allocation; and requesting an adjustment to an amount of reserved free space on the target volume based on the predicted future total space allocation.. . ... International Business Machines

12/15/16 / #20160364164

Available frame queue processing

In one embodiment, a computer-implemented method includes building an available frame header queue (afhq). The afhq includes one or more headers, each header including one or more frame references being no more than a maximum count of frame references. ... International Business Machines

12/15/16 / #20160364162

Providing service address space for diagnostics collection

A system and technique are provided for providing a service address space. The system includes a service co-processor provided with a service address space. ... International Business Machines

12/15/16 / #20160364156

Self-adjusting backup operations

Performing automated and self-adjusting backup operations by executing the following steps: determining a time of last backup operation for a data block. Obtaining an audit trail based on the time of last backup operation for the data block and a current time. ... International Business Machines

12/15/16 / #20160364150

Selective memory dump using usertokens

Embodiments of the present invention provide systems and methods for selectively dumping memory by using usertokens to specify an address range from 64-bit storage to be included or excluded from a memory dump. Embodiments of the present invention can be used to reduce the requirement for programs to manage lists of address ranges which represent pertinent data for applications.. ... International Business Machines

12/15/16 / #20160364146

Region-based storage for volume data and metadata

Methods, computing systems and computer program products implement embodiments of the present invention that include receiving a request to create a storage entity on a storage system, the storage entity including data and metadata, the metadata used to manage the storage entity. Upon receiving the request, multiple metadata attributes are identified for the metadata, and for each given identified metadata attribute, a respective metadata region is created on the storage system, and a subset of the metadata having the given metadata attribute is stored to the respective metadata region. ... International Business Machines

12/15/16 / #20160364117

Automation of user interface to facilitate computer-based instruction

One or more processors provide a first instruction to a first user. One or more processors receive a user input in response to the first instruction provided to the first user. ... International Business Machines

12/15/16 / #20160364099

Dynamically transforming a tabular object based on actions within a graphical user interface

According to one embodiment of the present invention, a computer system comprising at least one processor may generate a tabular object containing data about an object. The layout of such tabular object comprises rows and columns, and may have a structure that includes plural sets of dual columns, each set representing pairs of related data (e.g. ... International Business Machines

12/15/16 / #20160364052

Touch interface with person recognition

A system for identifying a tool touching a touchscreen device includes a touch-sensitive surface that generates a signal in response to a touch from a tool touching the surface; a touchscreen controller that receives the signal from the touch-sensitive surface and determines the location of the touch; logic to select, based on the touch location, one of a plurality of electrodes disposed across the touch-sensitive surface; logic to enable an electric circuit that includes a signal generator attached to the tool that transmits a modulated id signal; a parasitic capacitance path between the signal generator and the electrode; a demodulator connected to the electrode that receives and demodulates the modulated id signal to recover a bit sequence; a resistive layer, connected to the demodulator, covering the touch-sensitive surface; a resistive path through the tool to the resistive layer; and logic that identifies the tool, based on the recovered bit sequence.. . ... International Business Machines

12/15/16 / #20160364042

Touch interface with person recognition

Identifying a tool touching a touchscreen device. A touch location of a tool on a touch-sensitive surface is received from a touchscreen controller. ... International Business Machines

12/15/16 / #20160363987

Managing data center power consumption

One or more processors determine an energy consumption need of a computing network. One or more processors lower an energy consumption level of one or more nodes in the computing network based, at least in part, on the energy consumption need. ... International Business Machines

12/15/16 / #20160363984

Identification of idle servers using power consumption

Power consumption data for a server and temperature data from a location containing the server are received. It is determined that variation in the power consumption data exceeds a first threshold level. ... International Business Machines

12/15/16 / #20160363969

Scalable panel cooling system

Method and system are provided for controlling a scalable panel cooling system having multiple cooling panels for cooling heat-generating components housed in a support structure. The method includes: dividing the support structure into areas, each area of the support structure capable of housing a heat-generating component; for each area of the support structure: providing a cooling panel adjacent the area of the support structure; determining whether the area of the support structure is housing an operational heat-generating component; in the case that the area of the support structure is housing an operational heat-generating component, activating the cooling panel adjacent the area of the support structure housing the operational heat-generating component; and in the case that the area of the support structure is not housing a operational heat-generating component, deactivating the cooling panel adjacent the area of the support structure.. ... International Business Machines

12/15/16 / #20160363916

Mechanism for controlling subset of devices

A computer detects a request by a process for access to a shadow control page, wherein the shadow control page allows the process access to one or more devices. The computer assigns the shadow control page and a key to the process associated with the request. ... International Business Machines

12/15/16 / #20160363625

Symbol timing recovery scheme for parallel recording channel systems

A computer program product is provided for performing symbol timing recovery in a parallel recording channel system. The computer program product comprises a computer readable storage medium having program instructions embodied therewith. ... International Business Machines

12/15/16 / #20160363611

Module testing utilizing wafer probe test equipment

A module plate is provided for use with a wafer handler and testing mechanism. The module plate has a diameter equivalent to an integrated circuit wafer and a height equivalent to or less than a height of a module lid associated with each module in a plurality of modules associated with the module plate. ... International Business Machines

12/15/16 / #20160363353

Fuel vaporization using data center waste heat

Systems and methods are provided for data center cooling by vaporizing fuel using data center waste heat. The systems include, for instance, an electricity-generating assembly, a liquid fuel storage, and a heat transfer system. ... International Business Machines

12/15/16 / #20160363352

Fuel vaporization using data center waste heat

Systems and methods are provided for data center cooling by vaporizing fuel using data center waste heat. The systems include, for instance, an electricity-generating assembly, a liquid fuel storage, and a heat transfer system. ... International Business Machines

12/15/16 / #20160363334

Controlling devices based on physiological measurements

Embodiments of the invention control a device based on physiological measurements associated with a user. A determination is made that a user has manually adjusted a controlled device. ... International Business Machines

12/15/16 / #20160363243

Tapering couplers for connecting fluid flow components

Tapering couplers and coupling methods for connecting fluid flow components are provided. In one embodiment, the tapering coupler includes a housing with a first opening and a second opening in fluid communication through the housing. ... International Business Machines

12/15/16 / #20160362520

Flame retardant pht compositions

Hexahydrotriazine (ht) materials and hemiaminal (ha) materials derived from aromatic, aliphatic, and/or polyether diamines may be used as a platform for creating flame retardant materials. Various flame retardant material precursors may be incorporated into the ha and ht materials. ... International Business Machines

12/15/16 / #20160362513

Additives for orientation control of block copolymers

A film layer comprising a high-chi (χ) block copolymer for self-assembly and a surface active polymer (sap) was prepared on a substrate surface that was neutral wetting to the domains of the self-assembled block copolymer. The block copolymer comprises at least one polycarbonate block and at least one other block (e.g., a styrene-based block). ... International Business Machines

12/15/16 / #20160362224

Pallet design for vibration mitigation

A system for mitigating vibration of a mass may include an elastic membrane enclosing at least one interior space and having an outer surface, where at least a bottom portion of the outer surface is coupled to a transportable supportive surface, and at least a top portion of the outer surface supports a load. The system may further include at least one port coupling the outer surface to the at least one interior space, where the port provides a source of fluid ingress into the interior space and fluid egress out of the interior space. ... International Business Machines

12/15/16 / #20160362112

Vehicle control system

A vehicle can be controlled based on feedback from a driver of the vehicle when a mobile device is connected to a computer system. A profile for a driver can be used. ... International Business Machines

12/15/16 / #20160362000

Vehicle control system

A vehicle can be controlled based on feedback from a driver of the vehicle when a mobile device is connected to a computer system. A profile for a driver can be used. ... International Business Machines

12/08/16 / #20160360650

Air-moving assemblies with flywheels

Apparatuses and methods are provided for facilitating air-cooling of, for instance, one or more electronics racks within a data center. The apparatus includes an air-moving assembly and one or more flywheels. ... International Business Machines

12/08/16 / #20160360645

Heat sink attachment on existing heat sinks

Structures and methods for providing heat sink attachments on existing heat sinks. According to a device, a first heat sink comprises a first base and fins extending from the first base. ... International Business Machines

12/08/16 / #20160360638

Safety apparatus for electrical equipment rack

A safety apparatus for an electrical equipment rack includes a retractable safety device for preventing, when in an operational position, the extending of an extendable rail and an electrical equipment unit mounted thereon from a position internal to the rack to a position external to the rack, and for allowing the same when in a non-operational position. The position of the retractable safety device is linked to the position of a retractable rack support such that when the retractable rack support is lowered in its operative position the retractable safety device is in a non-operational position, and when it is raised in a raised inoperative position the retractable safety device is in an operational position preventing the extending of the extendable rail and an electrical equipment unit mounted thereon to a position external to the rack.. ... International Business Machines

12/08/16 / #20160360608

Protection of device from electrostatic discharge (esd) damage

A first dissipative adhesive (da) is connected to at least a portion of leads that are exposed in a first plane of a flexible cable in a coverage area. A second da is connected over at least a portion of the first da. ... International Business Machines

12/08/16 / #20160360506

Multichannel preferred device notification

Embodiments relate to multichannel preferred device notification. A system includes a memory having computer readable instructions and a processor for executing the computer readable instructions. ... International Business Machines

12/08/16 / #20160360418

Unauthorized beacon detection

A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons, receiving beacon identifiers from a plurality of beacons with a beacon receiving device, determining a movement path of the beacon receiving device relative to the positional pattern, and determining whether the movement path has an anomaly. A corresponding computer program product and computer system are also disclosed herein.. ... International Business Machines

12/08/16 / #20160360376

Predicting lost devices using normal usage patterns

A method for predicting lost mobile devices. The method includes, identifying, by one or more processors, one or more pre-designated locations, where each of the one or more pre-designated locations contains devices and a main device to be tracked. ... International Business Machines

12/08/16 / #20160360363

Mobile device proximity notification

Aspects of the present invention disclose a method, computer program product, and system for mobile computing device proximity notification. The method includes one or more processors acquiring location information for a plurality of mobile computing devices. ... International Business Machines

12/08/16 / #20160360298

Generating customized on-demand videos from automated test scripts

Generating customized on-demand videos from automated test scripts is provided. Responsive to receiving a request for an instruction on performing a task on a computer, a database of automated test scripts may be searched to identify a set of test scripts that comprise a set of executable actions associated with the task. ... International Business Machines

12/08/16 / #20160360252

Filtering

An alert generation method and system. The method includes receiving by a computer processor, alert data indicating filters for specified alert types associated with possible future events. ... International Business Machines

12/08/16 / #20160360156

Identifying spatial locations of events within video image data

An invention for identifying a spatial location of an event within video image data is provided. Disclosed are embodiments for detecting an object and obtaining trajectory data of a trajectory of the object within the video image data from a sensor device; converting the trajectory data into a contour-coded compressed image; generating, based on the trajectory data, a searchable code that contains a set of locations traversed by the trajectory of the object within the video image; associating the searchable code with the contour-coded compressed image in a database; and returning, in response to a query having a selected location that corresponds a location of the set of locations in the searchable code, an image of the trajectory data corresponding to the object based on the contour-coded compressed image in the database.. ... International Business Machines

12/08/16 / #20160360009

Method for providing software as a service

A method for use in a computer of generating a cost associated with performing a request for a service using computer software, the method comprising: generating metadata associated with the cost of a plurality of portions of the computer software, the metadata including an identifier associated with each of the plurality of portions of the computer software; embedding at least the identifier into each respective portion of the plurality of portions of the computer software; utilizing the embedded identifier to determine which of the plurality of portions of the computer software are used to perform the request; assigning, using the metadata, a cost to each of the one or more portions of the computer software determined to be used to perform the request; and calculating a total cost associated with usage of the computer software to perform the request.. . ... International Business Machines

12/08/16 / #20160360006

Management of connections within a messaging environment based on the statistical analysis of server responsiveness

In one embodiment, a method for managing execution of software operations is provided. The method includes a computer processor determining that a software program executing on a computing device utilizes a server to execute at least one software operation. ... International Business Machines

12/08/16 / #20160360003

Processing incoming messages

A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. ... International Business Machines

12/08/16 / #20160359994

Locale-aware customization of public content

For customizing content according to a dynamically changing audience, a mobile device associated with a member of the audience is detected to be present within a defined area. A locale preference corresponding to the member is collected from the mobile device. ... International Business Machines

12/08/16 / #20160359984

Web services documentation

A method for distributing documentation for an application service includes receiving, at an endpoint configured to provide an application service, a documentation request from a requester, preparing a response that includes documentation corresponding to the application service, and transmitting the response to the requester. The method may also include receiving, at the endpoint, a service request for the application service and responding to the service request. ... International Business Machines

12/08/16 / #20160359974

Secure sharing of storage area networks in a cloud

Techniques disclosed herein describe performing client-requested disk management operations to storage disk units of a storage area network (san). A proxy service receives a request from a client of a san provider to perform a disk management operation on one or more storage disk units of the san provider. ... International Business Machines

12/08/16 / #20160359968

Storage mirroring over wide area network circuits with dynamic on-demand capacity

An approach is provided for managing an allocation of a bandwidth of a dedicated channel in a network being utilized by an application performing a replication of data from a first to a second storage resource. Checks of parameters specified by the application are determined. ... International Business Machines

12/08/16 / #20160359967

Efficient maintenance of a distributed system membership view

A method, system and computer program product are disclosed for maintaining a membership view of a distributed computing system comprising a multitude of members, wherein each of said members sends out a message indicating that said each of the members is available in the system. In one embodiment, the method comprises maintaining a first list of at least some of the members in the distributed system; and over a period of time, when one of the members sends out the message indicating that said one of the members is available in the distributed system, adding said one of the members to a second list. ... International Business Machines

12/08/16 / #20160359959

System, method and computer program product for virtual machine allocation

According to one aspect of the present disclosure, a method and technique for virtual machine allocation is disclosed. The method includes: responsive to receiving a request to allocate a virtual machine, determining a geophysical location of a host for the virtual machine; determining a geophysical policy for the virtual machine; determining whether the geophysical policy for the virtual machine corresponds to the geophysical location of the host for the virtual machine; and responsive to determining that the geophysical policy for the virtual machine corresponds to the geophysical location of the host, allocating the virtual machine.. ... International Business Machines

12/08/16 / #20160359954

Web services documentation

A method for distributing documentation for an application service includes receiving, at an endpoint configured to provide an application service, a documentation request from a requester, preparing a response that includes documentation corresponding to the application service, and transmitting the response to the requester. The method may also include receiving, at the endpoint, a service request for the application service and responding to the service request. ... International Business Machines

12/08/16 / #20160359952

Collaborative based caching

A computer system for collaborative caching of files during a collaboration session includes program instructions for receiving a request from a first electronic device for a first file. The program instructions determine whether the first file is stored in one or more caches, wherein the one or more caches are associated with one or more electronic devices. ... International Business Machines

12/08/16 / #20160359946

Techniques for promoting and viewing social content written by nearby people

Techniques are disclosed for promoting and sharing social content for view in a network. An index engine of a network device queries a client device requesting a data connection to the network device for sharable social media content. ... International Business Machines

12/08/16 / #20160359920

Enforcing runtime policies in a networked computing environment

Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. ... International Business Machines

12/08/16 / #20160359918

Policy-based slice deletion in a dispersed storage network

A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices to consider for deletion; determine an access policy corresponding to the one or more slices; determine a current timestamp; and determine when there is no future slice availability for the one or more slices, based on the current timestamp and the access policy. When there is no future slice availability for the one or more slices, the dispersed storage network determines when reconsideration is available and sends a reconsideration message to a reconsideration entity when the reconsideration is determined to be available. ... International Business Machines

12/08/16 / #20160359896

Application testing for security vulnerabilities

In an approach for testing an application for a security vulnerability, a processor inserts an instrumentation hook in the application to be tested, wherein the instrumentation hook is executed prior to a sink operation. A processor transmits a probe input value to the application to be tested. ... International Business Machines

12/08/16 / #20160359894

Ingesting documents using multiple ingestion pipelines

A primary ingestion pipeline configured for use in natural language processing includes annotators configured for annotating documents. The annotators and documents to be annotated are evaluated. ... International Business Machines

12/08/16 / #20160359892

Validating e-mails using message posting services

Validation of e-mails is provided. An e-mail is received. ... International Business Machines

12/08/16 / #20160359885

Unauthorized beacon detection

A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons, receiving beacon identifiers from a plurality of beacons with a beacon receiving device, determining a movement path of the beacon receiving device relative to the positional pattern, and determining whether the movement path has an anomaly. A corresponding computer program product and computer system are also disclosed herein.. ... International Business Machines

12/08/16 / #20160359865

Utilization of multiple keypads for password inputs

A computer program product includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first portion includes a first value and a second value. The program instructions receive the first portion, wherein the first portion includes a first number of keys selected equal to the first value and the second value present in the first number of keys selected. ... International Business Machines

12/08/16 / #20160359847

Controlling a discovery component, within a virtual environment, that sends authenticated data to a discovery engine outside the virtual environment

A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset information about one or more application bundles applied to the virtual image. The discovery bundle component sends, to a discovery product service, the asset information wrapped with a trusted signed certificate for the discovery product service, wherein the discovery product service is located outside the virtual environment.. ... International Business Machines

12/08/16 / #20160359813

Electronic personal assistant privacy

A method comprises receiving a first user communication, accessing a directory entry associated with the user, accessing, by a processor, a database stored in a memory that includes content designated as private that is associated with the user in the directory, determining with the processor whether the first user communication includes content designated as private that is associated with the user, generating a second user communication by removing the content designated as private that is associated with the user from the first user communication, and sending the second user communication to an electronic personal assistant.. . ... International Business Machines

12/08/16 / #20160359789

Validating e-mails using message posting services

Validation of e-mails is provided. An e-mail is received. ... International Business Machines

12/08/16 / #20160359781

Selectively unmuting electronic messaging conversations

A first user muting a conversation, taking place among a plurality of users using an exchange of electronic messages, can be detected. Responsive to the first user muting the conversation, an electronic message inbox of the first user can be configured to prevent further electronic messages pertaining to the conversation from being visible in the electronic message inbox. ... International Business Machines

12/08/16 / #20160359764

Software defined infrastructures that encapsulate physical server resources into logical resource pools

A software defined infrastructure (sdi) makes available a subset of a computer server's resources to a cloud solution or workload. Multiple subsets of resources can be combined in a sdi to provide a logical resource pool. ... International Business Machines

12/08/16 / #20160359763

Allocating instantiated resources to an it-service

Allocating an instance of a resource to an it-service includes analyzing a service model specifying the structure of an it-service and including nodes and resource management rules specifying the management of the node's resource. For each node, a resource type indicated by the node is determined. ... International Business Machines

12/08/16 / #20160359733

Message path selection within a network

Embodiments relate to path selection for packet transfer in a network. An aspect includes a method of selecting a path among a plurality of paths in a network for transfer of a packet from a first system to a second system in the network. ... International Business Machines

12/08/16 / #20160359729

Multi-destination packet handling at overlay virtual network tunneling endpoints

In one embodiment, a method provides for hosting, by a first virtual switch of an overlay virtual network, a multi-destination receiver for a multi-destination group. The first virtual switch receives, from a second virtual switch hosting a multi-destination sender for the multi-destination group, a single copy of a multi-destination packet, wherein the first virtual switch is represented by a node of a plurality of nodes in a tree created by a network controller, and wherein each of the nodes represents a virtual switch that has registered a multi-destination receiver with the network controller. ... International Business Machines

12/08/16 / #20160359727

Quantifying and designing optimal connecting networks

A method for optimizing network design includes identifying a set of terminal-to-terminal shortest paths in a network, wherein a terminal-to-terminal shortest path is a best connection between two terminals, evaluating a terminal betweenness for each non-terminal vertex in the network, wherein the terminal betweenness of a vertex is a fraction of the total number of terminal-to-terminal shortest paths that include said vertex, calculating an average terminal betweenness for each terminal-to-terminal shortest path based on the terminal betweenness of the vertices in the path, iteratively adding the terminal-to-terminal shortest paths to an output graph in order of decreasing average terminal betweenness until all terminals are represented on the output graph, and using the output graph to design or adjust a network. The method may also include displaying the output graph to a user. ... International Business Machines

12/08/16 / #20160359726

Quantifying and designing optimal connecting networks

A method for optimizing network design includes identifying a set of terminal-to-terminal shortest paths in a network, wherein a terminal-to-terminal shortest path is a best connection between two terminals, evaluating a terminal betweenness for each non-terminal vertex in the network, wherein the terminal betweenness of a vertex is a fraction of the total number of terminal-to-terminal shortest paths that include said vertex, calculating an average terminal betweenness for each terminal-to-terminal shortest path based on the terminal betweenness of the vertices in the path, iteratively adding the terminal-to-terminal shortest paths to an output graph in order of decreasing average terminal betweenness until all terminals are represented on the output graph, and using the output graph to design or adjust a network. The method may also include displaying the output graph to a user. ... International Business Machines

12/08/16 / #20160359724

Propagating a query in a network

A query is propagated from a querying node to a destination node in a network of connected nodes, where at least one node is designated as a delay node. A query is transmitted from the querying node to one or more connected nodes in the network of connected nodes. ... International Business Machines

12/08/16 / #20160359715

Notifying original state listeners of events in a domain model

Notifying original state listeners within a domain model. Identifying listener registration information pertaining to a listener. ... International Business Machines

12/08/16 / #20160359714

Notifying original state listeners of events in a domain model

Notifying original state listeners within a domain model. Identifying listener registration information pertaining to a listener. ... International Business Machines

12/08/16 / #20160359692

Deployment of enterprise applications

A method, executed by a computer, for deploying an enterprise application includes configuring a plurality of application nodes for a software defined network using static ip addresses, capturing a plurality of images corresponding to the plurality of application nodes, preparing an application pattern that incorporates the plurality of images, and saving the application pattern for subsequent deployment. In one embodiment, the application is deployed onto a computing environment using the application pattern. ... International Business Machines

12/08/16 / #20160359503

Multi-bit error correction method and apparatus based on a bch code and memory system

Exemplary embodiments for providing multi-bit error correction based on a bch code are provided. In one such embodiment, the following operations are repeatedly performed, including shifting each bit of the bch code rightward by 1 bit while filling the bit vacated due to the rightward shifting in the bch code with 0, calculating syndrome values corresponding to the shifting of the bch code, and determining a first error number in the bch code under the shifting based on the syndrome values corresponding to the shifting of the bch code. ... International Business Machines

12/08/16 / #20160359246

Pin attach converter

A pin attach converter for coupling an electrical contact to a printed circuit board may include a compliant region having a first length adapted to traverse an aperture in a printed circuit board and provide mechanical and electrical registry with at least one wall of the aperture. The pin attach converter may also include an adapter region coupled to the compliant region, and having a cavity with a second length and adapted to receive the electrical contact, where the second length extends along a same longitudinal axis as the first length, and the cavity is adapted to provide mechanical and electrical registry with the electrical contact.. ... International Business Machines

12/08/16 / #20160359099

Low voltage transistor and logic devices with multiple, stacked piezoelectronic layers

A piezoelectronic transistor device includes a first piezoelectric (pe) layer, a second pe layer, and a piezoresistive (pr) layer arranged in a stacked configuration, wherein an electrical resistance of the pr layer is dependent upon an applied voltage across the first and second pe layers by an applied pressure to the pr layer by the first and second pe layers. A piezoelectronic logic device includes a first and second piezoelectric transistor (pet), wherein the first and second pe layers of the first pet have a smaller cross sectional area than those of the second pet, such that a voltage drop across the pe layers of the first pet creates a first pressure in the pr layer of the first pet that is smaller than a second pressure in the pr layer of the second pet created by the same voltage drop across the pe layers of the second pet.. ... International Business Machines

12/08/16 / #20160359076

Controllable indium doping for high efficiency czts thin-film solar cells

A photovoltaic device includes a first contact layer formed on a substrate. An absorber layer includes cu—zn—sn—s(se) (cztsse) on the first contact layer. ... International Business Machines

12/08/16 / #20160359073

Mis-il silicon solar cell with passivation layer to induce surface inversion

The present invention relates generally to a photovoltaic solar cell device and more particularly, to a structure and method of inducing charge inversion in a silicon substrate by using a highly charged passivation layer on an upper side of the silicon substrate. A positively charged passivation layer comprising hafnium oxide may be formed on an insulating layer covering an upper surface of a p-doped silicon substrate and on a metal contact to induce a strong inversion layer in an upper portion of the p-doped silicon substrate.. ... International Business Machines

12/08/16 / #20160359072

Hybrid cztsse photovoltaic device

A photovoltaic device includes a first contact and a hybrid absorber layer. The hybrid absorber layer includes a chalcogenide layer and a semiconductor layer in contact with the chalcogenide layer. ... International Business Machines

12/08/16 / #20160359070

Controllable indium doping for high efficiency czts thin-film solar cells

A photovoltaic device includes a first contact layer formed on a substrate. An absorber layer includes cu—zn—sn—s(se) (cztsse) on the first contact layer. ... International Business Machines

12/08/16 / #20160359068

Monolithic integration of heterojunction solar cells

A method for fabricating a device with integrated photovoltaic cells includes supporting a semiconductor substrate on a first handle substrate and doping the semiconductor substrate to form doped alternating regions with opposite conductivity. A doped layer is formed over a first side the semiconductor substrate. ... International Business Machines

12/08/16 / #20160359067

Energy harvesting device with prefabricated thin film energy absorption sheets and roll-to-sheet and roll-to-roll fabrication thereof

An energy harvesting device includes prefabricated thin film energy absorption sheets that are each tuned to absorb electromagnetic energy of a corresponding wavelength. The energy harvesting device can include a prefabricated thin film converter sheet to convert the electromagnetic energy into electrical power. ... International Business Machines

12/08/16 / #20160359066

Energy harvesting device with prefabricated thin film energy absorption sheets and roll-to-sheet and roll-to-roll fabrication thereof

An energy harvesting device includes prefabricated thin film energy absorption sheets that are each tuned to absorb electromagnetic energy of a corresponding wavelength. The energy harvesting device can include a prefabricated thin film converter sheet to convert the electromagnetic energy into electrical power. ... International Business Machines

12/08/16 / #20160359046

Heterogeneous source drain region and extension region

A semiconductor structure includes a source drain region of a first material and an extension region of a second material. A semiconductor device fabrication process includes forming a sacrificial dielectric portion upon a semiconductor substrate, forming a sacrificial gate stack upon the sacrificial dielectric portion, forming a gate spacer upon the sacrificial dielectric portion against the sacrificial gate, forming a source drain region of a first doped material upon the semiconductor substrate against the gate spacer, forming a replacement gate trench by removing the sacrificial gate stack, forming an extension trench by removing the sacrificial dielectric portion, and forming an extension region of a second doped material within the extension trench.. ... International Business Machines

12/08/16 / #20160359045

Semiconductor device including strained finfet

A semiconductor device includes at least one semiconductor fin on an upper surface of a base substrate. The at least one semiconductor fin includes a strained active semiconductor portion interposed between a protective cap layer and the base substrate. ... International Business Machines

12/08/16 / #20160359044

Formation of dislocation-free sige finfet using porous silicon

A semiconductor device that includes a fin structure having a porous core, and a relaxed semiconductor layer present on the porous core. The semiconductor device may further include a strained semiconductor layer that is substantially free of defects that is present on the strained semiconductor layer. ... International Business Machines

12/08/16 / #20160359037

Germanium dual-fin field effect transistor

In one example, a field effect transistor includes a pair of fins positioned in a spaced apart relation. Each of the fins includes germanium. ... International Business Machines

12/08/16 / #20160359036

Reduced resistance short-channel ingaas planar mosfet

A metal-oxide-semiconductor field effect transistor (mosfet) and a method of fabricating a mosfet are described. The method includes depositing and patterning a dummy gate stack above an active channel layer formed on a base. ... International Business Machines

12/08/16 / #20160359023

Silicon germanium-on-insulator formation by thermal mixing

A layer of amorphous silicon is formed on a germanium-on-insulator substrate, or a layer of germanium is formed on a silicon-on-insulator substrate. An anneal is then performed which causes thermal mixing of silicon and germanium atoms within one of the aforementioned structures and subsequent formation of a silicon germanium-on-insulator material.. ... International Business Machines

12/08/16 / #20160359022

Germanium dual-fin field effect transistor

In one example, a field effect transistor includes a pair of fins positioned in a spaced apart relation. Each of the fins includes germanium. ... International Business Machines

12/08/16 / #20160359019

Semiconductor device including strained finfet

A semiconductor device includes at least one semiconductor fin on an upper surface of a base substrate. The at least one semiconductor fin includes a strained active semiconductor portion interposed between a protective cap layer and the base substrate. ... International Business Machines

12/08/16 / #20160359013

Lateral bipolar transistor

A bipolar junction transistor comprises a semiconductor layer disposed on an insulating material, at least a portion of the semiconductor layer forming a base region. The bipolar junction transistor further comprises a transistor emitter laterally disposed on a first side of the base region, where in the transistor emitter is a first doping type and has a first width, and wherein the first width is a lithographic feature size. ... International Business Machines

12/08/16 / #20160359011

Techniques for multiple gate workfunctions for a nanowire cmos technology

In one aspect, a method of forming a cmos device with multiple transistors having different vt's is provided which includes: forming nanowires and pads on a wafer, wherein the nanowires are suspended at varying heights above an oxide layer of the wafer; and forming gate stacks of the transistors at least partially surrounding portions of each of the nanowires by: i) depositing a conformal gate dielectric around the nanowires and on the wafer beneath the nanowires; ii) depositing a conformal workfunction metal on the conformal gate dielectric around the nanowires and on the wafer beneath the nanowires, wherein an amount of the conformal workfunction metal deposited around the nanowires is varied based on the varying heights at which the nanowires are suspended over the oxide layer; and iii) depositing a conformal poly-silicon layer on the conformal workfunction metal around the nanowires and on the wafer beneath the nanowires.. . ... International Business Machines

12/08/16 / #20160359003

Strain release in pfet regions

A method for fabricating a semiconductor device, includes providing a strained silicon on insulator (ssoi) structure, the ssoi structure comprises, a dielectric layer disposed on a substrate, a silicon germanium layer disposed on the dielectric layer, and a strained semiconductor material layer disposed directly on the silicon germanium layer, forming a plurality of fins on the ssoi structure, forming a gate structure over a portion of at least one fin in a nfet region, forming a gate structure over a portion of at least one fin in a pfet region, removing the gate structure over the portion of the at least one fin in the pfet region, removing the silicon germanium layer exposed by the removing, and forming a new gate structure over the portion of the at least one fin in the pfet region, such that the new gate structure surrounds the portion on all four sides.. . ... International Business Machines

12/08/16 / #20160358954

Deep trench sidewall etch stop

Embodiments of the present invention provide a structure and method for fabrication of deep trenches in semiconductor-on-insulator structures. An upper portion of the deep trench cavity is formed to expose a sidewall of the buried insulator layer. ... International Business Machines

12/08/16 / #20160358916

Self-aligned source/drain contacts

A semiconductor substrate includes lower source/drain (s/d) regions. A replacement metal gate (rmg) structure is arranged upon the semiconductor substrate between the lower s/d regions. ... International Business Machines

12/08/16 / #20160358905

Compound semiconductor devices having buried resistors formed in buffer layer

Structures and methods are provided for fabricating a semiconductor device (e.g., iii-v compound semiconductor device) having buried resistors formed within a buffer layer of the semiconductor device. For instance, a semiconductor device includes a buffer layer disposed on a substrate, a channel layer disposed on the buffer layer, and a buried resistor disposed within the buffer layer. ... International Business Machines

12/08/16 / #20160358861

Registration mark formation during sidewall image transfer process

Methods of forming a registration mark such as an alignment mark or overlay mark during formation of sub-lithographic structures are provided. Methods may include forming a plurality of mandrels over a hard mask over a semiconductor layer, each mandrel including a spacer adjacent thereto. ... International Business Machines

12/08/16 / #20160358859

Reducing contact resistance in vias for copper interconnects

A method of forming an electrical transmission structure that includes forming an opening through an interlevel dielectric layer to expose at least one electrically conductive feature and forming a shield layer on the opening. A gouge is formed in the electrically conductive feature through the opening using a subtractive method during which the shield layer protects the interlevel dielectric layer from being damaged by the subtractive method. ... International Business Machines

12/08/16 / #20160358836

Chip module with stiffening frame and orthogonal heat spreader

An integrated circuit (ic) chip module includes a carrier, a stiffening frame, an ic chip, and a first directional heat spreader. A second directional heat spreader may further be arranged orthogonal to the first directional heat spreader. ... International Business Machines

12/08/16 / #20160358824

Minimizing shorting between finfet epitaxial regions

The present invention relates generally to semiconductors, and more particularly, to a structure and method of minimizing shorting between epitaxial regions in small pitch fin field effect transistors (finfets). In an embodiment, a dielectric region may be formed in a middle portion of a gate structure. ... International Business Machines

12/08/16 / #20160358823

Germanium dual-fin field effect transistor

In one example, a field effect transistor includes a pair of fins positioned in a spaced apart relation. Each of the fins includes germanium. ... International Business Machines

12/08/16 / #20160358821

Thru-silicon-via structures

Stress generation free thru-silicon-via structures with improved performance and reliability and methods of manufacture are provided. The method includes forming a first conductive diffusion barrier liner on an insulator layer within a thru-silicon-via of a wafer material. ... International Business Machines

12/08/16 / #20160358812

Reducing contact resistance in vias for copper interconnects

A method of forming an electrical transmission structure that includes forming an opening through an interlevel dielectric layer to expose at least one electrically conductive feature and forming a shield layer on the opening. A gouge is formed in the electrically conductive feature through the opening using a subtractive method during which the shield layer protects the interlevel dielectric layer from being damaged by the subtractive method. ... International Business Machines

12/08/16 / #20160358776

2-dimensional patterning employing tone inverted graphoepitaxy

After formation of a template layer over a neutral polymer layer, a self-assembling block copolymer material is applied and self-assembled. The template layer includes a first linear portion, a second linear portion that is shorter than the first linear portion, and blocking template structures having a greater width than the second linear portion. ... International Business Machines

12/08/16 / #20160358775

Sige finfet with improved junction doping control

A semiconductor device and a method for fabricating the device. The method includes: providing a finfet having a source/drain region, at least one sige fin, a silicon substrate, a local oxide layer is formed on the silicon substrate, a gate structure is formed on the at least one sige fin and the local oxide layer, the gate structure is encapsulated by a gate hard mask and sidewall spacer layers; recessing the at least one sige fin in the source/drain region to the sidewall spacer layers and the silicon substrate layer; recessing the local oxide layer in the source/drain region to the sidewall spacer layer and the silicon substrate; growing a n-doped silicon layer on the silicon substrate; growing a p-doped silicon layer or p-doped sige layer on the n-doped silicon layer; and forming a silicide layer on the p-doped silicon layer or p-doped sige layer.. ... International Business Machines

12/08/16 / #20160358774

Silicon germanium-on-insulator formation by thermal mixing

A layer of amorphous silicon is formed on a germanium-on-insulator substrate, or a layer of germanium is formed on a silicon-on-insulator substrate. An anneal is then performed which causes thermal mixing of silicon and germanium atoms within one of the aforementioned structures and subsequent formation of a silicon germanium-on-insulator material.. ... International Business Machines

12/08/16 / #20160358635

Determination of a common mode voltage

The invention relates to a receiving unit for performing a calibration of a reference voltage, comprising a reference voltage unit for generating and applying a reference voltage on the evaluation unit depending on a converter value, an evaluation unit for receiving a single-ended data signal and being configured to determine an evaluation signal based on the data signal and the reference voltage, and a logic unit configured to perform a calibration process for calibrating the reference voltage. The logic unit is configured to command a memory device to apply a permanent digital logical state on a data line, to iteratively adapt a converter voltage to substantially match the voltage level of the logical state on the data line, and to determine the reference voltage depending on the converter voltage for which the voltage level of the logical state on the data line has been substantially matched.. ... International Business Machines

12/08/16 / #20160358609

Rapid speech recognition adaptation using acoustic input

A method includes the following steps. An acoustic input is obtained from a user, including issuing a verbal prompt to the user and receiving the acoustic input from the user in response to the verbal prompt. ... International Business Machines

12/08/16 / #20160358601

Rapid speech recognition adaptation using acoustic input

A method includes the following steps. An acoustic input is obtained from a user, including issuing a verbal prompt to the user and receiving the acoustic input from the user in response to the verbal prompt. ... International Business Machines

12/08/16 / #20160358489

Dynamic learning supplementation with intelligent delivery of appropriate content

Method to perform an operation comprising identifying, in a corpus comprising a plurality of items of content, a subset of the plurality of items of content having a concept matching a concept in a learning environment, wherein each item of content comprises a set of attributes, computing an assistance score for each item of content in the subset based on the set of attributes of the respective item of content in the subset and a set of attributes of a user in the learning environment, and upon determining that a first item of content, of the subset of items of content, has as an assistance score greater than the assistance scores of the other items in the subset, returning the first item of content to the user as a learning supplement for the concept in the learning environment.. . ... International Business Machines

12/08/16 / #20160358488

Dynamic learning supplementation with intelligent delivery of appropriate content

Systems, methods, and computer program products to perform an operation comprising identifying, in a corpus comprising a plurality of items of content, a subset of the plurality of items of content having a concept matching a concept in a learning environment, wherein each item of content comprises a set of attributes, computing an assistance score for each item of content in the subset based on the set of attributes of the respective item of content in the subset and a set of attributes of a user in the learning environment, and upon determining that a first item of content, of the subset of items of content, has as an assistance score greater than the assistance scores of the other items in the subset, returning the first item of content to the user as a learning supplement for the concept in the learning environment.. . ... International Business Machines

12/08/16 / #20160358443

Managing a smart appliance with a mobile device

A method, system or computer usable program product for a smart appliance to interact with a user through a mobile device including detecting whether a mobile device associated with a first user is outside a user configurable proximity range of a smart appliance; detecting a status of the smart appliance via a set of sensors; and responsive to detecting that the mobile device is outside the user configurable proximity range, sending a user configurable message to the mobile device associated with the first user including the status of the smart appliance.. . ... International Business Machines

12/08/16 / #20160358355

System and method for perspective preserving stitching and summarizing views

A method and a system of stitching a plurality of views of a scene, the method including extracting points of interest in each view to include a point set from each of the plurality of image views of the scene, matching the points of interest and reducing an outlier, grouping the matched points of interest in a plurality of groups, determining a similarity transformation with a smallest rotation angle for each grouping of the match points, generating virtual matching points on a non-overlapping area of the plurality of image views, generating virtual matching points on an overlapping area for each of the plurality of image views, and calculating piecewise projective transformations for the plurality of image views.. . ... International Business Machines

12/08/16 / #20160358353

Force-directed graphs

Embodiments of the present invention provide systems and methods for graphing networks. In one embodiment, a dampening heuristic is utilized to graph networks to increase their stability. ... International Business Machines

12/08/16 / #20160358350

Force-directed graphs

Embodiments of the present invention provide systems and methods for graphing networks. In one embodiment, a dampening heuristic is utilized to graph networks to increase their stability. ... International Business Machines

12/08/16 / #20160358275

Evaluation of document difficulty

A system and computer implemented method for estimating difficulty of a document includes retrieving a subject document from a storage, setting difficulty of each keyword included in the subject document to locality of the keyword in the subject document as an initial value, estimating, by a processor, difficulty of each subject document by a statistical processing of the difficulties of keywords included in the subject document, and updating the difficulty of each keyword based on the difficulty of each subject document depending on a significance value of the keyword in the subject document.. . ... International Business Machines

12/08/16 / #20160358169

Cryptographic methods implementing proofs of work in systems of interconnected nodes

The present invention is notably directed to methods, systems and computer program products for securing data operations in a computerized system comprising interconnected nodes, wherein the nodes are configured to transmit, receive and store data, and wherein the method comprises executing computerized cryptographic methods to implement two or more proofs of work that comprises: provably crawling, from each node of at least a subset of the interconnected nodes, a respective subset of data stored on nodes of the system; and provably acquiring, at each node of the subset, data in the subset of data.. . ... International Business Machines

12/08/16 / #20160358126

Altering a functional characteristic of a computer used by an invitee to a meeting

A method, system, and/or computer program product alters a functional characteristic of a computer used by an invitee to a new meeting. A request to create a new meeting invitation for a new meeting to an invitee is received. ... International Business Machines

12/08/16 / #20160358125

Displaying calendar information in a horizontal bar

A method, system and computer program product for improving the usability of a calendar application. A calendar client agent receives calendar information, such as meetings, appointments, vacations, tasks, etc. ... International Business Machines

12/08/16 / #20160358117

System and method to identify, gather, and detect reusable digital assets

A method, system, and apparatus are provided for automating digital resource management by using monitored user interactions with digital resources to compute a user interaction metric for each digital resource upon detecting a role change for a first user having a user interaction history with the digital resources, where each user interaction metric indicates how important the first user is to the corresponding digital resource and is used to select and map a first digital resource to a second user to provide an ownership transition recommendation for the first digital resource in response to the role change for the first user.. . ... International Business Machines

12/08/16 / #20160358113

Attribute-based nomenclature in supply chains

A method, computer program product and computer system are provided to determine an identifier for a product. A processor compares a plurality of attributes of the product to a hierarchical map of attributes. ... International Business Machines

12/08/16 / #20160358111

Computer-implemented method, computer program product and system for analyzing a control-flow in a business process model

A new technique to analyze the control-flow, i.e., the workflow graph of a business process model, which is called symbolic execution, is provided. Acyclic workflow graphs that may contain inclusive or-gateways are considered; a symbolic execution for them is defined, which runs in quadratic time. ... International Business Machines

12/08/16 / #20160358110

Attribute-based nomenclature in supply chains

A method, computer program product, and computer system to determine an identifier for a product. A processor compares a plurality of attributes of the product to a hierarchical map of attributes. ... International Business Machines

12/08/16 / #20160358098

Versioning of trained models used to deliver cognitive services

A method, system, and/or computer program product manages the lifecycle of trained models used to deliver cognitive services. One or more processors obtain and deploy a cognitive engine that utilizes artificial intelligence (ai), machine learning, and/or similar algorithms. ... International Business Machines

12/08/16 / #20160358097

Quantitative discovery of name changes

Embodiments of the present invention provide a method for detecting a temporal change of name associated with performance data. The method comprises receiving at least one candidate name replacement pair comprising a pair of names. ... International Business Machines

12/08/16 / #20160358095

Horizontal decision tree learning from very high rate data streams

A mechanism is provided in a data processing system for distributed tree learning. A source processing instance distributes data record instances to a plurality of model update processing items. ... International Business Machines

12/08/16 / #20160358094

Utilizing word embeddings for term matching in question answering systems

Software that compares vector representations of question terms and passage terms in question answering systems by performing the following steps: (i) receiving a question; (ii) generating a plurality of vectors including a first vector representation of a term in the question and a second vector representation of a term in a set of natural language text; (iii) generating a similarity score representing an amount of similarity between the first vector representation and the second vector representation; and (iv) determining whether the set of natural language text is relevant to the question based, at least in part, on the generated similarity score.. . ... International Business Machines

12/08/16 / #20160358093

Implementing stochastic networks using magnetic tunnel junctions

Embodiments of the invention relate to implementing a probabilistic graphical model (pgm) using magnetic tunnel junctions (mtjs). One embodiment comprises a memory array of magnetic tunnel junctions and a driver unit for programming the memory array to represent a probabilistic graphical model. ... International Business Machines

12/08/16 / #20160358083

Identification and classification of web traffic inside encrypted network tunnels

The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. ... International Business Machines

12/08/16 / #20160358081

Automated vehicular accident detection

A vehicle accident detection method and system is provided. The method includes receiving location coordinates associated with a location of an occuring vehicular accident. ... International Business Machines

12/08/16 / #20160358067

Reconfigurable and customizable general-purpose circuits for neural networks

A reconfigurable neural network circuit is provided. The reconfigurable neural network circuit comprises an electronic synapse array including multiple synapses interconnecting a plurality of digital electronic neurons. ... International Business Machines

12/08/16 / #20160358066

Hardware architecture for simulating a neural network of neurons

Embodiments of the invention relate to a neural network system for simulating neurons of a neural model. One embodiment comprises a memory device that maintains neuronal states for multiple neurons, a lookup table that maintains state transition information for multiple neuronal states, and a controller unit that manages the memory device. ... International Business Machines

12/08/16 / #20160358016

Ensuring a desired distribution of images in a multimedia document utilizing facial signatures

A method, system and computer program product for ensuring a desired distribution of images in a multimedia document (e.g., yearbook, slideshow). A desired distribution of facial signatures in a multimedia document to be created by the user is received. ... International Business Machines

12/08/16 / #20160358014

Protecting content displayed on a mobile device

A method of protecting content displayed on a mobile device screen is provided. The mobile device screen may receive both sensitive and non-sensitive content. ... International Business Machines

12/08/16 / #20160357995

Verifying motion data for accessing hardware elements

Aspects of the present disclosure are directed towards a method of electronic verification of motion data. This includes collecting a first set of motion data that corresponds to a first set of motion characteristics generated from physically moving a hardware element of a computer ending upon inserting the hardware element of the computer into a computer chassis. ... International Business Machines

12/08/16 / #20160357992

Protecting content displayed on a mobile device

A system for protecting content includes a mobile device screen including a plurality of pixels, whereby each of the plurality of pixels have first sub-pixel units that include a first viewing angle and second sub-pixel units that include a second viewing angle. Within each of the plurality of pixels, the first sub-pixel units are adjacent to the second sub-pixel units. ... International Business Machines

12/08/16 / #20160357990

Verifying motion data for accessing hardware elements

Aspects of the present disclosure are directed towards a method of electronic verification of motion data. This includes collecting a first set of motion data that corresponds to a first set of motion characteristics generated from physically moving a hardware element of a computer ending upon inserting the hardware element of the computer into a computer chassis. ... International Business Machines

12/08/16 / #20160357974

Intelligent key selection and generation

A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.. ... International Business Machines

12/08/16 / #20160357970

Electronic personal assistant privacy

A method comprises receiving a first user communication, accessing a directory entry associated with the user, accessing, by a processor, a database stored in a memory that includes content designated as private that is associated with the user in the directory, determining with the processor whether the first user communication includes content designated as private that is associated with the user, generating a second user communication by removing the content designated as private that is associated with the user from the first user communication, and sending the second user communication to an electronic personal assistant.. . ... International Business Machines

12/08/16 / #20160357969

Remediation of security vulnerabilities in computer software

Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations.. . ... International Business Machines

12/08/16 / #20160357956

Automatically altering and encrypting passwords in systems

In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach includes a processor identifies a resource protected by a password. ... International Business Machines

12/08/16 / #20160357952

Verification of a pattern based passcode

A method and system for verification of a pattern based passcode. A user input of a series of key inputs is received. ... International Business Machines

12/08/16 / #20160357947

Protecting content displayed on a mobile device

A method, computer program product and system for protecting content includes a mobile device screen including a plurality of pixels, whereby each of the plurality of pixels have first sub-pixel units that include a first viewing angle and second sub-pixel units that include a second viewing angle. Within each of the plurality of pixels, the first sub-pixel units are adjacent to the second sub-pixel units. ... International Business Machines

12/08/16 / #20160357896

Chemo-epitaxy mask generation

A method to generate chemo-epitaxy masks includes receiving a device pattern comprising a plurality of device geometries, wherein the device pattern conforms to chemo-epitaxy constraints, enlarging the device geometries along a width of the device geometries to provide enlarged device geometries, and using the enlarged device geometries to generate at least one chemo-epitaxy mask corresponding to the device pattern. The at least one chemo-epitaxy mask may include a neutral hard mask and one or more cut masks. ... International Business Machines

12/08/16 / #20160357885

Hybrid simulation in a cloud computing environment

A simulation mechanism manages deployment of a simplified computing solution (scs) and a corresponding simulation model that simulates a scaled multiple of the scs to allow a deployment configuration for a large scale computing solution to be determined and tested before actually deploying the large scale computing solution.. . ... International Business Machines

12/08/16 / #20160357877

Colocation and anticolocation in colocation data centers via elastic nets

An application processing system for placing applications and their associated data into a colocation data center, wherein an application placement module is configured to perform the method of steps including: constructing a facility communication node graph; constructing a composite elastic map which represents the compute nodes in the colocation data center; associating a force function between two nodes based on communication bandwidth; constructing an application usage data space; inserting the node graph into the application data space; assigning the applications to the compute nodes; associating a force function between each application and each compute node based on the assignment; determining an elastic map energy (eme) for the elastic map, wherein the eme is the total energy of the system; and assigning the real-world applications to the real-world compute nodes in the data center if the eme is less than a threshold energy.. . ... International Business Machines

12/08/16 / #20160357875

Techniques for promoting and viewing social content written by nearby people

Techniques are disclosed for promoting and sharing social content for view in a network. An index engine of a network device queries a client device requesting a data connection to the network device for sharable social media content. ... International Business Machines

12/08/16 / #20160357859

Structured representation and classification of noisy and unstructured tickets in service delivery

Methods, systems, and computer program products for structured representation and classification of noisy and unstructured tickets are provided herein. A method includes correlating one or more items of problem incident text data from a given problem incident identifier with items of event text data to generate items of correlated text data within the given problem incident identifier; applying a syntactic grammar to the items of correlated text data to identify in the given problem incident identifier (i) one or more domain-dependent concepts and (ii) one or more domain-independent concepts; parsing noisy and/or unstructured text from the given problem incident identifier based on analysis of (i) the domain-dependent concepts and (ii) the domain-independent concepts; and classifying the given problem incident identifier by classifying features derived from text of the given problem incident identifier subsequent to said parsing of said noisy and/or unstructured text from the given problem incident identifier.. ... International Business Machines

12/08/16 / #20160357856

Enhanced answers in deepqa system according to user preferences

A semantic search engine is enhanced to employ user preferences to customize answer output by, for a first user, extracting user preferences and sentiment levels associated with a first question; receiving candidate answer results of a semantic search of the first question; weighting the candidate answer results according to the sentiment levels for each of the user preferences; and producing the selected candidate answers to the first user. Optionally, user preferences and sentiment levels may be accumulated over different questions for the same user, or over different users for similar questions. ... International Business Machines

12/08/16 / #20160357855

Utilizing word embeddings for term matching in question answering systems

Software that compares vector representations of question terms and passage terms in question answering systems by performing the following steps: (i) receiving a question; (ii) generating a plurality of vectors including a first vector representation of a term in the question and a second vector representation of a term in a set of natural language text; (iii) generating a similarity score representing an amount of similarity between the first vector representation and the second vector representation; and (iv) determining whether the set of natural language text is relevant to the question based, at least in part, on the generated similarity score.. . ... International Business Machines

12/08/16 / #20160357852

Text processing method, system and computer program

A method includes hierarchically identifying occurrences of some of the words in the set of sentences; creating a first index for each of some of the words based on the upper hierarchy of occurrences identified for each word; receiving input of a queried word; hierarchically identifying occurrences of the queried word in the set of sentences; creating a second index based on the upper hierarchy of occurrences identified for the queried word; comparing the first index and the second index to calculate an estimated value for the number of occurrences of a word in the neighborhood of the queried word; and calculating the actual value of the number of occurrences of a word in the neighborhood of the queried word based on an upper hierarchy and lower hierarchy of the occurrences on condition that the estimated value is equal to or greater than a predetermined number.. . ... International Business Machines

12/08/16 / #20160357850

System and method to identify, gather, and detect reusable digital assets

A method, system, and apparatus are provided for automating digital resource management by using monitored user interactions with digital resources to compute a user interaction metric for each digital resource upon detecting a role change for a first user having a user interaction history with the digital resources, where each user interaction metric indicates how important the first user is to the corresponding digital resource and is used to select and map a first digital resource to a second user to provide an ownership transition recommendation for the first digital resource in response to the role change for the first user.. . ... International Business Machines

12/08/16 / #20160357839

Technology for generating a model in response to user selection of data

Dynamically generating a model for a report includes presenting a user with source data by a source application, wherein the source data is available for producing a report. Selections are received from the user indicating portions of the source data to potentially include in the report. ... International Business Machines

12/08/16 / #20160357837

Custom object-in-memory format in data grid network appliance

Techniques are disclosed for implementing custom object-in-memory formats in a data grid network appliance. The techniques include maintaining a record of format definitions on a client device of the data grid and a corresponding record of format definitions on a server device of the data grid. ... International Business Machines

12/08/16 / #20160357836

Custom object-in-memory format in data grid network appliance

Techniques are disclosed for implementing custom object-in-memory formats in a data grid network appliance. The techniques include maintaining a record of format definitions on a client device of the data grid and a corresponding record of format definitions on a server device of the data grid. ... International Business Machines

12/08/16 / #20160357817

Scalable acceleration of database query operations

Embodiments include methods, systems and computer program products for offloading multiple processing operations to an accelerator. Aspects include receiving a database query from an application, performing an analysis on the query, and identifying a plurality of available accelerators. ... International Business Machines

12/08/16 / #20160357811

Webpage content search

An information locating method and system. The method includes presenting by a computer processor, a webpage to a user. ... International Business Machines

12/08/16 / #20160357807

Horizontal decision tree learning from very high rate data streams

A mechanism is provided in a data processing system for distributed tree learning. A source processing instance distributes data record instances to a plurality of model update processing items. ... International Business Machines

12/08/16 / #20160357803

Method and system for matching appropriate content with users by matching content tags and profiles

A method and system is provided for classifying and labeling information content and also for profiling a user for accessing the information content, both using a coordinated labeling technique so that content from multiple sources may be searched, identified and/or presented to the user according to the user's profile. This technique provides an ongoing update of information content and sources while filtering out unnecessary information that is irrelevant to the user's profile, resulting in focused availability of information to the user. ... International Business Machines

12/08/16 / #20160357798

Data table performance optimization

A computer program product to optimize a database is provided. A processor determines a frequency of search for a plurality of columns in a table. ... International Business Machines

12/08/16 / #20160357789

Repairing corrupted references

Repairing corrupt database references. Identifying a corrupt reference within a database, whereby the corrupt reference includes a reference with a broken connection between one or more data objects within the database and the corrupt reference is associated with one or more reference corruption types. ... International Business Machines

12/08/16 / #20160357781

Filename-based inference of repository actions

In response to detecting a file upload request of a file to storage within a file repository, at least one filename metadata token is identified that includes a subset of characters of a filename of the file and that is mapped in association with the file repository using the subset of characters to at least one repository upload processing action of the file repository. Each mapped repository upload processing action, identified using the subset of characters of each of the at least one filename metadata token, is executed in association with the file upload request of the file to the storage within the file repository.. ... International Business Machines

12/08/16 / #20160357775

Multi-level colocation and processing of spatial data on mapreduce

Methods, systems, and computer program products for multi-level colocation and analytical processing of spatial data on mapreduce are provided herein. A method includes correlating multiple items of spatial data and multiple items of attribute data within a file system to generate multiple blocks of correlated data; colocating each of the multiple blocks of correlated data on a given node within the file system based on a data block placement policy; and clustering multiple replicas generated for each of the multiple data blocks at multiple levels of spatial granularity within the file system.. ... International Business Machines

12/08/16 / #20160357773

Media suggestions based on presence

Embodiments of the present invention provide systems and methods for suggesting media content to a group of users. The method includes identifying more than one device at a location and pairing the devices. ... International Business Machines

12/08/16 / #20160357757

Distinguishing portions of output from multiple hosts

An apparatus includes a receiving unit operable to receive a plurality of outputs from a plurality of hosts, a comparing unit operable to compare the plurality of outputs, and a display processing unit operable to generate a display in which portions of the plurality of outputs are distinguished based on a comparison result of the comparing unit.. . ... International Business Machines

12/08/16 / #20160357751

Data table performance optimization

A method to optimize a database is provided. A processor determines a frequency of search for a plurality of columns in a table. ... International Business Machines

12/08/16 / #20160357750

Distinguishing portions of output from multiple hosts

An apparatus includes a receiving unit operable to receive a plurality of outputs from a plurality of hosts, a comparing unit operable to compare the plurality of outputs, and a display processing unit operable to generate a display in which portions of the plurality of outputs are distinguished based on a comparison result of the comparing unit.. . ... International Business Machines

12/08/16 / #20160357749

Associating keywords from communication content with communication participants

Embodiments of the present invention provide systems, methods, and program products for associating keywords from communication content with communication participants. Embodiments of the present invention can be used to associate communication metadata based, at least in part on one or more keywords extracted from communication content. ... International Business Machines

12/08/16 / #20160357747

Schema discovery through statistical transduction

A method, system, and computer program product derive data schema for application to a data set. One or more processors generate a directed acyclic weighted graph that encodes data types and semantic types used by a data set. ... International Business Machines

12/08/16 / #20160357744

Empathy injection for question-answering systems

Exemplary methods and devices herein receive an inquiry and automatically analyze words used in the inquiry, potential answers, and data maintained by evidence sources using the computerized device to determine the sensitivity level associated with the inquiry. The sensitivity level associated with the inquiry represents an emotional and cognitive state of the user. ... International Business Machines

12/08/16 / #20160357732

Reformatting of context sensitive data

A method for dynamically detecting and converting a context-sensitive information in a first language and a first format to a second language and a second format that is understandable to an end user based on a user-specified setting is provided. The method may use a built-in camera of a computing device to dynamically detect and capture an image frame of context-sensitive information. ... International Business Machines

12/08/16 / #20160357730

Contextual auto-correct dictionary

A processor generates a temporary dictionary of one or both words and phrases based on an access of a first application. The processor uses the temporary dictionary to carry out auto-correct operations on text included in a second application.. ... International Business Machines

12/08/16 / #20160357723

Data filtering based on a cell entry

A method for data filtering includes displaying on a display device a cell set including data of a common data type, and displaying a first filter icon within a first cell of the cell set and a second filter icon within a second cell of the cell set. The first cell includes a first cell entry and the second cell includes a second cell entry. ... International Business Machines

12/08/16 / #20160357719

Managing file changes made during a review process

A method for managing file changes is provided. A file editor is able to view if the file he is submitting for review, is already under review with any reviewer. ... International Business Machines

12/08/16 / #20160357709

Reformatting of context sensitive data

A method for dynamically detecting and converting a context-sensitive information in a first language and a first format to a second language and a second format that is understandable to an end user based on a user-specified setting is provided. The method may use a built-in camera of a computing device to dynamically detect and capture an image frame of context-sensitive information. ... International Business Machines

12/08/16 / #20160357687

Key encryption and decryption

Provided is a data storage drive for encrypting data, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the session encrypted data key using a session key, wherein a result is a data key that is capable of being used to encrypt clear text and to decrypt cipher text written to a storage medium. Also provided is a system, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the session encrypted data key using a private key, wherein a result is a secret key that is capable of being used to encrypt clear text and to decrypt cipher text written to a storage medium.. ... International Business Machines

12/08/16 / #20160357685

Storing a system-absolute address (saa) in a first level translation look-aside buffer (tlb)

Embodiments relate to a method, system and computer program product for storing a system-absolute address (saa) in a first level look-aside buffer (tlb). In one embodiment, the system includes a central processor including the tlb and general purpose registers (gprs). ... International Business Machines

12/08/16 / #20160357684

Preemptive guest merging for virtualization hypervisors

Aspects of the present invention provide a solution for managing memory. A method according to an embodiment includes: prior to any storage of a page in the memory: analyzing the page to compute an identifier for the page based on characteristics of the page; and comparing the computed identifier with other identifiers of other pages currently stored in the memory to find an identical page, wherein a match between the computed identifier and the identifier of one of the other pages currently stored in memory indicates that the page corresponding to the computed identifier and the other page corresponding to the matching identifier are identical; storing, in the case that an identical page is found, a link to the identical page in a portion of the memory; and storing, in case that the identical page is not found, the page in the portion of the memory and storing the identifier.. ... International Business Machines

12/08/16 / #20160357682

Set selection of a set-associative storage container

A system includes a set-associative storage container and a processor configured to generate a vector that is a random number. Two or more residue functions are applied to the vector that each produces a state signal including a different number of states based on the vector. ... International Business Machines

12/08/16 / #20160357679

Store forwarding cache

A load request is received to retrieve a piece of data from a location in memory and the load request follows one or more store requests in a set of instructions to store a piece of data in the location in memory. One or more possible locations in a cache for a piece of data corresponding to the location in memory is determined. ... International Business Machines

12/08/16 / #20160357676

Prefetch threshold for cache restoration

Embodiments relate to a prefetch threshold for cache restoration. An aspect includes determining, based on a task switch from an outgoing task to a current task in a processor, a prefetch threshold for a next task, the prefetch threshold corresponding to an expected runtime of the current task and an amount of time required to prefetch data for the next task. ... International Business Machines

12/08/16 / #20160357663

Software defect reporting

Provided are approaches for software defect reporting. Specifically, one approach provides identifying a software defect; generating a software defect report, wherein the software defect report is generated in real-time as the software defect is identified during testing of the test case, wherein the software defect report is submitted by a testing entity to a software developer responsible for creating a software product having the software defect, and wherein the defect report contains information to identify the location of the software defect in the application code of the software product; determining if the software defect report information is complete; and if the software defect report information is not complete, the updating the defect report information, determining if the software defect is reproducible, and recreating the software defect in the case that the software defect is reproducible.. ... International Business Machines

12/08/16 / #20160357662

Monitoring and capturing early diagnostic data

A deviance monitoring module is provided for examining various parameters of an operating system for deviance from a baseline behavior at specified intervals. A range of acceptable deviance values from a baseline behavior is set for parameters of an operating system. ... International Business Machines

12/08/16 / #20160357661

Automated dynamic test case generation

Embodiments of the present invention provide systems and methods for generating a set of test cases using a base test program. The base test program may be used as both a functional drive and as a performance measuring test case. ... International Business Machines

12/08/16 / #20160357660

Early risk identification in devops environments

A computer executes a first version of a code module in a first test environment, collects a first set of execution measurements, and creates a first profile based on the first set of execution measurements. The computer executes the first version of the code module in a second test environment, collects a second set of execution measurements, and creates a second profile based on the second set of execution measurements. ... International Business Machines

12/08/16 / #20160357659

Detecting merge conflicts and compilation errors in a collaborative integrated development environment

A method, and associated computer system and computer program product, of detecting source code merge conflicts and compilation errors. Uncommitted changes associated with a source code are received periodically at each time of a sequence of times. ... International Business Machines

12/08/16 / #20160357650

Dynamic cache row fail accumulation due to catastrophic failure

A technique is provided for accumulating failures. A failure of a first row is detected in a group of array macros, the first row having first row address values. ... International Business Machines

12/08/16 / #20160357646

Multiple memory format storage in a storage network

A method includes sending a data retrieval request regarding a data segment of a data object to redundant array of independent disk (raid) memory and to dispersed storage network (dsn) memory. The method further includes receiving a first read response from a first one of the raid memory and the dsn memory. ... International Business Machines

12/08/16 / #20160357638

Temporary pipeline marking for processor error workarounds

Embodiments include a computer system for temporary pipeline marking for processor error workarounds, the computer system having a processor configured to perform a method. The method includes monitoring a pipeline of the processor for an event that is predetermined to place the processor in a stuck state that results in an errant instruction execution result due to the stuck state or repeated resource contention causing performance degradation. ... International Business Machines

12/08/16 / #20160357637

Adjusting dispersed storage network traffic due to rebuilding

A method includes identifying an encoded data slice for rebuilding. The method further includes determining whether a rebuilding threshold for the set of encoded data slices has been reached. ... International Business Machines

12/08/16 / #20160357636

Using error correcting codes for parity purposes

Software that provides a subset of error correcting code (ecc) bits to be used for parity purposes. The software performs the following steps: (i) providing, in a data block, a first set of redundant bits adapted to detect and correct errors in the data block, based, at least in part, on a first set of error detection/correction (edc) requirements; and (ii) providing, within the first set of redundant bits, a first sub-set of parity bit(s) adapted to provide single bit error detection for the data block. ... International Business Machines

12/08/16 / #20160357635

Alternative multiple memory format storage in a storage network

A method includes determining whether to request retrieval of the data segment from at least one of redundant array of independent discs (raid) memory and dispersed storage network (dsn) memory. The method further includes, when the computing device determines to request retrieval from the raid memory, sending a read request to the raid memory. ... International Business Machines

12/08/16 / #20160357629

Selective error coding

A system and method of performing selective error coding in memory management of a memory device are described. The method includes performing a process of detecting and correcting memory errors in the memory of the memory device either prior to or after a chip mark associated with the memory device is in place. ... International Business Machines

12/08/16 / #20160357628

Selective error coding

A system and method of performing selective error coding in memory management of a memory device are described. The method includes performing a process of detecting and correcting memory errors in the memory of the memory device either prior to or after a chip mark associated with the memory device is in place. ... International Business Machines

12/08/16 / #20160357621

Data processing

A method, apparatus, and/or computer program product analyzes data processing. Dependency metadata, which is used for representing dependency on data among at least two components of an application, is acquired. ... International Business Machines

12/08/16 / #20160357619

Methods, apparatus and computer programs for managing persistence

Described are methods, apparatus and computer programs for managing persistence within a data processing system such as a messaging system, database system or file system. The method for managing persistence includes a deferred evaluation (230,330,430) of at least one criterion associated with costs and/or benefits of saving to persistent storage, instead of persistence behaviour being fully predefined. ... International Business Machines

12/08/16 / #20160357617

Locale aware platform

Handling locale information on a computing platform, a computer obtains, in response to an event that an application is pushed to a computing platform, locale information corresponding to the application. The computer determines the type of the application, configures a runtime executable file required by the application according to the locale information corresponding to the application and the type of the application, creates a script for configuring a locale of an operating system on the computing platform consistent with the locale information corresponding to the application, and creates a droplet for the application that includes the configured runtime executable file required by the application and is associated with the created script.. ... International Business Machines

12/08/16 / #20160357606

Eliminating execution of jobs-based operational costs of related reports

Optimizing operational costs in a computing environment includes identifying high-cost jobs that are executed to generate one or more reports in the computing environment, identifying one or more reports the generation of which is dependent on the execution of the high-cost jobs, and culling at least a first job from among the high-cost jobs, in response to determining that a benefit achieved from the reports that depend on the first job does not justify costs associated with generating the reports.. . ... International Business Machines

12/08/16 / #20160357601

Experience-based dynamic sequencing of process options

For experience-based dynamic sequencing of a set of process options, a first process option is executed at a first stage in a first sequence for a first set of members. The sequence includes several stages of executing a subset of the process options. ... International Business Machines

12/08/16 / #20160357597

Collecting memory operand access characteristics during transactional execution

A transactional execution of a set of instructions in a transaction of a program may be initiated to collect memory operand access characteristics of a set of instructions of a transaction during the transactional execution. The memory operand access characteristics may be stored upon a termination of the transactional execution of the set of instructions. ... International Business Machines

12/08/16 / #20160357596

Alerting hardware transactions that are about to run out of space

A transactional memory system determines whether to pass control of a transaction to an about-to-run-out-of-resource handler. A processor of the transactional memory system determines information about an about-to-run-out-of-resource handler for transaction execution of a code region of a hardware transaction. ... International Business Machines

12/08/16 / #20160357595

Alerting hardware transactions that are about to run out of space

A transactional memory system determines whether to pass control of a transaction to an about-to-run-out-of-resource handler. A processor of the transactional memory system determines information about an about-to-run-out-of-resource handler for transaction execution of a code region of a hardware transaction. ... International Business Machines

12/08/16 / #20160357592

Virtual credential adapter for use with virtual machines

Managing credential for use with virtual machines includes storing a first virtual credential adapter within a hypervisor executing within a host data processing system. The first virtual credential adapter maintains a credential for a computing resource. ... International Business Machines

12/08/16 / #20160357591

Scalable policy management in an edge virtual bridging (evb) environment

A method includes validating, by a switch, a message including virtual machine (vm) information using a value of a virtual station interface (vsi) type identification (id) to perform a lookup of a fetched vsi database. The vm information for the vm comprises vsi type id and virtual local area network (vlan) id. ... International Business Machines

12/08/16 / #20160357584

Hybrid simulation in a cloud computing environment

A simulation mechanism manages deployment of a simplified computing solution (scs) and a corresponding simulation model that simulates a scaled multiple of the scs to allow a deployment configuration for a large scale computing solution to be determined and tested before actually deploying the large scale computing solution.. . ... International Business Machines

12/08/16 / #20160357581

Locale aware platform

Handling locale information on a computing platform in a cloud computing environment. An application pushed by a cloud client is received by a computing platform, in response to receiving a request from a user to execute the application. ... International Business Machines

12/08/16 / #20160357579

Locale-aware customization of public content

For customizing content according to a dynamically changing audience, a mobile device associated with a member of the audience is detected to be present within a defined area. A locale preference corresponding to the member is collected from the mobile device. ... International Business Machines

12/08/16 / #20160357576

Generating customized on-demand videos from automated test scripts

Generating customized on-demand videos from automated test scripts is provided. Responsive to receiving a request for an instruction on performing a task on a computer, a database of automated test scripts may be searched to identify a set of test scripts that comprise a set of executable actions associated with the task. ... International Business Machines

12/08/16 / #20160357570

Restricted instructions in transactional execution

Restricted instructions are prohibited from execution within a transaction. There are classes of instructions that are restricted regardless of type of transaction: constrained or nonconstrained. ... International Business Machines

12/08/16 / #20160357567

Speculative load data in byte-write capable register file and history buffer for a multi-slice microprocessor

An approach is provided is provided in which a computing system matches a writeback instruction tag (itag) to an entry instruction tag (itag) included in an issue queue entry. The writeback itag is provided by a first of multiple load store units. ... International Business Machines

12/08/16 / #20160357566

Speculative load data in byte-write capable register file and history buffer for a multi-slice microprocessor

An approach is provided is provided in which a computing system matches a writeback instruction tag (itag) to an entry instruction tag (itag) included in an issue queue entry. The writeback itag is provided by a first of multiple load store units. ... International Business Machines

12/08/16 / #20160357557

Vector floating point test data class immediate instruction

A vector floating point test data class immediate instruction is provided that determines whether one or more elements of a vector specified in the instruction are of one or more selected classes and signs. If a vector element is of a selected class and sign, an element in an operand of the instruction corresponding to the vector element is set to a first defined value, and if the vector element is not of the selected class and sign, the operand element corresponding to the vector element is set to a second defined value.. ... International Business Machines

12/08/16 / #20160357553

Restricted instructions in transactional execution

Restricted instructions are prohibited from execution within a transaction. There are classes of instructions that are restricted regardless of type of transaction: constrained or nonconstrained. ... International Business Machines

12/08/16 / #20160357518

Extending programmer workbenches for handling programming language differences

Methods, systems, and computer program products for extending programmer workbenches for handling programming language differences are provided herein. A method includes determining syntactic differences between a first programming language and a second programming language; determining semantic differences between the first programming language and the second programming language; creating a comparative help list for the first programming language and the second programming language by generating, for each of multiple language elements in the first programming language, an entry for the comparative help list that comprises a correlation of items of content, the items being associated with a given language element of the first programming language to language elements of the second programming language, wherein said correlation is based on (i) the syntactic differences and (ii) the semantic differences; and outputting at least a portion of the comparative help list to a component associated with a user.. ... International Business Machines

12/08/16 / #20160357475

Control of solid state memory device temperature using queue depth management

Embodiments relate to controlling a temperature of a solid state memory device using queue depth management by monitoring an operating temperature of each of a plurality of solid state drives of the solid state memory device. Based on a determination that the operating temperature of one of the plurality of solid state drives exceeds local device threshold values, the method includes receiving an indication that one or more local measures have been taken by the solid state memory device. ... International Business Machines

12/08/16 / #20160357469

Secure sharing of storage area networks in a cloud

Techniques disclosed herein describe performing client-requested disk management operations to storage disk units of a storage area network (san). A proxy service receives a request from a client of a san provider to perform a disk management operation on one or more storage disk units of the san provider. ... International Business Machines

12/08/16 / #20160357468

Maintenance of a fabric priority during synchronous copy operations

A primary storage controller receives a write command from a host, wherein fibre channel frames corresponding to the write command have a priority indicated by the host. The primary storage controller performs a synchronous copy operation to copy data written by the write command from the primary storage controller to a secondary storage controller, wherein fibre channel frames corresponding to the synchronous copy operations have an identical priority to the priority indicated by the host.. ... International Business Machines

12/08/16 / #20160357467

Adjusting optimistic writes in a dispersed storage network

A method includes encoding a data object into a plurality of sets of encoded data slices. The method further includes commencing execution of a plurality of three-phase write operations for writing the plurality of sets of encoded data slices to a set of storage units. ... International Business Machines

12/08/16 / #20160357459

Virtual grouping of memory

The present disclosure includes identifying, in a memory system, a capacity for each of a plurality of memory modules for a first memory channel having a first amount of memory and a second memory channel having a second amount of memory; determining a memory segment size from the capacities of the memory modules; identifying a first memory segment of the memory segment size for the first memory channel and a second memory segment of the memory segment size for the second memory channel; and creating a virtual group that includes the first memory segment and the second memory segment and that uses less than the entire first amount of memory from the first memory channel.. . ... International Business Machines

12/08/16 / #20160357449

Configuration of a physical control unit to support multiple logical control units for different tape drive types in a mainframe native tape attachment storage system

A tape storage system having a physical control unit configured to support multiple logical control units is provided. Each logical control unit supports communication with a single tape drive model type up to a maximum number of drives. ... International Business Machines

12/08/16 / #20160357447

Autonomous dynamic optimization of platform resources

Methods for dynamically optimizing platform resource allocation of a logically-partitioned data processing system. Processor and memory resources are allocated to logical partitions of the data processing system. ... International Business Machines

12/08/16 / #20160357445

Ensuring health and compliance of devices

A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data storage environment. ... International Business Machines

12/08/16 / #20160357444

Performing a data write on a storage device

A method of performing a data write on a storage device comprises instructing a device driver for the device to perform a write to the storage device, registering the device driver as a transaction participant with a transaction co-ordinator, executing a flashcopy of the storage device, performing the write on the storage device, and performing a two-phase commit between device driver and transaction co-ordinator. Preferably, the method comprises receiving an instruction to perform a rollback, and reversing the data write according to the flashcopy. ... International Business Machines

12/08/16 / #20160357253

Initiating actions responsive to user expressions of a user while reading media content

First media content including text is presented on a display. User expressions of a user, including eye movement, are tracked by an image detector while the user is reading the text of the first media content. ... International Business Machines

12/08/16 / #20160357246

Reduction of power consumption of a buffer in tape drive

A method of reducing power consumption of a buffer for cache in a tape drive connected to a host in a communicable manner, according to one embodiment, includes detecting a transfer rate of data from the host or to the host, and determining a writing or reading rate of data to or from a tape based on the data transfer rate. A determination is made as to whether predetermined conditions including the data transfer rate, the data writing or reading rate, and a capacity of a buffer are satisfied, where the buffer includes at least two buffer areas. ... International Business Machines

12/08/16 / #20160356904

Virtual sensing for adjoint based incorporation of supplementary data sources in inversion

A method, system and computer program product are disclosed for integrating plural modalities of information to obtain values for a specified attribute of a given system. In one embodiment, the method comprises acquiring data of a first modality, conveying a first source of data of a first type of the system; configuring simulator with settings of physical sensors; acquiring data of a second modality from the system, conveying a second source of data of a second type of the system. ... International Business Machines

12/08/16 / #20160356878

Mobile device proximity notification

Aspects of the present invention disclose a method, computer program product, and system for mobile computing device proximity notification. The method includes one or more processors acquiring location information for a plurality of mobile computing devices. ... International Business Machines

12/08/16 / #20160356851

Automated dynamic test case generation

Embodiments of the present invention provide systems and methods for generating a set of test cases using a base test program. The base test program may be used as both a functional drive and as a performance measuring test case. ... International Business Machines

12/08/16 / #20160356621

Route stabilization scrolling mode

An approach for a route stabilization scrolling mode is provided. The approach displays a map window, wherein the map window includes a visible region of a map, the map including a plotted route originating at a source location and ending at a destination location. ... International Business Machines

12/08/16 / #20160356608

Map-matching by dual-level heuristic search

In one embodiment, a computer-implemented method includes receiving a global positioning system (gps) location of a mobile device. Two or more road locations are determined as possible locations corresponding to the gps location in a physical network of a set of roads. ... International Business Machines

12/08/16 / #20160356559

Manifold for a liquid cooling system

A method including punching a first hole in a parent sheet metal, such that a substantially round section with a first diameter is removed from the hole, forming a second hole by inserting a mandrel into the first hole, causing a portion of the parent sheet metal to deform in a downward direction and increase the diameter of the first hole to a second diameter, the deformed portion of the parent sheet metal is substantially perpendicular to the parent sheet metal, forming a thread into an interior sidewall of the second hole, and forming the parent sheet metal into a water tight manifold.. . ... International Business Machines

12/08/16 / #20160355943

Feedback control of dimensions in nanopore and nanofluidic devices

Nanofluidic passages such as nanochannels and nanopores are closed or opened in a controlled manner through the use of a feedback system. An oxide layer is grown or removed within a passage in the presence of an electrolyte until the passage reaches selected dimensions or is closed. ... International Business Machines

12/08/16 / #20160355942

Feedback control of dimensions in nanopore and nanofluidic devices

Nanofluidic passages such as nanochannels and nanopores are closed or opened in a controlled manner through the use of a feedback system. An oxide layer is grown or removed within a passage in the presence of an electrolyte until the passage reaches selected dimensions or is closed. ... International Business Machines

12/08/16 / #20160355669

Photoisomerizing polymers

In an example, a composition of matter includes a particle, a photoisomerizing polymer bonded to a first portion of the particle, and a chelating material bonded to a second portion of the particle.. . ... International Business Machines

12/08/16 / #20160355639

Photoisomerizing polymers

In an example, a process of forming a photoisomerizing azobenzene polymer includes chemically reacting an azobenzene material that includes at least two chlorocarbonyl functional groups with an amine to form a photoisomerizing azobenzene polymer. The photoisomerizing azobenzene polymer has a polymer chain that includes a first chlorocarbonyl group disposed at a first end of the polymer chain, a plurality of repeating azobenzene monomer units, and a second chlorocarbonyl group disposed at a second end of the polymer chain.. ... International Business Machines

12/08/16 / #20160355392

Planar cavity mems and related structures, methods of manufacture and design structures

A method of forming at least one micro-electro-mechanical system (mems) includes patterning a wiring layer to form at least one fixed plate and forming a sacrificial material on the wiring layer. The method further includes forming an insulator layer of one or more films over the at least one fixed plate and exposed portions of an underlying substrate to prevent formation of a reaction product between the wiring layer and a sacrificial material. ... International Business Machines

12/08/16 / #20160354833

Manifold for a liquid cooling system

A method including punching a first hole in a parent sheet metal, such that a substantially round section with a first diameter is removed from the hole, forming a second hole by inserting a mandrel into the first hole, causing a portion of the parent sheet metal to deform in a downward direction and increase the diameter of the first hole to a second diameter, the deformed portion of the parent sheet metal is substantially perpendicular to the parent sheet metal, forming a thread into an interior sidewall of the second hole, and forming the parent sheet metal into a water tight manifold.. . ... International Business Machines

12/08/16 / #20160354621

Safety harness monitoring and alerting system

Receiving machine-readable information about an anchor point, analyzing that information to determine if connecting a load to the anchor point would be safe, and reporting the results of this analysis to a user.. . ... International Business Machines

12/01/16 / #the present invention provides a method and system for storing and retrieving tags. each tag is associated with a resource, upon a user's request. a tagging gui is displayed which presents the available tags for one particular resource and/or a tag cloud gui is displayed which presents tags for more than one resource. the tagging gui allows to assign new tags to single resources. the tag cloud gui enables users to search for resources which have been assigned certain tags. in the tag cloud gui the relevancy of each single tag is visually reflected by its weighting factor which is determined by the frequency of occurrence. the method is characterized by the further steps:

International Business Machines Corporation

. . ... International Business Machines

12/01/16 / #20160353488

Freeing up mobile network for important phone calls in case of disaster

According to one exemplary embodiment, a method for reducing load on a mobile network after the occurrence of a disaster event is provided. The method may include receiving a disaster location time. ... International Business Machines

12/01/16 / #20160353404

Correlating road network information and user mobility information for wireless communication network planning

Various embodiments monitor user mobility in a wireless communication network. In one embodiment, a set of temporally related call detail records associated with at least one user of a wireless communication network is analyzed. ... International Business Machines

12/01/16 / #20160353272

Mobility detection for edge applications in wireless communication networks

Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more internet protocol (ip) data packets associated with a wireless communication device are analyzed. ... International Business Machines

12/01/16 / #20160353262

Freeing up mobile network for important phone calls in case of disaster

According to one exemplary embodiment, a method for reducing load on a mobile network after the occurrence of a disaster event is provided. The method may include receiving a disaster location time. ... International Business Machines

12/01/16 / #20160353234

Mobile application volatility management for situational applications

A method for managing situational mobile applications of high volatility in a mobile computing device includes first defining a policy specifying under which context a mobile application is to remain installed in a mobile computing device. Thereafter, the policy is loaded into memory of the device and a geolocation is determined for the device. ... International Business Machines

12/01/16 / #20160352910

Conference call alerts

Conference call alerting is provided. A first device of a plurality of telecommunications devices initiates a telecommunications link between the first device and a second device of the plurality of telecommunications devices. ... International Business Machines

12/01/16 / #20160352829

Data replication across servers

Embodiments of the present invention provide methods, systems, and computer program products for replicating data between redundant sources. In one embodiment, during a reverse replication process, roles of a source system and target system are altered such that the target system controls the replication process. ... International Business Machines

12/01/16 / #20160352822

Command process load balancing system

A command process load balancing system performs load balancing of received commands among a number of server processes to resolve access contention for virtual software resources. These contentions are resolved through a history recording unit that records a history including contents of a processed command and a response time of a process for the command into a history database. ... International Business Machines

12/01/16 / #20160352819

Peer-to-peer networking through universal port connections

Embodiments relate to two general purpose computers connected in a peer-to-peer mode by connecting a cable (or wireless connection) between universal ports (e.g., pcie ports) on each computer. A timing protocol utility runs on each computer to time schedule operations performed by its respective computer. ... International Business Machines

12/01/16 / #20160352778

Inferring security policies from semantic attributes

Techniques for inferring security policies from semantic attributes are provided. In one aspect, a method for building a query component executable by a processor is provided. ... International Business Machines

12/01/16 / #20160352769

Security with respect to managing a shared pool of configurable computing resources

Disclosed aspects include management of a shared pool of configurable computing resources having a first region and a second region. Using an analysis technique such as a heuristic technique, an asset is accessed for processing of a transfer of the asset from the first region to the second region. ... International Business Machines

12/01/16 / #20160352762

Probabilistically detecting low intensity threat events

A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate anomalies experienced by each of multiple attack surfaces is received. ... International Business Machines

12/01/16 / #20160352746

Dynamic permission roles for cloud based applications

During development of an application, an association between a view of the application and a data service, and rules applicable to the view, can be received. The rules can include an indication of a security role assigned to users who are allowed to access the view and an indication of whether the view is allowed to access the data service based on the security role assigned to the user. ... International Business Machines

12/01/16 / #20160352704

Protecting sensitive information using a trusted device

The invention relates to information processing field, and discloses a method for protecting sensitive information, comprising: receiving first information transmitted by an untrusted device, where the first information enables the sensitive information to be transmitted from a trusted device to a server; receiving the sensitive information input by a user; generating second information based on the first information and the sensitive information; encrypting at least the sensitive information in the second information with a first secret key, wherein the first secret key meets one of the following: the untrusted device does not know the first secret key; and the untrusted device knows the first secret key but is unable use the first secret key to decrypt the encrypted sensitive information; and transmitting the second information containing the encrypted sensitive information to the untrusted device for forwarding to the server indicated by the first information.. . ... International Business Machines

12/01/16 / #20160352697

Protecting sensitive information using an untrusted device

The invention relates to information processing field, and discloses a method for protecting sensitive information, comprising: determining that the sensitive information is required by a server; transmitting first information to a trusted device connected to the untrusted device, where the first information enables the sensitive information to be transmitted from the trusted device to the server, wherein the sensitive information is input on the trusted device; receiving second information transmitted by the trusted device, the second information is generated based on the first information and includes the sensitive information encrypted with a first secret key, wherein the first secret key meets one of the following: the untrusted device does not know the first secret key; the untrusted device knows the first secret key but is unable to use the first secret key to decrypt the encrypted sensitive information; forwarding the second information to the server.. . ... International Business Machines

12/01/16 / #20160352673

Leveraging an internet of things to initiate a physical object to perform a specific act that enhances an interaction of a user with the physical object

A first community internet of things (iot) concentrator can receive first data corresponding to an interaction of a user with at least one of a first plurality of physical objects, the first plurality of physical objects communicatively linked to one another within a first device domain. Responsive to receiving the first data corresponding to the interaction of the user with the at least one of the first of the plurality of physical objects, the first community iot concentrator or a second iot concentrator can initiate, based at least in part on the first data, at least one of a second plurality of physical objects to perform a specific act that enhances an interaction of the user with the at least one of the second plurality of physical objects. ... International Business Machines

12/01/16 / #20160352672

Following/subscribing for productivity applications

A method for following asynchronous and synchronous productivity application communications includes receiving, by an update processor, one or more preference sets for following progress on a productivity application communication. The update processor provides a targeted medium with a notification for one or more changes associated with the productivity application communication based on a promotion of the productivity application communication to the targeted medium. ... International Business Machines

12/01/16 / #20160352664

Intelligent information sharing system

Embodiments of the present invention disclose a method, computer program product, and system for information sharing. The method may receive user created content from a user. ... International Business Machines

12/01/16 / #20160352663

Prioritization of lock allocation

Aspects of the present invention disclose a method, computer program product, and system for prioritization of lock allocation. The method includes one or more computer processors receiving a first message in a queue of messages. ... International Business Machines

12/01/16 / #20160352662

Status and time-based delivery services for instant messengers

Embodiments of the present invention address deficiencies of the art in respect to unattended status and time-based messaging in an instant messaging (im) environment and provide a method, system and computer program product for unattended status and time-based messaging in an instant messaging (im) environment. In an embodiment of the invention, a method for unattended status and time-based messaging in an instant messaging (im) environment can be provided. ... International Business Machines

12/01/16 / #20160352658

Chatbots

In one aspect, the invention concerns a method of operating a chatbot to engage in a conversation with a correspondent the method comprises building a profile having plural profile variables for the correspondent; and during the conversation with the correspondent; selecting a node in the conversation data structure for processing based on the one or more profile variables, and processing the node to follow a conversation path based on the node's coded instructions and/or relationship with other nodes. In another aspect, the method comprises the steps of attempting to match the received input message with a node in the conversation data structure of the chatbot; if a matched node is found, selecting the matched node for processing; but if a matched node is not found, selecting a node for processing using a fuzzy search, or using a default procedure.. ... International Business Machines

12/01/16 / #20160352647

Method and system for policy based lifecycle management of virtual software appliances

A system and method for managing dynamically allocated resources assigned to a service includes providing a service to be used by a plurality of sites in a federation. Usage information associated with the service is communicated to each of the plurality of sites. ... International Business Machines

12/01/16 / #20160352593

Dynamic boundary based monitoring and metering

In an approach for providing a dynamic boundary based approach for monitoring and metering, a processor provisions at least one agent to one or more network accessible resources, wherein the at least one agent is configured to allow for monitoring and metering. A processor provides at least one dynamic boundary for monitoring and metering. ... International Business Machines

12/01/16 / #20160352587

Secure cloud management agent

Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters and threshold settings for a plurality of computing clouds. ... International Business Machines

12/01/16 / #20160352585

Computing resource license planning

As disclosed herein a method, executed by a computer, includes generating, by a software asset management tool (sam), a baseline event set comprising a plurality of events corresponding to an environment. The method further includes receiving a future event set comprising one or more future events corresponding to the environment. ... International Business Machines

12/01/16 / #20160352579

Locating virtual machine(s) within virtual networks

Methods, computer program products, and systems are presented. The methods include, for instance: locating, by one or more processor, at least one virtual machine within a virtual network, wherein gratuitous address resolution functionality of the at least one virtual machine is inactive; and providing, by the one or more processor, location information of the at least one virtual machine. ... International Business Machines

12/01/16 / #20160352562

Secure cloud management agent

Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters and threshold settings for a plurality of computing clouds. ... International Business Machines

12/01/16 / #20160352521

Automatic root key rollover during digital signature verification

A method for verifying digital signatures in the presence of root key rollover includes issuing a cross-certificate to a rekeyed root certificate, validating the cross-certificate and the rekeyed root certificate with respect to an original trusted root certificate, and validating a digital media signature using the cross-certificate and the rekeyed root certificate. The method may also include adding the rekeyed root certificate to an end user's trusted root certificate store. ... International Business Machines

12/01/16 / #20160352503

Initializing a descrambler

Embodiments herein describe techniques for synchronizing lfsrs located on two compute devices. To synchronize the lfsrs, a first one of the compute devices may transmit a first training block that includes a predefined bit sequence. ... International Business Machines

12/01/16 / #20160352502

Initializing a descrambler

Embodiments herein describe techniques for synchronizing lfsrs located on two compute devices. To synchronize the lfsrs, a first one of the compute devices may transmit a first training block that includes a predefined bit sequence. ... International Business Machines

12/01/16 / #20160352501

Initializing a descrambler

Embodiments herein describe techniques for synchronizing lfsrs located on two compute devices. To synchronize the lfsrs, a first one of the compute devices may transmit a first training block that includes a predefined bit sequence. ... International Business Machines

12/01/16 / #20160352500

Sub-nanosecond distributed clock synchronization using alignment marker in ethernet ieee 1588 protocol

A method for determining a slave clock to master clock time difference with an alignment marker. The method selects and transmits a first alignment marker at a first time by a transmitter that has a master clock in a first message to a receiver that has a slave clock. ... International Business Machines

12/01/16 / #20160352498

Initializing a descrambler

Embodiments herein describe techniques for synchronizing lfsrs located on two compute devices. To synchronize the lfsrs, a first one of the compute devices may transmit a first training block that includes a predefined bit sequence. ... International Business Machines

12/01/16 / #20160352473

Frequency-domain high-speed bus signal integrity compliance model

Embodiments of the present disclosure provide methods for testing channel compliance. The method generally includes identifying at least one design criteria and determining boundary sets of frequency domain parameters for compliant signal channels known to achieve the design criteria. ... International Business Machines

12/01/16 / #20160352336

Dynamic high voltage driver with adjustable clamped output level

A driver circuit and associated techniques include managing voltage driving an electronic device. An input signal having a first voltage level is received. ... International Business Machines

12/01/16 / #20160352221

Voltage charge pump with segmented boost capacitors

A voltage charge pump circuit with boost capacitor segments and boost delay chain structures are provided. The voltage charge pump circuit comprising a plurality of boost capacitor segments each of which is individually controlled by a respective signal line of a boost delay chain structure.. ... International Business Machines

12/01/16 / #20160352023

Integration of area efficient antennas for phased array or wafer scale array antenna applications

Package structures are provided for integrally packaging antennas with semiconductor rfic (radio frequency integrated circuit) chips to form compact integrated radio/wireless communications systems that operate in the millimeter-wave and terahertz frequency ranges. For example, a package structure includes an rfic chip, and an antenna package bonded to the rfic chip. ... International Business Machines

12/01/16 / #20160351840

Thin film device with protective layer

Embodiments of the invention include a method for fabricating a semiconductor device and the resulting structure. A substrate is provided. ... International Business Machines

12/01/16 / #20160351734

Dry etch method for texturing silicon and device

A method for texturing silicon includes loading a silicon wafer into a vacuum chamber, heating the silicon wafer and thermal cracking a gas to generate cracked sulfur species. The silicon wafer is exposed to the cracked sulfur species for a time duration in accordance with a texture characteristic needed for a surface of the silicon wafer.. ... International Business Machines

12/01/16 / #20160351733

Dry etch method for texturing silicon and device

A method for texturing silicon includes loading a silicon wafer into a vacuum chamber, heating the silicon wafer and thermal cracking a gas to generate cracked sulfur species. The silicon wafer is exposed to the cracked sulfur species for a time duration in accordance with a texture characteristic needed for a surface of the silicon wafer.. ... International Business Machines

12/01/16 / #20160351728

Highly responsive iii-v photodetectors using zno:al as n-type emitter

A photodiode includes a p-type ohmic contact and a p-type substrate in contact with the p-type ohmic contact. An intrinsic layer is formed over the substrate and including a iii-v material. ... International Business Machines

12/01/16 / #20160351689

Semiconductor structure with an l-shaped bottom plate

A method of forming a semiconductor structure is provided. The method including forming a first vertical channel on a first layer of source/drain material that is perpendicular relative to the first vertical channel, and forming a first source/drain semiconductor structure by removing one or more portions of the first layer of source/drain material such that i) the first source/drain semiconductor structure has a vertical side that is substantially planar with a vertical side of the first vertical channel and ii) a width of the source/drain is greater than a width of the first vertical channel, wherein the first source/drain semiconductor structure extends perpendicularly from its vertical side farther than the first vertical channel extends perpendicularly from its vertical side.. ... International Business Machines

12/01/16 / #20160351687

Protection of semiconductor-oxide-containing gate dielectric during replacement gate formation

Semiconductor-oxide-containing gate dielectrics can be formed on surfaces of semiconductor fins prior to formation of a disposable gate structure. A high dielectric constant (high-k) dielectric spacer can be formed to protect each semiconductor-oxide-containing gate dielectric. ... International Business Machines

12/01/16 / #20160351681

Methods of forming replacement fins for a finfet device using a targeted thickness for the patterned fin etch mask

One method disclosed herein includes, among other things, forming a patterned fin having a thickness that is equal to or greater than a target final fin height for a replacement fin, performing an etching process through the patterned fin etch mask to form a plurality of trenches in a semiconductor substrate to define a substrate fin and forming a recessed layer of insulating material in the trenches so as to expose the patterned fin etch. The method also includes forming a layer of cte-matching material around the exposed patterned fin etch mask, removing the patterned fin etch mask to thereby define a replacement fin cavity and expose a surface of the substrate fin, forming the replacement fin on the substrate fin and in the replacement fin cavity, removing the layer of cte-matching material and forming a gate structure around at least a portion of the replacement fin.. ... International Business Machines

12/01/16 / #20160351679

Thin film device with protective layer

Embodiments of the invention include a method for fabricating a semiconductor device and the resulting structure. A substrate is provided. ... International Business Machines

12/01/16 / #20160351664

Aspect ratio for semiconductor on insulator

A method comprises forming one or more fins in a first region on an insulated substrate. The method also comprises forming one or more fins formed in a second region on the insulated substrate. ... International Business Machines

12/01/16 / #20160351662

Finfets with high quality source/drain structures

A semiconductor structure is provided that includes a silicon germanium alloy fin located on a portion of a topmost surface of an insulator layer. A functional gate structure straddles a portion of the silicon germanium alloy fin and is located on other portions of the topmost surface of the insulator layer. ... International Business Machines

12/01/16 / #20160351592

Aspect ratio for semiconductor on insulator

A method comprises forming one or more fins in a first region on an insulated substrate. The method also comprises forming one or more fins formed in a second region on the insulated substrate. ... International Business Machines

12/01/16 / #20160351590

Preventing strained fin relaxation

A semiconductor structure includes a first strained fin portion and a second strained fin portion, a pair of inactive inner gate structures upon respective strained fin portions, and spacers upon outer sidewalls surfaces of the inactive inner gate structures, upon the inner sidewall surfaces of the inactive inner gate structures, and upon the first strained fin portion and the second strained fin portion end surfaces. The first strained fin portion and the second strained fin portion end surfaces are coplanar with respective inner sidewall surfaces of the inactive inner gate structures. ... International Business Machines

12/01/16 / #20160351485

Substrate device and electric circuit arrangement

An electronic circuit includes a substrate device which includes a first substrate section including a first plurality of layers attached to each other having a first orientation (x2) and a second substrate section including a second plurality of layers attached to each other. The second plurality of layers have a second orientation (x3). ... International Business Machines

12/01/16 / #20160351467

Limiting electronic package warpage

An electronic package includes a carrier, semiconductor chip, a lid, and a lid-ring. The carrier includes a top surface and a bottom surface configured to be electrically connected to a system board. ... International Business Machines

12/01/16 / #20160351454

Silicon-germanium fin formation

Forming a set of semiconductor fins is disclosed. Forming the set of semiconductor fins can include forming a base structure including a silicon substrate, an insulator layer stacked on the silicon substrate, and a plurality of silicon semiconductor fins each stacked directly on the insulator layer. ... International Business Machines

12/01/16 / #20160351452

Method of patterning dopant films in high-k dielectrics in a soft mask integration scheme

A method of fabricating advanced node field effect transistors using a replacement metal gate process. The method includes dopant a high-k dielectric directly or indirectly by using layers composed of multi-layer thin film stacks, or in other embodiments, by a single blocking layer. ... International Business Machines

12/01/16 / #20160351448

Critical dimension shrink through selective metal growth on metal hardmask sidewalls

A method for fabricating a self-aligned via structure includes forming a tri-layer mask on an ild layer over a lower metal wiring layer, the tri-layer mask includes first and second insulating layers and a metal layer in between the insulating layers; defining a trench pattern through the first insulating layer and metal layer, the trench pattern having a first width; defining a first via pattern in a lithographic mask over the trench pattern, the first via pattern having a second width that is larger than the first width; growing a metal capping layer on an exposed sidewall of the trench pattern to decrease the first width to a third width that defines a second via pattern; transferring the trench pattern into the ild layer to form a trench; and transferring the second via pattern through the ild layer and into the metal wiring layer to form a via.. . ... International Business Machines

12/01/16 / #20160351447

Critical dimension shrink through selective metal growth on metal hardmask sidewalls

A method for fabricating a self-aligned via structure includes forming a tri-layer mask on an ild layer over a lower metal wiring layer, the tri-layer mask includes first and second insulating layers and a metal layer in between the insulating layers; defining a trench pattern through the first insulating layer and metal layer, the trench pattern having a first width; defining a first via pattern in a lithographic mask over the trench pattern, the first via pattern having a second width that is larger than the first width; growing a metal capping layer on an exposed sidewall of the trench pattern to decrease the first width to a third width that defines a second via pattern; transferring the trench pattern into the ild layer to form a trench; and transferring the second via pattern through the ild layer and into the metal wiring layer to form a via.. . ... International Business Machines

12/01/16 / #20160351439

Aspect ratio for semiconductor on insulator

A method comprises forming one or more fins in a first region on an insulated substrate. The method also comprises forming one or more fins formed in a second region on the insulated substrate. ... International Business Machines

12/01/16 / #20160351397

Silicon germanium-on-insulator formation by thermal mixing

A layer of amorphous silicon is formed on a germanium-on-insulator substrate, or a layer of germanium is formed on a silicon-on-insulator substrate. An anneal is then performed which causes thermal mixing of silicon and germanium atoms within one of the aforementioned structures and subsequent formation of a silicon germanium-on-insulator material.. ... International Business Machines

12/01/16 / #20160351394

Embedded gallium-nitride in silicon

A method and structure for integrating gallium nitride into a semiconductor substrate. The method may also include means for isolating the gallium nitride from the semiconductor substrate.. ... International Business Machines

12/01/16 / #20160351391

Semiconductor nanowire fabrication

Methods are provided for fabricating semiconductor nanowires on a substrate. A nanowire template is formed on the substrate. ... International Business Machines

12/01/16 / #20160351386

Embedded gallium-nitride in silicon

A method and structure for integrating gallium nitride into a semiconductor substrate. The method may also include means for isolating the gallium nitride from the semiconductor substrate.. ... International Business Machines

12/01/16 / #20160351218

Tape head assembly for linear tape

A tape head assembly includes a set of data readers configured to simultaneously read data from a set of adjacent data tracks of a tape storage medium, each data track having a width; wherein the width of each data reader of the set along a lateral extension of the tape head assembly is equal to or less than the width of a data track wherein the lateral extension of the tape head assembly is orthogonal to a longitudinal extension of the tape storage medium when arranged in a tape drive containing the tape head assembly spanning at least the set of data tracks during reading; and a servo reader arrangement containing at least one servo reader arranged laterally offset from one of the data readers by less than the width of a data track.. . ... International Business Machines

12/01/16 / #20160350970

Method to optimize the visualization of a map's projection based on data and tasks

A method and system for generating a map using a computer is based on data and weighted factors to minimize corresponding projection distortions. The method and system includes determining visualization goals from analyzing a set of datasets for a map using the computer. ... International Business Machines

12/01/16 / #20160350937

Cellular phone based optical detection of specific nucleic acid sequences

A technique relates to determining a presence of a known nucleic acid sequence of a known molecule in a sample. A sample surface is coated with a select segment of the known molecule. ... International Business Machines

12/01/16 / #20160350813

Product recommendations based on analysis of social experiences

A method for recommending products. The method may include receiving an identification element associated with an image or a visual code captured by a user. ... International Business Machines

12/01/16 / #20160350697

Just in time learning driven by point of sale or other data and metrics

A method and system are provided. The method includes monitoring, by a processor-based monitoring device, work metrics, indicative of work performance, of a plurality of users. ... International Business Machines

12/01/16 / #20160350696

Integrating dynamic interpersonal relationships in an organization hierarchy

To determine resource utilization in an organization, a portion describing an interaction between a first participant and a second participant is identified in a human-readable content of a message. Using nlp, the portion is analyzed to extract a verb and a subject corresponding to the interaction. ... International Business Machines

12/01/16 / #20160350694

Implementing workflow based on social network nodes

A work process may be implemented based on social and enterprise networks. Candidate workers involved in the work process may be identified. ... International Business Machines

12/01/16 / #20160350692

Measuring change in software developer behavior under pressure

In one aspect, a method for detecting changes in behavior of developers in a software development process is provided which includes the steps of: using a frequency of a number of daily software commits (nc) and an average number of files submitted per software commit (nf) to detect when given instances of (nc, nf) are below a first predetermined threshold, which is a first indicator of developer behavior under pressure; using, for comparison, an average number of messages exchanged daily by members of a plurality of software development teams to detect when a number of messages exchanged daily by members of a given software development team is below a second predetermined threshold, which is a second indicator of the developer behavior under pressure; and generating an alert if either the first indicator or the second indicator of the developer behavior under pressure occurs.. . ... International Business Machines

12/01/16 / #20160350690

Just in time learning driven by point of sale or other data and metrics

A method and system are provided. The method includes monitoring, by a processor-based monitoring device, work metrics, indicative of work performance, of a plurality of users. ... International Business Machines

12/01/16 / #20160350686

Implementing workflow based on social network nodes

A work process may be implemented based on social and enterprise networks. Candidate workers involved in the work process may be identified. ... International Business Machines

12/01/16 / #20160350674

Intelligent service request classification and assignment

Approaches presented herein enable intelligent service request classification and assignment learning. More specifically, a request comprising a free form text or spoken description is received from a user. ... International Business Machines

12/01/16 / #20160350647

Neuron peripheral circuits for neuromorphic synaptic memory array based on neuron models

A neuromorphic memory system including neuromorphic memory arrays. The neuromorphic memory system includes a presynaptic neuron circuit coupled to a postsynaptic neuron circuit by a resistive memory cell. ... International Business Machines

12/01/16 / #20160350643

Neuron peripheral circuits for neuromorphic synaptic memory array based on neuron models

A neuromorphic memory system including neuromorphic memory arrays. Each neuromorphic memory array includes rows and columns of neuromorphic memory cells. ... International Business Machines

12/01/16 / #20160350619

Scalable image distribution in virtualized server environments

A method and system include replicating an image representing a sequence of bytes on a local storage medium on a target device by determining a similarity between images and reconstructing a new image using equivalent blocks from one or more similar images locally available on the target device or available on donor devices to reduce network link usage and transfer time in replicating the image.. . ... International Business Machines

12/01/16 / #20160350600

Visual monitoring of queues using auxillary devices

Methods and system are provided for monitoring a queue. A method includes receiving by sensors a non-visual identifier at predefined locations of a queue. ... International Business Machines

12/01/16 / #20160350542

Security with respect to managing a shared pool of configurable computing resources

Disclosed aspects include management of a shared pool of configurable computing resources having a first region and a second region. Using an analysis technique such as a heuristic technique, an asset is accessed for processing of a transfer of the asset from the first region to the second region. ... International Business Machines

12/01/16 / #20160350533

Reducing delays associated with restoring quarantined files

A method to reduce delays associated with restoring quarantined files is disclosed. In one embodiment, such a method includes maintaining, for a file, a “current” pointer pointing to a current copy of the file and a “backup” pointer pointing to a virus-free backup copy of the file. ... International Business Machines

12/01/16 / #20160350508

Recommending available medication based on symptoms

Medication can be recommended by a computer system that receives symptoms and can access available medications. A profile for the symptoms is used to determine medications that can be used to treat the symptoms. ... International Business Machines

12/01/16 / #20160350499

System and method for optimizing allocation of medical units for patient treatment

A method for optimizing allocation of surgical resources includes receiving a set of input parameters including a schedule of operating room availability, a list of surgery departments, and a list of patients waiting for surgery. Historical operating room usage data and historical patient waiting list data are received. ... International Business Machines

12/01/16 / #20160350498

Fraud detection based on assessment of physicians' activity

A computer-implemented method, computerized apparatus and computer program product for detecting fraud based on assessment of phyisicians' activity. An automatic diagnostic tool is applied to a benchmark of cases of a physician to diagnose whether a predetermined procedure is required. ... International Business Machines

12/01/16 / #20160350497

Statistical tool for assessment of physicians

A computer-implemented method, computerized apparatus and computer program product for providing performance feedback to physicians. An automatic diagnostic tool is applied to a benchmark of cases of a physician to diagnose whether a predetermined medical procedure is required. ... International Business Machines

12/01/16 / #20160350466

Method and system for template pattern optimization for dsa patterning using graphoepitaxy

A method for design template pattern optimization, comprises receiving a design for a fin field effect transistor (finfet) device, wherein the design includes a configuration of fins, creating a design template pattern for the design for use in connection with directed self-assembly (dsa) patterning using graphoepitaxy, and optimizing the design template pattern to minimize pattern density gradients, wherein the design template pattern includes a plurality of guiding lines for guiding a block-copolymer deposited during the dsa patterning and the optimizing comprises altering the guiding lines.. . ... International Business Machines

12/01/16 / #20160350465

Method and system for template pattern optimization for dsa patterning using graphoepitaxy

A method for design template pattern optimization, comprises receiving a design for a fin field effect transistor (finfet) device, wherein the design includes a configuration of fins, creating a design template pattern for the design for use in connection with directed self-assembly (dsa) patterning using graphoepitaxy, and optimizing the design template pattern to minimize pattern density gradients, wherein the design template pattern includes a plurality of guiding lines for guiding a block-copolymer deposited during the dsa patterning and the optimizing comprises altering the guiding lines.. . ... International Business Machines

12/01/16 / #20160350464

Automating a microarchitecture design exploration environment

In a computing system running an environment for designing operation of circuitry, at least the following are performed for providing simulations and evaluations of one or more user-defined modules of circuitry including one or more pipeline stages in a pipeline. A model of the pipeline is automatically generated by using a pipeline block diagram, where the model is generated in a high-level modeling language able to perform simulations of circuitry with the pipeline. ... International Business Machines

12/01/16 / #20160350460

Bounded domain modeling with specified boundary conditions and mass balancing

Computational fluid dynamics modeling of a bounded domain is provided which includes solving iteratively a computational fluid dynamics model of the bounded domain using mass flow boundary conditions that are specified. The solving includes automatically adjusting the specified mass flow boundary conditions for at least one iteration of the solving. ... International Business Machines

12/01/16 / #20160350459

Cfd modeling of a bounded domain with viscous region partitioning

A hybrid computational fluid dynamics (cfd) approach is provided for modeling a bounded domain by processing the domain to automatically locate a viscous region(s) therein by: dividing the domain into cells and determining flow characteristic values for the cells; defining characteristic cutoff values using multiple cutoff percentiles of cells and the flow characteristic values, and defining ranges between the cutoff values, and respective χ values, where one χ value is a highest χ value r; assigning χ values to cells based on the determined flow characteristic values in comparison to the cutoffs; selectively increasing the assigned χ value of a cell(s) where the cell(s) shares a border with a seed cell having χ value r; identifying a viscous region where multiple contiguous cells have assigned χ values equal or greater than a threshold; evaluating the viscous region(s) by performing viscous domain solve; and providing a model of the domain using results of the viscous domain solve.. . ... International Business Machines

12/01/16 / #20160350457

Bounded domain modeling with specified boundary conditions and mass balancing

Computational fluid dynamics modeling of a bounded domain is provided which includes solving iteratively a computational fluid dynamics model of the bounded domain using mass flow boundary conditions that are specified. The solving includes automatically adjusting the specified mass flow boundary conditions for at least one iteration of the solving. ... International Business Machines

12/01/16 / #20160350456

Cfd modeling of a bounded domain with viscous region partitioning

A hybrid computational fluid dynamics (cfd) approach is provided for modeling a bounded domain by processing the domain to automatically locate a viscous region(s) therein by: dividing the domain into cells and determining flow characteristic values for the cells; defining characteristic cutoff values using multiple cutoff percentiles of cells and the flow characteristic values, and defining ranges between the cutoff values, and respective χ values, where one χ value is a highest χ value r; assigning χ values to cells based on the determined flow characteristic values in comparison to the cutoffs; selectively increasing the assigned χ value of a cell(s) where the cell(s) shares a border with a seed cell having χ value r; identifying a viscous region where multiple contiguous cells have assigned χ values equal or greater than a threshold; evaluating the viscous region(s) by performing viscous domain solve; and providing a model of the domain using results of the viscous domain solve.. . ... International Business Machines

12/01/16 / #20160350451

High-speed latch circuits by selective use of large gate pitch

An apparatus for storing data includes a latch circuit comprising a first set of transistors that propagate an input signal to an output signal and a second set of transistors that do not propagate the input signal of the latch circuit to the output signal wherein a gate pitch for the first set of transistors is substantially greater than a gate pitch for the second set of transistors. Also disclosed herein, a method for improving circuit performance includes receiving an electronic representation of a plurality of latching circuits associated with a design file and increasing transistor gate pitch for selected transistors of the plurality of latching circuits, wherein the selected transistors comprise transistors that propagate an input signal to an output signal. ... International Business Machines

12/01/16 / #20160350443

Mining relevant approximate subgraphs from multigraphs

A mechanism is provided in a data processing system for extracting subgraphs from a multigraph with approximation. The mechanism receives a multigraph and a relevance function and a pattern generation component executing within the data processing system searches the multigraph for occurrences of at least one pattern based on an approximation function. ... International Business Machines

12/01/16 / #20160350441

Authoring system for assembling clinical knowledge

Embodiments of the invention relate to ranking of data and retrieval of data or relationships of the data responsive to the ranking. A data model is represented as a graph, with edges in the graph linking related concepts, and an assertion represented in the graph as a reified n-ary relation. ... International Business Machines

12/01/16 / #20160350436

Managing object identifiers

A method, system, and computer program product for managing an object related to a plurality of groups of users is disclosed. The method, system, and computer program product include utilizing identifiers of objects so that a requesting user can submit an object-request for access to the object utilizing a chosen identifier of the user. ... International Business Machines

12/01/16 / #20160350435

System and method for data-driven web page navigation control

A system and method for web application navigation control includes updating navigation data models used in navigation constraints with received data from an end-user or system. Without needing a centralized application-specific controller, from a collection of extensible navigation rules associated with each page of a plurality of pages, the extensible navigation rules are automatically selected which depend on changed data values and need re-evaluation. ... International Business Machines

12/01/16 / #20160350431

Locating previously communicated electronic messages

Embodiments of the present invention provide an approach for locating previously communicated electronic messages (e.g., emails, etc.). The request is initiated by a first party on behalf of a second party. ... International Business Machines

12/01/16 / #20160350427

Filter optimizer for data streams

Embodiments of the preset disclosure include a method, a system, and a computer program product for rearranging a set of filters within a data streams environment. The method includes setting a first filter ordering of two or more filter processing elements. ... International Business Machines

12/01/16 / #20160350424

Publish-subscribe system with reduced data storage and transmission requirements

A publish-subscribe data messaging system in which wildcard subscriptions are represented in an approximate membership set or filter, such as a bloom filter, for distribution to brokers together with formatting rules associated with the wildcard subscriptions, where a broker receiving a publication topic of a data publication for distribution to other brokers uses the formatting rules provided by any given broker to create wildcard versions of the publication topic for matching with the wildcard subscriptions that are represented in the approximate membership sets or filters provided by the given brokers, where, if a match exists, the data publication is forwarded to the given broker.. . ... International Business Machines

12/01/16 / #20160350423

Optimizing web crawling through web page pruning

Crawling computer-based documents by performing static analysis on a computer-based document to identify within the computer-based document one or more execution vectors, where each execution vector includes a computer program segment including a call to an entity that is external to the computer-based document, and one or more additional computer program segments whose execution precedes and leads ultimately to execution of the computer program segment that includes the call to the entity, and causing any of the computer program segments in any of the execution vectors to be executed during a crawling of the computer-based document, and any computer program segment within the computer-based document that is excluded from the execution vectors to be excluded from execution during the crawling of the computer-based document.. . ... International Business Machines

12/01/16 / #20160350410

Context-dependent evidence detection

A method comprising using at least one hardware processor for: receiving a context; identifying evidence with respect to the context in at least one content resource, wherein the identifying comprises: identifying context-free features that generally characterize evidence in the at least one content resource, and identifying context features indicative of the relevance of text segments in the at least one content resource to the context; and outputting a list of said identified evidence.. . ... International Business Machines

12/01/16 / #20160350407

Detecting overnegation in text

Detecting overnegation in text is provided. A plurality of word lists are compiled. ... International Business Machines

12/01/16 / #20160350406

User interface for a query answering system

A method, system or computer usable program product for utilizing a dialectical model for providing an answer to a user query including applying nlp to the query to generate a first set of nlp structures; generating a contrary set of nlp structures contrary to the user query; evaluating the first set of nlp structures to identify a first set of evidence; evaluating the contrary set of nlp structures to identify a second set of evidence; evaluating a first set of hypotheses from the first set of nlp structures and a contrary set of hypotheses from the contrary set of nlp structures to determine a set of answers to the user query; summarizing the set of answers including indicating derivation thereof; and providing the summarized set of answers to the user.. . ... International Business Machines

12/01/16 / #20160350403

Detecting overnegation in text

Detecting overnegation in text is provided. A plurality of word lists are compiled. ... International Business Machines

12/01/16 / #20160350390

Post-migration validation of etl jobs and exception management

Handling extract-transform-load (etl) job mismatches as “exceptions.” exception handling may include the following steps: (i) determining a mismatch while running an extract-transform-load job with the mismatch being a mismatch of at least one of the following types: design time information mismatch, and/or operational metadata mismatch; and (ii) responsive to determining the mismatch, handling the mismatch as an exception.. . ... International Business Machines

12/01/16 / #20160350384

Mining relevant approximate subgraphs from multigraphs

A mechanism is provided in a data processing system for extracting subgraphs from a multigraph with approximation. The mechanism receives a multigraph and a relevance function and a pattern generation component executing within the data processing system searches the multigraph for occurrences of at least one pattern based on an approximation function. ... International Business Machines

12/01/16 / #20160350381

Filter optimizer for data streams

Embodiments of the preset disclosure include a method, a system, and a computer program product for rearranging a set of filters within a data streams environment. The method includes setting a first filter ordering of two or more filter processing elements. ... International Business Machines

12/01/16 / #20160350379

Search results based on a search history

Aspects relate to improving search results based on a search history. Searches performed by a user are monitored to collect search data. ... International Business Machines

12/01/16 / #20160350377

Estimating the cost of data-mining services

The cost of data-mining is estimated where data-mining services are delivered via a distributed computing system environment. System requirements are estimated for a particular data-mining task for an input data set having specified properties. ... International Business Machines

12/01/16 / #20160350376

Estimating the cost of data-mining services

The cost of data-mining is estimated where data-mining services are delivered via a distributed computing system environment. System requirements are estimated for a particular data-mining task for an input data set having specified properties. ... International Business Machines

12/01/16 / #20160350373

Database statistics based on transaction state

A computer-implemented method for determining a query execution plan based on transaction state may include determining that a first set of database values in a database table are in a committed transaction state and that a second set of database values in the database table are in an uncommitted transaction state. In response to the determining, the first set of database values may have a first set of statistics generated and the second set of database values may have a second set of statistics generated. ... International Business Machines

12/01/16 / #20160350372

Eigenvalue-based data query

Embodiments relate to an eigenvalue-based data query. An aspect includes receiving a query request that includes a query statement. ... International Business Machines

12/01/16 / #20160350370

Search results based on a search history

Aspects relate to improving search results based on a search history. Searches performed by a user are monitored to collect search data. ... International Business Machines

12/01/16 / #20160350354

Tracking changes among similar documents

In one embodiment, an information processing apparatus includes a calculation section, an identification section, and a notification section. The calculation section is configured to calculate similarity among a plurality of documents. ... International Business Machines

12/01/16 / #20160350351

In-place updates with concurrent reads in a decomposed state

A method includes setting, by an update processor, a write latch in a first data structure associated with an object. The first data structure is copied to a storage structure. ... International Business Machines

12/01/16 / #20160350338

Enabling collaborative development of a database application across multiple database management systems

An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (ddct), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (dbms). ... International Business Machines

12/01/16 / #20160350332

Individualized on-demand image information acquisition

A user input is detected at a location within a content rendering user interface within which an image is rendered on a display screen. An object is identified, in real time using image recognition technology, within a portion of the rendered image at the location within the content rendering user interface. ... International Business Machines

12/01/16 / #20160350327

File path modification based management

A method for synchronizing file paths associated with computer files based on file path modifications is provided. The method may include detecting a file path modification to a referenced file path associated with a computer file. ... International Business Machines

12/01/16 / #20160350322

File path modification based management

A method for synchronizing file paths associated with computer files based on file path modifications is provided. The method may include detecting a file path modification to a referenced file path associated with a computer file. ... International Business Machines

12/01/16 / #20160350281

Information extraction in a natural language understanding system

A method of extracting information from text within a natural language understanding system can include processing a text input through at least one statistical model for each of a plurality of features to be extracted from the text input. For each feature, at least one value can be determined, at least in part, using the statistical model associated with the feature. ... International Business Machines

12/01/16 / #20160350279

Utilizing a dialectical model in a question answering system

A method, system or computer usable program product for utilizing a dialectical model for providing an answer to a user query including receiving a query from a user; applying nlp to the query to generate a first set of nlp structures; generating a contrary set of nlp structures contrary to the user query; evaluating the first set of nlp structures to identify a first set of evidence; evaluating the contrary set of nlp structures to identify a second set of evidence; evaluating a first set of hypotheses from the first set of nlp structures based by the first and second set of evidence, and a contrary set of hypotheses from the contrary set of nlp structures based by the first and second set of evidence, to determine a set of answers to the user query; and providing the set of answers to the user.. . ... International Business Machines

12/01/16 / #20160350278

Claim polarity identification

A method comprising using at least one hardware processor for: receiving (a) a proposition and (b) a plurality of claims; identifying a local claim polarity of each claim of the plurality of claims with respect to the proposition; calculating a pairwise claim polarity agreement score for each pair of claims of the pairs of claims reflecting the likelihood of said each pair of claims to have the same claim polarity, wherein the pairwise claim polarity agreement score is associated with each claim of the pair of claims; and determining a global claim polarity for each claim of the plurality of claims based on the local claim polarity of the claim and pairwise claim polarity agreement scores associated with said each claim.. . ... International Business Machines

12/01/16 / #20160350275

Measuring transitions between visualizations

System, method, and computer program product for measuring transitions between visualizations, the method comprising identifying data fields represented in a first visualization and one or more presentation characteristics for the data fields represented in the first visualization, identifying data fields represented in a second visualization and one or more presentation characteristics for the data fields represented in the second visualization, determining a plurality of transition scores, wherein each transition score represents a difference or similarity between the first and second visualizations, relative to either the identified data fields or the presentation characteristics, and generating a composite measure of transition between the first and second visualizations from the plurality of transition scores.. . ... International Business Machines

12/01/16 / #20160350268

Smarter electronic reader

Embodiments of the present invention provide methods, computer program products, and systems for enriching and customizing one or more portions of textual content. Embodiments of the present invention analyze one or more portions of the textual content and customize the textual content based on preferences of a user interacting with the textual content. ... International Business Machines

12/01/16 / #20160350267

Structured document bounding language

Using a bounding language to control or restrict the changes that can be made to contents of a structured document (e.g., a document encoded in the extensible markup language, or “xml”), and also includes the bounding language and documents encoded according to the bounding language. A document type definition (“dtd”) is defined as a “bounding dtd”, and one or more structured documents containing editing restrictions are defined according to this dtd. ... International Business Machines

12/01/16 / #20160350266

Document compression with neighborhood biased pixel labeling

To compress a document, a number of edges present in a selected portion of the document are counted to determine whether the number of edges exceeds a threshold. When the number of edges exceeds the threshold, a pixel is selected from the portion and a set of neighboring pixels is identified for the pixel. ... International Business Machines

12/01/16 / #20160350226

In-memory caching with on-demand migration

For on-demand migration of data in a distributed memory storage configuration, an identifier is transformed at a client into a transformed identifier. From a current configuration of a first plurality of servers operating on a server-side at a current time, a current server is identified at the client. ... International Business Machines

12/01/16 / #20160350213

Analytics based control of thin provisioning environment

Data storage using application storage analytics that: (i) runs a set of application(s) that use a thin provision data storage device for data storage; (ii) determines a set of runtime behavior(s) of the set of applications(s) with respect to use of the thin provisioning data storage device for data storage; and (iii) calculates a runtime representation capacity based on a predetermined over-provisioning ratio and the set of runtime behavior(s).. . ... International Business Machines

12/01/16 / #20160350210

Detecting error states when interacting with web applications

Detecting error states when interacting with web applications is performed by accessing a first web page of a web application, determining that the first web page includes an input validation operation, configuring an input to cause the input validation operation to effect an error state, providing the input to the first web page, thereby effecting the error state, identifying a feature that is absent from the first web page before the input is provided to the first web page and present in the first web page after the input is provided to the first web page, and detecting that a second web page of the web application is in an error state if the feature is present in the second web page.. . ... International Business Machines

12/01/16 / #20160350208

Generating test scripts through application integration

Provided are techniques for parsing a pre-existing test script for a graphical user interface (gui) to identify a first gui action in a first line of the pre-existing test script; parsing a model associated with the gui to identify gui actions and associated elements for the gui actions in the model; identifying a corresponding element for the first gui action in a second line, following the first line, that are identified by keywords and associated parameters that exist in the pre-existing test script and match actions in the model; identifying gui actions in the pre-existing test script that match gui actions in the model; and generating a new test script by adding the first gui action and corresponding element to the pre-existing test script.. . ... International Business Machines

12/01/16 / #20160350207

Generation of test scenarios based on risk analysis

Embodiments include a method for generation of test scenarios based on risk analysis. The method includes receiving a first set of code test scenarios, the first set of code test scenarios configured to test one or more first code components, the first code components each including first code attributes. ... International Business Machines

12/01/16 / #20160350206

Employing code overlays to facilitate software development

In one embodiment, a method for editing and testing computer programming code is provided. The method includes receiving a first file comprising computer programming code, and a first code overlay comprising one or more modifications to be applied to the computer programming code of the first file. ... International Business Machines

12/01/16 / #20160350203

Identifying cause of incidents in the devops environment automatically

In one aspect, a method for identifying software development teams causing operation incidents when changing and deploying code is provided. The method includes the steps of: collecting data regarding i) a number of deployed change requests for each of the software development teams and ii) a total number of incident reports; generating a time series for the number of deployed change requests for each of the software development teams and a time series for the total number of incident reports created; performing causality testing between the time series for the number of deployed change requests for each of the software development teams and the time series for the total number of incident reports created; and determining whether the total number of incident reports created can be expressed in terms of the number of deployed change requests for any of the software teams.. ... International Business Machines

12/01/16 / #20160350201

Etl data flow design assistance through progressive context matching

The present disclosure provides a method and apparatus for re-using existing data flow design jobs in a data integration design environment (ide). An example method generally includes receiving input placing one or more data flow operators on a design canvas of the ide, searching a database of existing data flow job designs for existing data flow job designs that include the one or more data flow operators, and displaying a list of the existing data flow job designs that include the one or more data flow operators.. ... International Business Machines

12/01/16 / #20160350200

Performance enhancement mode selection tool

A computer-implemented method of reducing impact of performance data gathering on execution of instrumented code comprises gathering respective performance data for each of a plurality of routines in the instrumented code over a plurality of execution instances of the instrumented code. The method also comprises determining that the gathered performance data for the at least one selected routine follows an identified pattern for at least one selected routine from the plurality of routines and, in response to determining that the at least one selected routine follows an identified pattern, removing instrumentation associated with the at least one selected routine.. ... International Business Machines

12/01/16 / #20160350195

Frequency-domain high-speed bus signal integrity compliance model

Embodiments of the present disclosure provide apparatus for testing channel compliance. The apparatus generally performs operations that includes identifying at least one design criteria and determining boundary sets of frequency domain parameters for compliant signal channels known to achieve the design criteria. ... International Business Machines

12/01/16 / #20160350189

Increasing disaster resiliency by having a pod backed up to other peer pods in a site or beyond

Increasing disaster resiliency in one aspect may comprise running an optimization algorithm that simultaneously solves for at least a first objective to increase a spread of a backup of virtual machines from a given site onto other sites in proportion to an amount of available space for backup at each site, a second objective to increase a number of backups at one or more of the other sites with low probability of system crash while reducing backups at one or more of the other sites with higher probability of system crash, and a third objective to minimize a violation of recovery time objectives of the virtual machines during recovery. One or more backup sites and one or more recovery sites in an event the given site crashes may be determined based on a solution of the optimization algorithm.. ... International Business Machines

12/01/16 / #20160350186

First responder parities for storage array

Embodiments relate to correcting erasures in a storage array. An aspect includes dividing data into a plurality of stripes for storage in a storage array comprising a plurality of storage locations, each stripe comprising m rows and n columns, each of the m rows including a number r of row parities, wherein r is greater than zero. ... International Business Machines

12/01/16 / #20160350174

Salvaging lock elision transactions with instructions to change execution type

A transactional memory system salvages a hardware lock elision (hle) transaction. A processor of the transactional memory system, based on a detection of a pending point-of-failure in a code region during hle transactional execution, stops hle transactional execution prior to the pending point-of-failure in the code region. ... International Business Machines

12/01/16 / #20160350159

Efficient critical thread scheduling for non-privileged thread requests

An operating system interface, responsive to detecting a non-privileged thread request with a scheduling attribute set to a critical setting to request access to at least one privileged core, selectively schedules the non-privileged thread request into a privileged core queue associated with the at least one privileged core only when a resource availability of the at least one privileged class core meets a threshold level of availability, the at least one privileged core providing a higher throughput than at least one regular core. The operating system interface, responsive to detecting a privileged thread request with the scheduling attribute set to the critical setting, automatically scheduling the privileged thread request into the privileged core queue.. ... International Business Machines

12/01/16 / #20160350158

Efficient critical thread scheduling for non-privileged thread requests

An operating system interface, responsive to detecting a non-privileged thread request with a scheduling attribute set to a critical setting to request access to at least one privileged core, selectively schedules the non-privileged thread request into a privileged core queue associated with the at least one privileged core only when a resource availability of the at least one privileged class core meets a threshold level of availability, the at least one privileged core providing a higher throughput than at least one regular core. The operating system interface, responsive to detecting a privileged thread request with the scheduling attribute set to the critical setting, automatically scheduling the privileged thread request into the privileged core queue.. ... International Business Machines

12/01/16 / #20160350155

Synthesizing inputs to preserve functionality

A computer implemented method of preserving functionality in a computer program by generating customized mock inputs may include identifying a set of functionalities of the computer program, where a first functionality has a first input, and a second functionality has a second input. The method may also include determining a first and a second constraint respectively on the first and second inputs, where the first constraint defines a set of values of the first input which enables the first functionality, and the second constraint defines a set of values of the second input which enables the second functionality. ... International Business Machines

12/01/16 / #20160350144

Updating networks with migration information for a virtual machine

Methods, computer program products, and network authority devices are presented.