Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

IBM patents (2018 archive)


Recent patent applications related to IBM. IBM is listed as an Agent/Assignee. Note: IBM may have other listings under different names/spellings. We're not affiliated with IBM, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | IBM-related inventors


Solderless breadboard

Embodiments of the invention provide a solderless breadboard for prototyping electrical circuits. The breadboard includes a plurality of electrically conductive lines arranged parallel to each other on an electrically non-conductive breadboard structure. ... International Business Machines Corporation

Real-time modifiable text captioning

An approach to modifying text captioning is provided, comprising receiving, by a captioning modifier program, input data associated with a video stream, analyzing, by the captioning modifier program, the input data, altering, by the captioning modifier program, text captioning associated with the video stream to indicate eventful aspects based on an analysis of the input data and generating, by the captioning modifier program, supplementary information associated with the video stream based on the analysis and providing the supplementary information as an addition to the text captioning.. . ... International Business Machines Corporation

Real-time modifiable text captioning

An approach to modifying text captioning is provided, comprising receiving, by a captioning modifier program, input data associated with a video stream, analyzing, by the captioning modifier program, the input data, altering, by the captioning modifier program, text captioning associated with the video stream to indicate eventful aspects based on an analysis of the input data and generating, by the captioning modifier program, supplementary information associated with the video stream based on the analysis and providing the supplementary information as an addition to the text captioning.. . ... International Business Machines Corporation

Real-time modifiable text captioning

An approach to modifying text captioning is provided, comprising receiving, by a captioning modifier program, input data associated with a video stream, analyzing, by the captioning modifier program, the input data, altering, by the captioning modifier program, text captioning associated with the video stream to indicate eventful aspects based on an analysis of the input data and generating, by the captioning modifier program, supplementary information associated with the video stream based on the analysis and providing the supplementary information as an addition to the text captioning.. . ... International Business Machines Corporation

Individualized dynamic insertion of secondary content in live streaming

During a live stream of a main content to a user, a biometric response of the user is measured during a first streamed portion of the main content. The biometric response is analyzed to detect an event in the first streamed portion of the main content. ... International Business Machines Corporation

Suggestion of visual effects based on detected sound patterns

Disclosed embodiments provide techniques for suggesting a visual effect based on detected sounds. The sounds can be speech and/or music. ... International Business Machines Corporation

System, method and computer program product for contextual focus/zoom of event celebrities

A contextual zoom control method, system, and computer program product, includes detecting faces in an area of interest when a user is performing an image capturing action, extracting a facial image for each of a set of key individuals attending an event where the user is performing the image capturing action, creating a ranked list of the set of key individuals according to a predetermined parameter of each key individual, pairing each detected face with a matching extracted facial image to label an identity of each key individual in the area of interest, and in a single individual capturing mode, performing a camera function to assist the user in performing the image capturing action on the identity that is paired with a highest ranked individual on the ranked list within the area of interest.. . ... International Business Machines Corporation

Displaying context in group chats using member tagging

Group chat communication can include receiving, using a processor, a first message in a group chat having members, wherein the first message is from a first member of the group chat and specifies a second member of the group chat, distributing, using the processor, the first message to the members of the group chat, and, in response to receiving the first message and using the processor, causing a group chat window of the second member to display a first callout. The group chat window of the second member is configured to display a plurality of chronologically ordered messages posted by the members of the group chat. ... International Business Machines Corporation

Method of label transform for managing heterogeneous information

Techniques are disclosed herein for normalizing heterogeneous information provided in labels processed by internet of things (iot) devices. A label transform assistant service receives a request from an iot device to translate content associated with a label of an item to a format readable by the device. ... International Business Machines Corporation

Management and utilization of data volumes in a converged system

A computer-implemented method according to one embodiment includes identifying a request to create a consumer within a converged system, defining the consumer within a hierarchy of consumers, where the consumer represents a function in an organization, setting a storage capacity attribute for the consumer, and conditionally defining a data volume for the consumer, based at least in part on the storage capacity attribute.. . ... International Business Machines Corporation

Swapping non-virtualizing and self-virtualizing devices

A computer in a cloud computing environment includes a virtualization instance (vi) providing cloud services to a consumer device. The computer includes non-virtualizing and self-virtualizing type devices. ... International Business Machines Corporation

Distributed load-balancing for software defined networks

A load-balancer instance is instantiated in a network virtualization edge (nve) in a software defined network (sdn). A forwarding table in the nve is modified to indicate that a next hop for a packet having a destination address of the load-balancer instance is to be resolved by the load-balancer instance. ... International Business Machines Corporation

Dns-based in-packet service version tagging

Embodiments of the present communications systems and methods may provide the capability for fast and reliable transitioning between the different versions of the service of the multi-node service deployed in the utility computing system. For example, in an embodiment, a computer-implemented method for data traffic distribution may comprise allocating a plurality of data traffic service network addresses to a load balancer service, wherein each data traffic service network address is associated with a different version of the load balancer service, receiving a plurality of data traffic flows, and distributing each data traffic flow to a version of the load balancer service based on a data traffic service network address of each data traffic flow.. ... International Business Machines Corporation

Local microservice development for remote deployment

Managing microservice function requests is provided. A request originating from a browser of the computer to execute a function corresponding to a microservice locally deployed on the computer is received using a software development kit operating in the computer. ... International Business Machines Corporation

07/12/18 / #20180198842

Address space management with respect to a coherent accelerator processor interface architecture

Disclosed aspects relate to address space management with respect to a coherent accelerator processor interface (capi) architecture. A shared capi component may be established to access a plurality of address spaces of a plurality of assets. ... International Business Machines Corporation

07/12/18 / #20180198840

Address space management with respect to a coherent accelerator processor interface architecture

Disclosed aspects relate to address space management with respect to a coherent accelerator processor interface (capi) architecture. A shared capi component may be established to access a plurality of address spaces of a plurality of assets. ... International Business Machines Corporation

07/12/18 / #20180198837

Streaming api subscription without loss of events

A client facility is provided for establishing a subscription to a streaming service provider, without loss of events. The establishing includes generating, by the client, a subscription request to the streaming service provider of events. ... International Business Machines Corporation

07/12/18 / #20180198836

Intelligent insertion of secondary content in live streaming

From a live streaming of a main content, an already streamed portion of the main content is analyzed to identify an occurrence of a climactic event in the main content. Based on the analysis, a set is constructed of feature values that are representative of the climactic event in the already streamed portion of the main content. ... International Business Machines Corporation

07/12/18 / #20180198831

Proactive chatting and instant messaging group management

In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to determine whether overlap of a first context status of a first user and a second context status of a second user exceeds a predetermined threshold. ... International Business Machines Corporation

07/12/18 / #20180198817

Persistent cross-site scripting vulnerability detection

Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the processor, a read operation executed on a resource using an instrumentation mechanism and returning, via the processor, a malicious script in response to the read operation. ... International Business Machines Corporation

07/12/18 / #20180198816

Forecasting and classifying cyber-attacks using analytical data based neural embeddings

A first collection including an analytical feature vector and a q&a feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. ... International Business Machines Corporation

07/12/18 / #20180198814

Identifying security risks in code using security metric comparison

An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or a defect history, or a combination of the version control history and the defect history. The processor is to also divide the source code into security-related components and security-non-related components. ... International Business Machines Corporation

07/12/18 / #20180198789

Method of proactive object transferring management

Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A mobile device associated with a user detects a communication between that user and another user. ... International Business Machines Corporation

07/12/18 / #20180198783

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A service executing on a cloud platform receives a connection authentication request including authentication data from wearable devices, each associated with a mobile device. ... International Business Machines Corporation

07/12/18 / #20180198781

Digital frame authentication through crowdsourcing

A method, computer program product, and system for authenticating one or more frames includes a processor obtaining the frame(s) from a first client with data indicating a location at which the frame(s) was captured, and data indicating a time at which the frame(s) was captured. The processor identifies a clients of third parties within a pre-defined proximity of the location and at a time within a pre-defined proximity to the time at which the frame(s) was captured. ... International Business Machines Corporation

07/12/18 / #20180198778

Collaborative sign-on

An authentication approval request can be received by a first system from a second system. The first system can determine whether the user is required to be logged into at least a second online account hosted by at least a third system unrelated to the second system in order to approve the authentication request. ... International Business Machines Corporation

07/12/18 / #20180198777

Implementing single sign-on in a transaction processing system

A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. ... International Business Machines Corporation

07/12/18 / #20180198750

Message presentation management in a social networking environment

Disclosed aspects relate to message presentation management in a social networking environment. A message from a source may be detected in the social networking environment. ... International Business Machines Corporation

07/12/18 / #20180198749

Time and sentiment based messaging

In time and sentiment based messaging, a server obtains information for a set of messages from online social networks related to a specified object. The information includes at least a user identifier associated with each message, a time of each message, and content of each message. ... International Business Machines Corporation

07/12/18 / #20180198748

Message presentation management in a social networking environment

Disclosed aspects relate to message presentation management in a social networking environment. A message from a source may be detected in the social networking environment. ... International Business Machines Corporation

07/12/18 / #20180198747

Ensuring that all users of a group message receive a response to the group message

A method, system and computer program product for ensuring that all users of a group message receive a response to the group message. The content of a detected group message is analyzed to determine if the group message requires a response and, if so, to assess the urgency of the response. ... International Business Machines Corporation

07/12/18 / #20180198746

Ensuring that all users of a group message receive a response to the group message

A method, system and computer program product for ensuring that all users of a group message receive a response to the group message. The content of a detected group message is analyzed to determine if the group message requires a response and, if so, to assess the urgency of the response. ... International Business Machines Corporation

07/12/18 / #20180198741

Controlling electronic messaging communication sessions based on document containers

At least one electronic document is requested from one or more participants of the electronic messaging session in accordance with a series of rules that is associated with actions for the messaging session. In response to receiving the requested at least one electronic document into the electronic messaging session, actions associated with the series of rules for the electronic messaging session are performed.. ... International Business Machines Corporation

07/12/18 / #20180198735

Adaptive service chain management

Embodiments of the present invention provide methods, computer program products, and systems for fulfilling a service chain request. Embodiments of the present invention can be used to collect network data of a plurality of instances of services and connections between the plurality of instances of services and redefine service chains to direct flow to an alternative instance of a service responsive to determining that an instance of a service in a service chain has become inaccessible. ... International Business Machines Corporation

07/12/18 / #20180198731

System, method and computer program product for moveable distributed synchronization objects

A resource sharing method, system, and computer program product in a distributed computing environment, includes in response to a first condition, determining a first node on which an access rate of a synchronization object is greatest, storing the synchronization object on the first node for use in synchronizing access to a resource, and in response to a second condition, determining a second node on which an access rate of the synchronization object is greatest, and relocating the synchronization object from a storage on the first node to a storage on the second node.. . ... International Business Machines Corporation

07/12/18 / #20180198730

Resource usage management in a stream computing environment

Disclosed aspects relate to resource usage management in a stream computing environment that includes a set of hosts having a set of processing elements which has a set of stream operators. A first activity indicator may be detected for a first subset of the set of stream operators. ... International Business Machines Corporation

07/12/18 / #20180198729

Resource usage management in a stream computing environment

Disclosed aspects relate to resource usage management in a stream computing environment that includes a set of hosts having a set of processing elements which has a set of stream operators. A first activity indicator may be detected for a first subset of the set of stream operators. ... International Business Machines Corporation

07/12/18 / #20180198703

Holding of a link in an optical interface by a lower level processor until authorization is received from an upper level processor

A lower level processor holds a link, in response to detecting a link down condition of the link. In response to the holding of the link, the lower level processor transmits a command to an upper level processor indicating the link down condition of the link. ... International Business Machines Corporation

07/12/18 / #20180198630

System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger

The system, method, and computer program product described herein may provide the capability to handle a variety of types of transactions, not just payment transactions. In addition, system, method, and computer program product described herein may provide the capability for users to be able to control the confidentiality of their transactions, for the system to control access to transactions, for the system to be capable of auditing transactions, and to provide accountability of the validating entities.. ... International Business Machines Corporation

07/12/18 / #20180198624

Private blockchain transaction management and termination

A blockchain of transactions may be referenced for various purposes and may be later accessed for ledger verification. One example operation may include one or more of identifying a plurality of rules defining a temporary private blockchain, creating a private blockchain block comprising the plurality of rules defining the temporary private blockchain, transmitting an update to a private blockchain block, and designating the temporary private blockchain closed responsive to receiving the update.. ... International Business Machines Corporation

07/12/18 / #20180198596

Determining clock signal quality using a plurality of sensors

Techniques for determining the quality of a clock signal are provided. In one example, a method can comprise comparing, by a sensory circuitry of a system, a first output of a first sensor and a second output of a second sensor. ... International Business Machines Corporation

07/12/18 / #20180198595

Determining clock signal quality using a plurality of sensors

Techniques for determining the quality of a clock signal are provided. In one example, a method can comprise comparing, by a sensory circuitry of a system, a first output of a first sensor and a second output of a second sensor. ... International Business Machines Corporation

07/12/18 / #20180198558

Sequence detector

A sequence detector is provided for detecting symbol values corresponding to a sequence of input samples obtained from a transmission channel. The sequence detector comprises a branch metric unit (bmu), a path metric unit (pmu) and a survivor memory unit. ... International Business Machines Corporation

07/12/18 / #20180198311

Charge management

Disclosed aspects relate to charge management of a device. A first location-modification event of the device may be detected by a charge management engine. ... International Business Machines Corporation

07/12/18 / #20180198307

Charge management

Disclosed aspects relate to charge management of a device. A first location-modification event of the device may be detected by a charge management engine. ... International Business Machines Corporation

07/12/18 / #20180198281

Continuously balancing multiple phases of a power grid

Intermittently re-distributing power from three phases of a power grid connected to power consuming components of a data center by configuring power supply units (psus) which are integrated into each enclosure, two psus per enclosure. The distribution is determined by machine logic to: (i) meet the predicted power requirements of the power consuming components of the data center, and (ii) the use of first phase, second phase and third phase electrical powers is at least approximately in balance.. ... International Business Machines Corporation

07/12/18 / #20180198244

Illuminated latch release for cable

A cable connector is provided. The cable connector includes a housing with a proximal end and a distal end. ... International Business Machines Corporation

07/12/18 / #20180198082

Carbon nanotube field-effect transistor with sidewall-protected metal contacts

A field effect transistor includes a substrate and a gate dielectric formed on the substrate. A channel material is formed on the dielectric layer. ... International Business Machines Corporation

07/12/18 / #20180198071

Intermetallic contact for carbon nanotube fets

A field effect transistor includes a carbon nanotube layer formed adjacent to a gate structure. Two intermetallic contacts are formed on the carbon nanotube layer. ... International Business Machines Corporation

07/12/18 / #20180198070

Intermetallic contact for carbon nanotube fets

A field effect transistor includes a carbon nanotube layer formed adjacent to a gate structure. Two intermetallic contacts are formed on the carbon nanotube layer. ... International Business Machines Corporation

07/12/18 / #20180198058

Double magnetic tunnel junction with dynamic reference layer

A double magnetic tunnel junction (dmtj) device includes a fixed reference layer of a first magnetic material having a perpendicular magnetic anisotropy with a magnetic moment that is fixed. The device also includes a free layer of a second magnetic material having a perpendicular magnetic anisotropy with a magnetic moment that is changeable based on a current. ... International Business Machines Corporation

07/12/18 / #20180198053

Apparatus and method using electro-active polymers and conducting particle interconnects

An apparatus includes an electro-active polymer (eap) structure configured to move, responsive to an electrical field, between a first position and a second position. The apparatus also includes a conductive particle interconnect (cpi) including an elastomeric carrier and conductive particles dispersed therein. ... International Business Machines Corporation

07/12/18 / #20180197992

Stress induction in 3d device channel using elastic relaxation of high stress material

A method for inducing stress in a device channel includes forming a stress adjustment layer on a substrate, the stress adjustment layer including an as deposited stress due to crystal lattice differences with the substrate. A device channel layer is formed on the stress adjustment layer. ... International Business Machines Corporation

07/12/18 / #20180197990

Reduced resistance source and drain extensions in vertical field effect transistors

Semiconductor devices and methods of forming the same include forming a bottom source/drain region in a semiconductor substrate under a semiconductor fin. First charged spacers are formed on sidewalls of the semiconductor fin. ... International Business Machines Corporation

07/12/18 / #20180197989

Reduced resistance source and drain extensions in vertical field effect transistors

Semiconductor devices and methods of forming the same include forming semiconductor fins on a semiconductor substrate. A bottom source/drain region is formed in the semiconductor substrate. ... International Business Machines Corporation

07/12/18 / #20180197965

Low resistivity wrap-around contacts

Low resistivity, wrap-around contact structures are provided in nanosheet devices, vertical fets, and finfets. Such contact structures are obtained by delivering dopants to source/drain regions using a highly conformal, doped metal layer. ... International Business Machines Corporation

07/12/18 / #20180197961

Iii-v mosfet with self-aligned diffusion barrier

A field effect transistor is provided which includes a plurality of fins, at least a portion of a given fin including a respective source region, and a raised source disposed at least partially on the fins and including iii-v material. The field effect transistor further includes a diffusion barrier disposed at least partially on the raised source and including transition metal bonded with silicon or germanium, and a gate stack capacitively coupled at least to the respective source regions of the fins.. ... International Business Machines Corporation

07/12/18 / #20180197953

Co-integration of elastic and plastic relaxation on the same wafer

An n-doped field effect transistor (nfet) section of an integrated device logic region is provided. The nfet section includes a semiconductor substrate, a layer at least partially formed of silicon germanium (sige) disposed on the semiconductor substrate and fin formations. ... International Business Machines Corporation

07/12/18 / #20180197951

Structure comprising a 2-dimensional material

A semiconductor structure is provided including an electrically-conducting substrate and a layer of a two-dimensional material. The structure further includes a solid organic spacer layer arranged between the electrically-conducting substrate and the layer of the two-dimensional material.. ... International Business Machines Corporation

07/12/18 / #20180197946

Grated mim capacitor to improve capacitance

An on-chip metal-insulator-metal (mim) capacitor with enhanced capacitance is provided by forming the mim capacitor along sidewall surfaces and a bottom surface of each trench of a plurality of trenches formed in a back-end-of-the-line (beol) metallization stack to increase a surface area of the mim capacitor.. . ... International Business Machines Corporation

07/12/18 / #20180197945

Leakage current reduction in stacked metal-insulator-metal capacitors

Methods of forming capacitors include forming a dielectric layer on a first metal layer. The dielectric layer is oxygenated such that interstitial oxygen is implanted in the dielectric layer. ... International Business Machines Corporation

07/12/18 / #20180197944

Leakage current reduction in stacked metal-insulator-metal capacitors

Capacitors and methods of forming the same include forming a dielectric layer on a first metal layer. The dielectric layer is oxygenated such that interstitial oxygen is implanted in the dielectric layer. ... International Business Machines Corporation

07/12/18 / #20180197943

Leakage current reduction in stacked metal-insulator-metal capacitors

Capacitors and methods of forming the same include forming a dielectric layer on a first metal layer. The dielectric layer is oxygenated such that interstitial oxygen is implanted in the dielectric layer. ... International Business Machines Corporation

07/12/18 / #20180197941

Metal resistors having varying resistivity

A semiconductor structure is provided that includes a first metal resistor structure located on a portion of a dielectric-containing substrate. The first metal resistor structure includes, from bottom to top, a first nitridized dielectric surface layer portion having a first nitrogen content, a first metal portion, and a first dielectric capping layer portion. ... International Business Machines Corporation

07/12/18 / #20180197940

Resistors with controlled resistivity

The present application provides planar and stacked resistor structures that are embedded within an interconnect dielectric material in which the resistivity of an electrical conducting resistive material or electrical conducting resistive materials of the resistor structure can be tuned to a desired resistivity during the manufacturing of the resistor structure. Notably, a doped metallic insulator layer is formed atop a substrate. ... International Business Machines Corporation

07/12/18 / #20180197939

Resistors with controlled resistivity

The present application provides planar and stacked resistor structures that are embedded within an interconnect dielectric material in which the resistivity of an electrical conducting resistive material or electrical conducting resistive materials of the resistor structure can be tuned to a desired resistivity during the manufacturing of the resistor structure. Notably, a doped metallic insulator layer is formed atop a substrate. ... International Business Machines Corporation

07/12/18 / #20180197938

Tunable resistor with curved resistor elements

A resistor structure is provided that contains curved resistor elements. The resistor structure is embedded within an interconnect dielectric material and the resistivity of an electrical conducting resistive material of the resistor structure can be tuned to a desired resistivity during the manufacturing of the resistor structure. ... International Business Machines Corporation

07/12/18 / #20180197937

Tunable resistor with curved resistor elements

A resistor structure is provided that contains curved resistor elements. The resistor structure is embedded within an interconnect dielectric material and the resistivity of an electrical conducting resistive material of the resistor structure can be tuned to a desired resistivity during the manufacturing of the resistor structure. ... International Business Machines Corporation

07/12/18 / #20180197936

3d resistor structure with controlled resistivity

The present application provides a 3d resistor structure that is embedded within an interconnect dielectric material in which the resistivity of an electrical conducting resistive material of the 3d resistor structure can be tuned to a desired resistivity during the manufacturing of the 3d resistor structure. Notably, a patterned doped metallic insulator is formed straddling over an dielectric pillar. ... International Business Machines Corporation

07/12/18 / #20180197917

High-resistance memory devices

Cross bar array devices and methods of forming the same include first electrodes arranged adjacent to each other and extending in a first direction. Second electrodes are arranged transversely to the first electrodes. ... International Business Machines Corporation

07/12/18 / #20180197915

Integrated magnetic tunnel junction (mtj) in back end of line (beol) interconnects

A method is presented for forming a semiconductor structure. The method includes depositing a barrier layer, such as a tantalum nitride (tan) layer, over a dielectric incorporating magnetic random access memory (mram) regions, forming magnetic tunnel junction (mtj) stacks over portions of the tan layer, patterning and encapsulating the mtj stacks, forming spacers adjacent the mtj stacks, and laterally etching sections of the tan layer, after spacer formation, to form an electrode under the mtj stacks. ... International Business Machines Corporation

07/12/18 / #20180197886

Finfets with various fin height

A device and method of forming a semiconductor circuit having finfet devices that have fins of different height is provided. There is a shallow trench isolation layer (sti) on top of a semiconductor substrate. ... International Business Machines Corporation

07/12/18 / #20180197860

Finfet cmos with silicon fin n-channel fet and silicon germanium fin p-channel fet

A substrate having a silicon region and a silicon germanium region is provided. A first set of fins in the silicon region and a second set of fins in the silicon germanium region is etched into the substrate. ... International Business Machines Corporation

07/12/18 / #20180197858

Structure and method for equal substrate to channel height between n and p fin-fets

A method for fabricating fin field effect transistors comprises creating a pattern of self-aligned small cavities for p-type material growth using at least two hard mask layers, generating a pre-defined isolation area around each small cavity using a vertical spacer, selectively removing n-type material from the self-aligned small cavities, and growing p-type material in the small cavities. The p-type material may be silicon germanium (sige) and the n-type material may be tensile silicon (t-si). ... International Business Machines Corporation

07/12/18 / #20180197842

Optoelectronic chip embedded organic substrate

Optoelectronic devices and method of forming the same include an optoelectronic chip in a substrate layer, the optoelectronic chip having one or more optoelectronic components. An integrated circuit chip is positioned on the substrate layer. ... International Business Machines Corporation

07/12/18 / #20180197805

Surface passivation having reduced interface defect density

Embodiments are directed to a method of passivating a surface of a high-mobility semiconductor and resulting structures having a reduced interface defect density. A semiconductor layer is formed on a substrate. ... International Business Machines Corporation

07/12/18 / #20180197804

Surface passivation having reduced interface defect density

Embodiments are directed to a method of passivating a surface of a high-mobility semiconductor and resulting structures having a reduced interface defect density. A semiconductor layer is formed on a substrate. ... International Business Machines Corporation

07/12/18 / #20180197793

Self-aligned doping in source/drain regions for low contact resistance

Embodiments are directed to a method of forming a semiconductor device and resulting structures having reduced source/drain contact resistance. The method includes forming a first semiconductor fin in a first region of a substrate and a second semiconductor fin in a second region of the substrate. ... International Business Machines Corporation

07/12/18 / #20180197792

Self-aligned doping in source/drain regions for low contact resistance

Embodiments are directed to a method of forming a semiconductor device and resulting structures having reduced source/drain contact resistance. The method includes forming a first semiconductor fin in a first region of a substrate and a second semiconductor fin in a second region of the substrate. ... International Business Machines Corporation

07/12/18 / #20180197788

3d vertical fet with top and bottom gate contacts

A semiconductor device includes a vertical transistor having a gate structure disposed about a channel region thereof. The vertical transistor has a top side above the gate structure and a bottom side below the gate structure. ... International Business Machines Corporation

07/12/18 / #20180197787

3d vertical fet with top and bottom gate contacts

A semiconductor device includes a vertical transistor having a gate structure disposed about a channel region thereof. The vertical transistor has a top side above the gate structure and a bottom side below the gate structure. ... International Business Machines Corporation

07/12/18 / #20180197785

Nanosheet transistors having different gate dielectric thicknesses on the same chip

Embodiments are directed to a method and resulting structures for forming thin and thick gate dielectric nanosheet transistors on the same chip. A first nanosheet stack having a first sacrificial layer between a first nanosheet and a second nanosheet is formed on a substrate. ... International Business Machines Corporation

07/12/18 / #20180197784

Nanosheet transistors having different gate dielectric thicknesses on the same chip

Embodiments are directed to a method and resulting structures for forming thin and thick gate dielectric nanosheet transistors on the same chip. A first nanosheet stack having a first sacrificial layer between a first nanosheet and a second nanosheet is formed on a substrate. ... International Business Machines Corporation

07/12/18 / #20180197780

Field effect transistor including strained germanium fins

In one example, a device includes a p-type field effect transistor region and n-type field effect transistor region. The p-type field effect transistor region includes at least one fin including strained germanium. ... International Business Machines Corporation

07/12/18 / #20180197774

Cobalt contact and interconnect structures

Methods and structures for forming cobalt contact and/or cobalt interconnects includes depositing a stress control layer onto the cobalt layer prior to annealing after which the stress control layer can be removed. The stress control layer prevents formation of defects that can occur in the absence of the stress control layer.. ... International Business Machines Corporation

07/12/18 / #20180197773

Cobalt contact and interconnect structures

Methods and structures for forming cobalt contact and/or cobalt interconnects includes depositing a stress control layer onto the cobalt layer prior to annealing after which the stress control layer can be removed. The stress control layer prevents formation of defects that can occur in the absence of the stress control layer.. ... International Business Machines Corporation

07/12/18 / #20180197752

Tunable tioxny hardmask for multilayer patterning

Lithographic multilayer structures are disclosed that generally include an organic planarizing layer and a tunable titanium oxynitride layer on the organic planarizing layer, wherein the titanium oxynitride includes tioxny, and wherein x is from 2.5 to 3.5 and y is from 0.75 to 1.25. The lithographic multilayer structure further includes a photosensitive resist layer on the titanium oxynitride layer. ... International Business Machines Corporation

07/12/18 / #20180197745

Hard masks for block patterning

Embodiments are directed to a method of forming a semiconductor device and resulting structures having a hard masks for sidewall image transfer (sit) block patterning. The method includes forming a first hard mask on a substrate. ... International Business Machines Corporation

07/12/18 / #20180197744

Hard masks for block patterning

Embodiments are directed to a method of forming a semiconductor device and resulting structures having a hard masks for sidewall image transfer (sit) block patterning. The method includes forming a first hard mask on a substrate. ... International Business Machines Corporation

07/12/18 / #20180197739

Fin patterns with varying spacing without fin cut

Methods of forming semiconductor fins include forming first spacers on a first sidewall of each of multiple mandrels using an angled deposition process. A second sidewall of one or more of the mandrels is masked in a finless region. ... International Business Machines Corporation

07/12/18 / #20180197738

Self aligned pattern formation post spacer etchback in tight pitch configurations

A method of forming a structure for etch masking that includes forming first dielectric spacers on sidewalls of a plurality of mandrel structures and forming non-mandrel structures in space between adjacent first dielectric spacers. Second dielectric spacers are formed on sidewalls of an etch mask having a window that exposes a connecting portion of a centralized first dielectric spacer. ... International Business Machines Corporation

07/12/18 / #20180197671

Magnetic inductor stacks

A magnetic laminating inductor structure and process for preventing substrate bowing and damping losses generally include a laminated film stack including a magnetic layer having a tensile stress, an insulating layer having a compressive stress disposed on the magnetic layer, and a dielectric planarizing layer on the insulating layer. The dielectric planarizing layer has a neutral stress and a roughness value less than the insulating layer. ... International Business Machines Corporation

07/12/18 / #20180197670

Magnetic inductor stacks

A magnetic laminating inductor structure and process for preventing substrate bowing and damping losses generally include a laminated film stack including a magnetic layer having a tensile stress, an insulating layer having a compressive stress disposed on the magnetic layer, and a dielectric planarizing layer on the insulating layer. The dielectric planarizing layer has a neutral stress and a roughness value less than the insulating layer. ... International Business Machines Corporation

07/12/18 / #20180197536

Method of proactive object transferring management

Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A cognitive service monitors a communication between a given user and another user. ... International Business Machines Corporation

07/12/18 / #20180197531

Domain terminology expansion by sensitivity

Methods, computer program products, and systems are presented. The methods include, for instance: determining that one or more word of a feature vector more supports than negates a language model corresponding to the domain based on a sensitivity of respective word. ... International Business Machines Corporation

07/12/18 / #20180197530

Domain terminology expansion by relevancy

Methods, computer program products, and systems are presented. The methods include, for instance: collecting various word data from cross-domain sources and subject websites; assessing relevancy of feature vectors from external domains, live content of subject websites, and secondary terms derived from the live contents; expanding a language model for a domain by relevance passing a logistic regression threshold.. ... International Business Machines Corporation

07/12/18 / #20180197439

System for enhancing speech performance via pattern detection and learning

A method for enhancing speech performance includes communicating, via an input/output (i/o) device, speech data of a patient with speech problems, segmenting the speech data, generating one or more feature vectors based on at least the segmented speech data, determining whether the one or more feature vectors match with one or more recognition objects pre-trained using clinical data of one or more other patients, determining a speech disorder based on a matched result between the one or more feature vectors and the one or more recognition objects, and communicating, via the i/o device, one or more ameliorative actions for mitigating the determined speech disorder.. . ... International Business Machines Corporation

07/12/18 / #20180197438

System for enhancing speech performance via pattern detection and learning

A method, system, and computer product for enhancing speech performance include includes communicating, via an input/output (i/o) device, speech data of a patient with speech problems, segmenting the speech data, generating one or more feature vectors based on at least the segmented speech data, determining whether the one or more feature vectors match with one or more recognition objects pre-trained using clinical data of one or more other patients, determining a speech disorder based on a matched result between the one or more feature vectors and the one or more recognition objects, and communicating, via the i/o device, one or more ameliorative actions for mitigating the determined speech disorder.. . ... International Business Machines Corporation

07/12/18 / #20180197430

Automated test generator and evaluator

Automated essay test generation and assessment processor device aspects identify phrases of discrete words appearing in a text data representation of a reference corpus of a subject matter as key concepts of the subject matter as a function of repetition of the first phrase within the reference corpus and an association with an organizational indicator of the reference corpus. Aspect processor devices further identify a text item that comprises a discrete objective value and that appears in association with the key concept as a question fact that is linked to the key concept, and generate an essay question comprising an instruction to compose an essay answer that associates the key concept to a generic domain attribute of the linked question fact.. ... International Business Machines Corporation

07/12/18 / #20180197429

Cognitive workload awareness

For determining cognitive workload awareness in driving context, an apparatus is disclosed. In some embodiments, the apparatus includes an activity monitor module that monitors driving activities of a driver. ... International Business Machines Corporation

07/12/18 / #20180197426

Conditional provisioning of auxiliary information with a media presentation

Techniques for conditional presentation of auxiliary information are provided. In one example, a computer-implemented method comprises determining, by a device operatively coupled to a processor, feedback information for a user in response to a media presentation, wherein the feedback information is indicative of a mental state of the user during presentation of the media presentation. ... International Business Machines Corporation

07/12/18 / #20180197390

Coded tags encoded using different magnetic materials and methods of detecting coded tags

A method includes transmitting a first magnetic detection signal at a first magnetic frequency and transmitting a second magnetic detection signal at a second magnetic frequency. The method also includes detecting a first response from a first magnetic material to the first magnetic detection signal and detecting a second response from the second magnetic material to the second magnetic detection signal. ... International Business Machines Corporation

07/12/18 / #20180197386

Wearable device that warms and/or cools to notify a user

A wearable device that warms or cools to notify a user wearing the device is provided. The wearable device includes: a plurality of individual heating and/or cooling spots, a plurality of dots pulsating in heating/cooling sections, and/or a plurality of dots moving around in heating/cooling sections. ... International Business Machines Corporation

07/12/18 / #20180197313

Cognitive color scheme advisor for dynamic modification of digital media in a collaborative environment with color blind individuals

A method for modifying digital media comprises receiving one or more digital media items, determining a plurality of colors and one or more associations between the colors in the one or more digital media items; collecting a color vision profile from one or more color blind individuals in an environment; analyzing the color vision profiles to determine common colors visible by the one or more color-blind individuals; identifying a color scheme for modifying the one or more digital media items to correspond to the common colors visible by the one or more color-blind individuals; and modifying the one or more digital media items using the color scheme.. . ... International Business Machines Corporation

07/12/18 / #20180197286

Dot-matrix product information encoding for food traceability

A method for encoding dot-matrix product information method includes identifying, via a processor, a dot-matrix grid size. The method further includes evaluating, via the processor, one or more dot pattern variation levels. ... International Business Machines Corporation

07/12/18 / #20180197262

Tracking a harmful combination of articles

A method of tracking a harmful combination of articles which includes: identifying a plurality of articles at an originating location, the identifying including a type and quantity of the plurality of articles; matching the plurality of articles with a repository of article descriptions that includes descriptive combinations of the articles that could combine to be a dangerous instrumentality to result in a plurality of matched articles with a potential to harm persons or property; identifying transport routes for the plurality of matched articles from the originating location to a terminating geographical zone; estimating a degree of completion of the dangerous instrumentality; and estimating a danger score of the plurality of matched articles, the danger score a composite of the type and quantity of the plurality of matched articles moved to the terminating geographical zone and the degree of completion of the dangerous instrumentality.. . ... International Business Machines Corporation

07/12/18 / #20180197257

Smart sensor-based consumer service optimization

A method, computer program product, and system includes a processor(s) determining, based on obtaining data from the one or more sensors over the wireless communications connection, that individuals are within a given vicinity. The processor(s) queries personal computing devices associated with the individuals to determine an identity of each individual in the given vicinity. ... International Business Machines Corporation

07/12/18 / #20180197251

Populating a new community for a social network

Populating a new community for a social network includes receiving metadata associated with a new community for a social network, determining, based on the metadata, at least one similar community related to the new community, utilizing the at least one similar community as a template to populate the new community with content, tags, and membership, and maintaining the at least one similar community and the new community by creating, reading, updating, and deleting (crud) the content, the tags, and the membership.. . ... International Business Machines Corporation

07/12/18 / #20180197234

Bid advising in resource allocation data analytics frameworks

Techniques facilitating advising bid values for usage of resource in a resource allocation data analytics framework are provided. In one example, a computer-implemented method can include generating, by a system operatively coupled to a processor, one or more performance models. ... International Business Machines Corporation

07/12/18 / #20180197233

Bid advising in resource allocation data analytics frameworks

Techniques facilitating advising bid values for usage of resource in a resource allocation data analytics framework are provided. In one example, a computer-implemented method can include generating, by a system operatively coupled to a processor, one or more performance models. ... International Business Machines Corporation

07/12/18 / #20180197219

Intelligently determining buying online and picking up in store based on commute patterns of connections in a social network and store parameters

A computer system for determining buying online and picking up in store. A computer receives from a shopper a request for buying online and picking up in store. ... International Business Machines Corporation

07/12/18 / #20180197211

Dynamically generating a promotion at a checkout

An approach is provided for generating a promotion at a checkout. A purchase history of a customer who is purchasing item(s) at the checkout is retrieved. ... International Business Machines Corporation

07/12/18 / #20180197201

Notification provisioning based on location trends of group members within a venue

A computer-implemented process and system for notification provisioning based on location trends of group members within a venue are provided, which includes: identifying a group relationship between respective users of mobile devices within a venue; tracking movement of the mobile devices of the users in the group within the venue; and determining which mobile device of the mobile devices of the users in the group to send a notification to based, at least in part, on accumulated data associated with the users in the group, the accumulated data including movement data of the mobile devices of the users in the group within the venue.. . ... International Business Machines Corporation

07/12/18 / #20180197169

Utilizing a mnemonic for communicating sensitive data

Systems and methods for utilizing a mnemonic to communicate sensitive data to an agent are disclosed. In aspects, a computer-implemented method comprises: establishing a telephone connection between a caller and an agent; entering an encryption key received from the agent into a mnemonic application of the computer device to permute an algorithm of the mnemonic application; receiving sensitive data in the form of one or more alphabetic, numeric or alpha-numeric sequence; initiating the mnemonic application to generate a mnemonic of the sensitive data using the encryption key, wherein the mnemonic is a sequence of words representing the sensitive data; displaying the mnemonic to the caller; and conveying audio communication of the mnemonic to the agent through the telephone connection to enable remote decoding of the mnemonic back into the at least one sensitive number sequence.. ... International Business Machines Corporation

07/12/18 / #20180197162

Remote document generation

A method and system for generating a document is provided. The method includes generating a metadocument configured to retain multiple components of different data types. ... International Business Machines Corporation

07/12/18 / #20180197153

Electronic calendaring and traveling facility

Electronic calendaring and travel monitoring are provided to facilitate alternate travel routing of an attendee(s) to a meeting. The approach includes receiving a meeting time and location, and ascertaining that multiple attendees are traveling to the meeting, including obtaining originating locations for the multiple attendees. ... International Business Machines Corporation

07/12/18 / #20180197150

Enforcement of services agreement and management of emotional state

A method, computer program product, and system includes a processor(s) configuring a sensor(s) (first sensor(s)), to capture data related to an emotional state of an individual and a sensor(s) (second sensor(s)), to capture data related to an environment of the individual. The processor(s) obtains, over a pre-defined period of time, data from the sensors and utilizes data from the second sensor(s) to identify activities in which the individual participated. ... International Business Machines Corporation

07/12/18 / #20180197146

System, method and computer program product for remarketing an advertised resume within groups

A resume remarketing method, system, and computer program product, including creating a remarketing cookie based on an interest factor of a first user in a first type of resume, matching the first user with a second user based on a similarity between a role of the first and second users, and transferring the remarketing cookie from the first user to the second user to remarket the first type of resume to the second user.. . ... International Business Machines Corporation

07/12/18 / #20180197129

Detecting vulnerabilities in a supply chain

Vulnerabilities in a supply chain are detected by creating a graphical representation of the supply chain containing a plurality of nodes and a plurality of edges between nodes. Each node is an entity in the supply chain, and each entity has an associated profile of properties for that entity. ... International Business Machines Corporation

07/12/18 / #20180197121

System and method for structured collaboration using reusable business components and control structures in an asset based component business model architecture

A method and system for using an asset based business architecture having components to operate a business, implementing collaborative interactions between the components by using control structures granular to the level of the corresponding asset based components. To respond to a business opportunity components are assembled into a collaborative network, and the assembled components are configured to the business opportunity. ... International Business Machines Corporation

07/12/18 / #20180197114

System, method and computer program product for priority seating management in public/private transportation

A priority seating management method, system, and computer program product, includes obtaining user trip data including a current location and a trip destination for a trip of a user, retrieving potential route data from a transportation database for each transportation vehicle traveling a route between the current location and the trip destination, retrieving real-time priority seating occupancy information for each transportation vehicle traveling the route including a location of a priority seat and an occupancy type of the priority seat, and compiling the user trip data, the potential route data, and the real-time priority seating occupancy information to determine a status availability of the priority seat for the user.. . ... International Business Machines Corporation

07/12/18 / #20180197106

Training data set determination

Provided herein is a computer readable medium having instructions embodied therewith, the instructions executable by a processor or programmable circuitry of a computer to cause the processor or programmable circuitry to perform operations comprising: selecting a first reference training data from a training data set based on a degree of difference between each reference training data in the training data set and a target training data; determining whether a degree of difference between the target training data and the first reference training data is below a first threshold; and determining whether to include the target training data in the training data set using at least a degree of difference between the target training data and at least one second reference training data, wherein the at least one second reference training data is included in the training data set and does not include the first reference training data.. . ... International Business Machines Corporation

07/12/18 / #20180197100

Partially observed markov decision process model and its use

A method for selecting an action, includes reading, into a memory, a partially observed markov decision process (pomdp) model, the pomdp model having top-k action ids for each belief state, the top-k action ids maximizing expected long-term cumulative rewards in each time-step, and k being an integer of two or more, in the execution-time process of the pomdp model, detecting a situation where an action identified by the best action id among the top-k action ids for a current belief state is unable to be selected due to a constraint, and selecting and executing an action identified by the second best action id among the top-k action ids for the current belief state in response to a detection of the situation. The top-k action ids may be top-k alpha vectors, each of the top-k alpha vectors having an associated action, or identifiers of top-k actions associated with alpha vectors.. ... International Business Machines Corporation

07/12/18 / #20180197096

Partially observed markov decision process model and its use

A method for selecting an action, includes reading, into a memory, a partially observed markov decision process (pomdp) model, the pomdp model having top-k action ids for each belief state, the top-k action ids maximizing expected long-term cumulative rewards in each time-step, and k being an integer of two or more, in the execution-time process of the pomdp model, detecting a situation where an action identified by the best action id among the top-k action ids for a current belief state is unable to be selected due to a constraint, and selecting and executing an action identified by the second best action id among the top-k action ids for the current belief state in response to a detection of the situation. The top-k action ids may be top-k alpha vectors, each of the top-k alpha vectors having an associated action, or identifiers of top-k actions associated with alpha vectors.. ... International Business Machines Corporation

07/12/18 / #20180197093

Automated vehicular accident detection

A vehicle accident detection method and system is provided. The method includes receiving location coordinates associated with a location of an occurring vehicular accident. ... International Business Machines Corporation

07/12/18 / #20180197092

Predictive analytics for failure detection

A computer-implemented method and computing system are provided for failure prediction of a batch of manufactured objects. The method includes classifying, by a processor using a simulation, a set of samples with uniformly distributed parameter values, to generate sample classifications for the batch of manufactured objects. ... International Business Machines Corporation

07/12/18 / #20180197091

Predictive analytics for failure detection

A computer-implemented method and computing system are provided for failure prediction of a batch of manufactured objects. The method includes classifying, by, a processor sing a simulation, a set of samples with uniformly distributed parameter values, to generate sample classifications for the batch of manufactured objects. ... International Business Machines Corporation

07/12/18 / #20180197088

Discovery, characterization, and analysis of interpersonal relationships extracted from unstructed text data

Embodiments for discovery and analysis of interpersonal relationships from a collection of unstructured text data by a processor. A relationship between one or more entities and extracted text data from a plurality of unstructured text data may be identified such that the relationship includes a sentiment of the relationship, a type of relationship, temporal information, or a combination thereof. ... International Business Machines Corporation

07/12/18 / #20180197085

Data analytics and insights brokerage service

Generating insight on a set of data is provided. A request for information regarding a specific topic is received from a client device corresponding to a requester. ... International Business Machines Corporation

07/12/18 / #20180197083

Neural network reinforcement learning

A computer-implement method and an apparatus are provided for neural network reinforcement learning. The method includes obtaining, by a processor, an action and observation sequence. ... International Business Machines Corporation

07/12/18 / #20180197082

Learning apparatus and method for bidirectional learning of predictive model based on data sequence

A computer-implemented method and an apparatus are provided for learning a first model. The method includes generating a second model based on the first model. ... International Business Machines Corporation

07/12/18 / #20180197080

Learning apparatus and method for bidirectional learning of predictive model based on data sequence

A computer-implemented method and an apparatus are provided for learning a first model. The method includes generating a second model based on the first model. ... International Business Machines Corporation

07/12/18 / #20180197079

Neural network reinforcement learning

A computer-implement method and an apparatus are provided for neural network reinforcement learning. The method includes inputting, by a processor, and action and observation sequence. ... International Business Machines Corporation

07/12/18 / #20180197075

Area-efficient, reconfigurable, energy-efficient, speed-efficient neural network substrate

Architectures for multicore neuromorphic systems are provided. In various embodiments, a neural network description is read. ... International Business Machines Corporation

07/12/18 / #20180197074

Producing spike-timing dependent plasticity in a neuromorphic network utilizing phase change synaptic devices

One embodiment relates to a neuromorphic network including electronic neurons and an interconnect circuit for interconnecting the neurons. The interconnect circuit includes synaptic devices for interconnecting the neurons via axon paths, dendrite paths and membrane paths. ... International Business Machines Corporation

07/12/18 / #20180197073

Producing spike-timing dependent plasticity in a neuromorphic network utilizing phase change synaptic devices

One embodiment relates to a neuromorphic network including electronic neurons and an interconnect circuit for interconnecting the neurons. The interconnect circuit includes synaptic devices for interconnecting the neurons via axon paths, dendrite paths and membrane paths. ... International Business Machines Corporation

07/12/18 / #20180197071

Neural network computing systems for predicting vehicle requests

Embodiments are described for minimizing a wait time for a rider after sending a ride request for a vehicle. An example computer-implemented method includes receiving a ride request, the request being for travel from a starting location to a zone in a geographic region during a specified timeslot. ... International Business Machines Corporation

07/12/18 / #20180197070

Neural network computing systems for predicting vehicle requests

Embodiments are described for minimizing a wait time for a rider after sending a ride request for a vehicle. An example computer-implemented method includes receiving a ride request, the request being for travel from a starting location to a zone in a geographic region during a specified timeslot. ... International Business Machines Corporation

07/12/18 / #20180197064

Coded tags encoded using different magnetic materials and systems of detecting coded tags

A coded tag includes a substrate. The coded tag includes a first magnetic material associated with the substrate. ... International Business Machines Corporation

07/12/18 / #20180197051

Extracting information from surface coatings

A method and system for extracting information from a surface coated with a coating containing quantum dots are disclosed. In embodiments, the method comprises charging the quantum dots in the surface coating, scanning the surface to retrieve information from the quantum dots, and processing the retrieved information to identify data encoded in the quantum dots. ... International Business Machines Corporation

07/12/18 / #20180197029

Enhanced vehicle monitoring

A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. ... International Business Machines Corporation

07/12/18 / #20180197028

Enhanced vehicle monitoring

A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. ... International Business Machines Corporation

07/12/18 / #20180197027

Enhanced vehicle monitoring

A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. ... International Business Machines Corporation

07/12/18 / #20180197019

Vehicle based selection

A method and system for automatically selecting an individual is provided. The method includes directing a vehicle to a specified quadrant of an interior portion of a structure comprising a plurality of individuals gathered for an information session. ... International Business Machines Corporation

07/12/18 / #20180197014

Selectively retaining high-resolution segments of continuous video data stream

Processing of a continuous, high-resolution video data stream for reduced data storage is provided. The processing includes: analyzing the continuous, high-resolution data stream for one or more specified image elements of interest; identifying at least one image element of the one or more specified image elements of interest in the continuous video data stream; passing one or more video segments of the continuous video data stream as high-resolution video, the one or more video segments containing the identified at least one image element of the one or more specified image elements of interest; and reducing resolution of other portions of the continuous video data stream than the one or more video segments to low-resolution video, wherein low-resolution video includes less data than high-resolution video.. ... International Business Machines Corporation

07/12/18 / #20180197008

Setting a personal status using augmented reality

A computer system, method, and computer readable product are provided for setting a personal status using augmented reality. In various embodiments, an augmented-reality computing device captures an image of a physical scene, which includes a person. ... International Business Machines Corporation

07/12/18 / #20180197005

Enhanced user authentication

A method and system for authenticating a user. A first digital representation of an iris of an eye of at least one authentic user is obtained. ... International Business Machines Corporation

07/12/18 / #20180197001

Analyzing technical documents against known art

Embodiments of the present invention provide techniques for analyzing technical documents against known art. One or more machine learning classifiers are trained by a training set. ... International Business Machines Corporation

07/12/18 / #20180196969

Contemporaneous gesture and keyboard for different levels of entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. ... International Business Machines Corporation

07/12/18 / #20180196968

Keyboard entry as an abbreviation to a contemporaneous gesture authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. ... International Business Machines Corporation

07/12/18 / #20180196967

Contextual contemporaneous gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. ... International Business Machines Corporation

07/12/18 / #20180196966

Contemporaneous facial gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. ... International Business Machines Corporation

07/12/18 / #20180196958

Automatic audit logging of events in software applications performing regulatory workloads

Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static code analysis identifying start and end operations on sensitive data in the software components of the application. ... International Business Machines Corporation

07/12/18 / #20180196938

Programming code execution management

In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. ... International Business Machines Corporation

07/12/18 / #20180196936

System, method and computer program product for controlling and altering biological, biometric, and idiosyncratic authentications

An authentication control method, system, and computer program product, includes performing an initial calibration to login to a registered device by detecting a plurality of biological signals, biometric signals, and idiosyncratic signals of a user and selecting a combination of the plurality of biological signals, biometric signals, and idiosyncratic signals to use in an initial calibration-authentication score, computing a login-authentication score at a time of the login based on a user input of signals corresponding to the signals of the initial calibration-authentication score, and allowing the login to the registered device if the login-authentication score is within a predetermined threshold of the initial calibration-authentication score.. . ... International Business Machines Corporation

07/12/18 / #20180196930

System, method and computer program product for stateful instruction-based dynamic man-machine interactions for humanness validation

A humanness validation method, system, and computer program product, include generating a sequence of actions including gaze actions and emotional state actions, instructing an access requestor to perform the actions in the sequence one-by-one, and granting access to the access requestor if a total error rate of each of the performed one-by-one actions in the sequence of actions is less than a predefined threshold value.. . ... International Business Machines Corporation

07/12/18 / #20180196925

System, method and computer program product for food intake control

A food intake control method, system, and computer program product, includes detecting types of food available to a user, categorizing a list of the types of food available to the user based on a harm of a type of food to the user, and administering a nudge to the user to assist the user in avoiding a type of food having the harm.. . ... International Business Machines Corporation

07/12/18 / #20180196924

Computer-implemented method and system for diagnosis of biological conditions of a patient

A computer-implemented method of diagnosis of a patient comprises comparing a marker-print of a patient, wherein the marker-print comprises an n-value vector with each value in the vector indicative of a state of a biological marker of the patient, against a compendium of reference marker-prints, each reference marker-print having an associated biological condition, the reference marker-prints being stored in a marker-print database, to determine at least one reference marker-print having at least one matching value with the patient marker print. The method may comprise calculating, by a confidence module of the computer processor, a level of similarity between the patient marker-print and the at least one determined reference marker-print with the at least one matching value, thereby to provide an indication of a confidence level that the patient has the biological condition associated with the at least one determined reference marker-print having the at least one matching value.. ... International Business Machines Corporation

07/12/18 / #20180196922

Providing context to a person's health-related time series data

A computer system, method, and computer readable product are provided for providing a context to a person's health-related time series data. In various embodiments, a computing system determines a health data about a person from an internet of things (iot) sensor device. ... International Business Machines Corporation

07/12/18 / #20180196921

Abbreviation expansion in clinical notes using frequency and context

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a medical treatment recommendation system. The medical treatment recommendation system receives a first patient electronic medical record (emr) corresponding to a first patient. ... International Business Machines Corporation

07/12/18 / #20180196920

Extracting patient information from an electronic medical record

A mechanism is provided in a data processing system comprising at least one processor and at least one memory comprising instructions, which are executed by the at least one processor and configure the processor to implement a patient information extractor. The patient information extractor receives a query specification for executing a query on a patient electronic medical record (emr). ... International Business Machines Corporation

07/12/18 / #20180196919

Automated health dialoguing and action enhancement

A server analyzes data from interactions between the user and an automated response system to form a speech pattern history for the user. The server analyzes data from a current interaction to identify a current speech pattern of the user and compares the current speech pattern with the speech pattern history. ... International Business Machines Corporation

07/12/18 / #20180196904

Fly-height interaction simulation

In an approach for providing simulation results of an interaction between a transducer head and a magnetic medium, a computer identifies a first raster scan of a sample via a scanning probe microscope. The computer generates a topography image based on the first raster scan of the sample. ... International Business Machines Corporation

07/12/18 / #20180196903

Fly-height interaction simulation

In an approach for providing simulation results of an interaction between a transducer head and a magnetic medium, a computer identifies a first raster scan of a sample via a scanning probe microscope. The computer generates a topography image based on the first raster scan of the sample. ... International Business Machines Corporation

07/12/18 / #20180196887

Hash table structures

Described herein are hash table structures and system and methods for creating and storing data in the hash table structures. Hash tables and input buffers associated with same are configured in several arrangements, including multi-level hash tables and nested multi-level hash tables. ... International Business Machines Corporation

07/12/18 / #20180196883

Router based query results

A method and system for improving a router based search query is provided. The method includes identifying a web page retrieved during a web query received from a network router device and analyzing historical web pages retrieved during historical search queries associated with a search engine router and the network router device. ... International Business Machines Corporation

07/12/18 / #20180196882

Sentiment-driven content management in a social networking environment

Disclosed aspects relate to sentiment-driven content management in a social networking environment. A set of user-derived data may be detected in a social networking environment. ... International Business Machines Corporation

07/12/18 / #20180196876

Sentiment-driven content management in a social networking environment

Disclosed aspects relate to sentiment-driven content management in a social networking environment. A set of user-derived data may be detected in a social networking environment. ... International Business Machines Corporation

07/12/18 / #20180196875

Determining repeat website users via browser uniqueness tracking

An approach for determining repeat website users via browser uniqueness tracking includes receiving browser information from a server based on a browser accessing a website. The approach includes creating a browser identifier based on the browser information. ... International Business Machines Corporation

07/12/18 / #20180196872

Method of label transform for managing heterogeneous information

Techniques are disclosed herein for normalizing heterogeneous information provided in labels processed by internet of things (iot) devices. A device (e.g., an iot-enabled device) receives an item including label content. ... International Business Machines Corporation

07/12/18 / #20180196871

System and method for metadata correlation using natural language processing

A method for identifying correlated datasets comprises receiving a natural language query from a user, extracting electronic metadata from a plurality of computerized datasets, correlating the electronic metadata with the natural language query using natural language processing, calculating a correlation score between the natural language query and each of the plurality of electronic datasets, and returning a result to the user, wherein the result includes one or more datasets of the plurality of electronic datasets with a correlation score greater than or equal to a threshold.. . ... International Business Machines Corporation

07/12/18 / #20180196860

Efficient representation, access and modification of variable length objects

One embodiment provides a method for efficient representation, access and modification of variable length data objects including converting, by a processor, all object updates into appends. The processor divides each object update into bounded size tokens. ... International Business Machines Corporation

07/12/18 / #20180196849

Partition access method for query optimization

In an approach to determining an access method for a partition in a partition table, a computer receives a query and determines if there is a partition table utilized by the query. When there is a partition table utilized by the query, then the computer determines that a partition in the partition table meets the plurality of conditions of the query. ... International Business Machines Corporation

07/12/18 / #20180196841

Tuple attribute expiry management

Disclosed aspects relate to tuple attribute expiry management in a stream computing environment to process a stream of tuples. A tuple may be received. ... International Business Machines Corporation

07/12/18 / #20180196837

Root cause analysis of performance problems

A method for analyzing performance of a computer system where at a plurality of time intervals, a set of kpis of a database and database performance outputs are monitored. A database performance value is calculated based on the monitored kpis and one or more database performance outputs. ... International Business Machines Corporation

07/12/18 / #20180196835

Root cause analysis of performance problems

A method, computer program product, and system for analyzing performance of a computer system where at a plurality of time intervals, a set of kpis of a database and database performance outputs are monitored. A database performance value is calculated based on the monitored kpis and one or more database performance outputs. ... International Business Machines Corporation

07/12/18 / #20180196828

Split elimination in mapreduce systems

Embodiments of the present invention relate to elimination of blocks such as splits in distributed processing systems such as mapreduce systems using the hadoop distributed filing system (hdfs). In one embodiment, a method of and computer program product for optimizing queries in distributed processing systems are provided. ... International Business Machines Corporation

07/12/18 / #20180196814

Qualitative and quantitative analysis of data artifacts using a cognitive approach

An artifact processing system and method for ranking artifacts is provided. The method includes the steps of creating an artifact repository, analyzing the plurality of artifacts based on a plurality of parameters, and assigning a weighted value to each parameter of the plurality of parameters based on a business requirement, a user requirement, and a technical specification to determine a quantitative score of each artifact, determining a qualitative score of each artifact of the plurality of artifacts by filtering the plurality of artifacts, and calculating a total weighted value of each artifact of the plurality of artifacts, clustering the plurality of artifacts from the plurality of data buckets during a search of the artifact repository using the qualitative value of each artifact to provide a closest match based on the user selected parameters, retrieving a cluster containing the closest match and ranking the artifacts within the cluster based on the qualitative score of the artifacts within the cluster.. ... International Business Machines Corporation

07/12/18 / #20180196802

Efficient management of document corpus

In monitoring changes to a document corpus, a document system extracts elements from a plurality of documents in the document corpus by the document system and establishes links between the elements to form an initial set of inter-document relationships for the plurality of documents in the document corpus by the document system. When a new document is added to the document corpus, the document system extracts a new set of elements from the new document by the document system and compares the new set of elements with the elements corresponding to the plurality of documents in the document corpus. ... International Business Machines Corporation

07/12/18 / #20180196801

Linker rewriting to eliminate toc pointer references

A method and associated computer program product are disclosed for generating an executable file from an object file comprising a function that references a table of contents (toc) pointer register. The method comprises identifying, based on at least one first annotation included in the object file, at least one instruction of the function having an eliminable reference to the toc pointer register, and determining, during a linking of the object file and based on the at least one first annotation, whether to eliminate the eliminable reference.. ... International Business Machines Corporation

07/12/18 / #20180196795

Process for identifying completion of domain adaptation dictionary activities

An apparatus comprising a memory and a processor configured for semi-autonomous natural language processing domain adaptation related activities. The processor coupled to the memory and configured to identify a corpus of documents of an evaluation domain and generate a first lexicon based on the corpus of documents of the evaluation domain, and determine a threshold that indicates a sufficiency of domain adaptation of the evaluation domain based at least in part on the first lexicon. ... International Business Machines Corporation

07/12/18 / #20180196789

Transforming a website for dynamic web content management

Transforming a website for dynamic web content management includes identifying aspects of a static website that are to be under dynamic web content management, organizing the aspects of the static website in preparation for storing the aspects, and storing the aspects of the static website with a specific identifier.. . ... International Business Machines Corporation

07/12/18 / #20180196783

System, method and computer program product for resume rearrangement

A resume rearrangement method, system, and computer program product, includes linking content segments of a resume including key terms with each other based on a pairwise similarity score between the key terms of the content segments, identifying an interest segment within the resume that draws interest from a current reader, and displaying a summary for the current reader including the interest segment that has drawn the interest of the current reader and a reference to at least one other segment that is linked with the interest segment.. . ... International Business Machines Corporation

07/12/18 / #20180196754

Temporarily suppressing processing of a restrained storage operand request

Processing of a storage operand request identified as restrained is selectively, temporarily suppressed. The processing includes determining whether a storage operand request to a common storage location shared by multiple processing units of a computing environment is restrained, and based on determining that the storage operand request is restrained, then temporarily suppressing requesting access to the common storage location pursuant to the storage operand request. ... International Business Machines Corporation

07/12/18 / #20180196751

Facility for extending exclusive hold of a cache line in private cache

A computing environment facility is provided to extend a hold of a cache line in private (or local) cache exclusively after processing a storage operand request. The facility includes determining whether a storage operand request to a storage location shared by multiple processing units of the computing environment is designated hold. ... International Business Machines Corporation

07/12/18 / #20180196737

Bifurcating a multilayered computer program product

Technical solutions are described for debugging a computer program product. An example computer-implemented method includes receiving an identifier of a portion of code from a first module of the computer program product, wherein the portion of code contains a defect. ... International Business Machines Corporation

07/12/18 / #20180196736

Controlling debug processing

Execution of a debug process on a thread of an application is monitored to detect resource contention caused by the debug process. In response to detecting a contention for a resource caused by the debug process, execution of the debug process is controlled in accordance with a debug policy. ... International Business Machines Corporation

07/12/18 / #20180196734

Pre-fetching disassembly code for remote software debugging

A method, computer program product and/or system for pre-fetching disassembly code. A breakpoint is set within an application under test (aut). ... International Business Machines Corporation

07/12/18 / #20180196733

Pre-fetching disassembly code for remote software debugging

A method, computer program product and/or system for pre-fetching disassembly code. A breakpoint is set within an application under test (aut). ... International Business Machines Corporation

07/12/18 / #20180196730

Debug management in a distributed batch data processing environment

Disclosed aspects relate to debug management in a distributed batch data processing environment which uses a shared pool of configurable computing resources. A debug configuration to fire a breakpoint based on an achievement of a debug criterion may be initiated in the distributed batch data processing environment. ... International Business Machines Corporation

07/12/18 / #20180196729

Pattern oriented data collection and analysis

A process for determining a problematic condition while running software includes: loading a first pattern data set into a volatile memory of a computer, with the first pattern data set being associated with a set of problematic conditions, determining that a runtime symptom code generated while running software on the computer matches a pre-defined symptom code in a set of pre-defined symptom codes, collecting information during runtime according to a set of data collection instructions as a set of collected data, and determining, by applying a set of logic data to the set of collected data, a first problematic condition of the set of problematic conditions triggered the runtime symptom code.. . ... International Business Machines Corporation

07/12/18 / #20180196727

Time-slice-instrumentation facility

A facility is provided for collecting time-slice-instrumentation information during processing unit execution. The facility counts, at least in part, occurrence of a specified processing unit event during a time-slice of processing unit execution. ... International Business Machines Corporation

07/12/18 / #20180196717

Self-aware and self-healing computing system

A method and a computing system for performing the method. At least two microstates of at least two components of a computing system are organized into at least two macrostates of the computing system. ... International Business Machines Corporation

07/12/18 / #20180196716

Dispersed storage network with access control and methods for use therewith

In a dispersed storage network where slices of secure user data are stored on geographically separated storage units (44), a managing unit (18) connected to the network (20) may seek to broadcast and update secure access control list information across the network (20). Upon a target device (e.g., devices 12, 14, 16, 18, or 44) receiving the broadcast, the target device creates and sends an access control list change notification message to all other system devices that should have received the same broadcast if the broadcast is a valid request to update access control list information. ... International Business Machines Corporation

07/12/18 / #20180196707

Automatic root cause analysis for web applications

A method for enabling a root cause analysis for an error originating in a content management system, is provided herein. The method comprises storing an identifier and a version number for each digital content item undergoing a change relating to the digital content item, and rendering a web page including the digital content item. ... International Business Machines Corporation

07/12/18 / #20180196700

Management and utilization of storage capacities in a converged system

A computer-implemented method according to one embodiment includes identifying a request to create a consumer within a converged system. Additionally, the method includes defining the consumer within a hierarchy of consumers, where the consumer represents a function in an organization. ... International Business Machines Corporation

07/12/18 / #20180196696

Optimizing timeouts and polling intervals

An approach is provided for managing a timeout and polling interval of an operation of an application. A type of the application is received. ... International Business Machines Corporation

07/12/18 / #20180196695

Self-adjusting system for prioritizing computer applications

Prioritizing resource allocation to computer applications which includes: grouping the computer applications into groups according to an initial criteria; modifying the groups according to one or more criteria used to identify active computer applications; analyzing the groups to prioritize the groups in order of the active time of the computer applications in the groups; analyzing the computer applications in the groups to prioritize the computer applications in the groups in order of the active time of the computer applications in the groups; setting the highest priority for the computer applications that either (1) have high frequency of use, or (1) are active now; and prioritizing the computer applications according to the priority setting.. . ... International Business Machines Corporation

07/12/18 / #20180196693

Sharing transaction contexts in an optimized colocation of java and non-java language applications

Systems and methods for sharing transactional context between java and traditional language applications are disclosed. In embodiments, a method comprises: receiving, by a computing device, a transaction request to execute a program, wherein the program comprises non-java program components and java program components; executing, by a transaction middleware of the computing device, the non-java program components; contacting, by the transaction middleware, a resource manager server and registering with the resource manager server using global transaction id data; transferring, by the transaction middleware of the computing device, the java program components to a transaction coordinator of the computing device, along with thread id data and the global transaction id data; and storing, by the transaction coordinator, the thread id data and global transaction id data in a recoverable transaction log store.. ... International Business Machines Corporation

07/12/18 / #20180196691

Risk-appropriate validation for live operating system migration

Methods and systems for migrating a virtual machine instance between devices include one or more migration risk rules, each migration risk rule relating to a validation set having one or more validation substasks. A processor is configured to score a received migration request against one or more of the migration risk rules to generate one or more scores for the migration request, to compare each score to a respective threshold to determine if a level of risk according to the respective rule merits performing validation for the validation set, to validate the migration request by only those validation sets that correspond to the scores that exceed the respective threshold, and to trigger migration of a virtual machine to a target device in accordance with the migration request if none of the validation sets fail to validate the migration request.. ... International Business Machines Corporation

07/12/18 / #20180196684

Method, system, and computer program product for application identification in a cloud platform

A method, system, and computer program product, include extracting information related to one or more processes of one or more applications running on a virtual machine from a memory of the virtual machine, building at least one first application signature based on the extracted information, and identifying the one or more applications running on the virtual machine by matching the at least one first application signature with one or more second application signatures previously stored.. . ... International Business Machines Corporation

07/12/18 / #20180196682

Personal identification using action sequences detected by sensors

A method modifies a physical device for use by a particular person. One or more processors receive information from a sensor indicating a detection by the sensor of a sequence of actions performed by an unidentified person. ... International Business Machines Corporation

07/12/18 / #20180196678

Out-of-order processor and method for back to back instruction issue

An out-of-order (ooo) processor includes ready logic that provides a signal indicating an instruction is ready when all operands for the instruction are ready, or when all operands are either ready or are marked back-to-back to a current instruction. By marking a second instruction that consumes an operand as ready when it is back-to-back with a first instruction that produces the operand, but the first instruction has not yet produced the operand, latency due to missed cycles in executing back-to-back instructions is minimized.. ... International Business Machines Corporation

07/12/18 / #20180196677

Out-of-order processor and method for back to back instruction issue

An out-of-order (ooo) processor includes ready logic that provides a signal indicating an instruction is ready when all operands for the instruction are ready, or when all operands are either ready or are marked back-to-back to a current instruction. By marking a second instruction that consumes an operand as ready when it is back-to-back with a first instruction that produces the operand, but the first instruction has not yet produced the operand, latency due to missed cycles in executing back-to-back instructions is minimized.. ... International Business Machines Corporation

07/12/18 / #20180196676

Reduced save and restore instructions for call-clobbered registers

A method and associated computer program product are disclosed for generating an executable file from an object file, the object file being associated with an architecture having a predefined calling convention designating one or more call-clobbered registers. The method comprises identifying, from a first annotation included in the object file with a function call instruction, at least one restore instruction that follows the function call instruction, the function call instruction associated with a predefined function of the object file. ... International Business Machines Corporation

07/12/18 / #20180196669

Reduced save and restore instructions for call-clobbered registers

A method and associated computer program product are disclosed for generating an object file for subsequent linking by a linker. The method comprises inserting at least one save instruction before a function call instruction and at least one restore instruction after the function call instruction, the at least one save instruction and the least one restore instruction corresponding to one or more call-clobbered registers. ... International Business Machines Corporation

07/12/18 / #20180196667

Runtime movement of microprocess components

A computer-implemented method of movement of microprocess components in a computer environment which includes: dividing a process into a plurality of microprocess components, the process to be run in a computer environment; creating a plurality of microprocess component placement combinations for the microprocess components, each combination comprising a placement of two or more microprocessor components in the computer environment; computing a utility score for each combination of microprocess components based on minimizing an end to end time for the combination of microprocess components and resource used for the combination of microprocess components; choosing the microprocessor component placement combination that has the best utility score; and assigning the microprocess component placement combination with the best utility score to placement in the computer environment.. . ... International Business Machines Corporation

07/12/18 / #20180196658

Pattern based migration of integration applications

Systems, methods, and computer program products to perform an operation comprising obtaining configuration information from a source integration application, determining a set of features for the source integration application based on the configuration information, determining a score for a feature of the set of features for an integration pattern, the score representing based on a likelihood the feature is associated with a pattern, determining fitness scores for the integration pattern of a set of integration patterns based at least in part on the score of one or more features of the set of features, selecting one or more integration patterns from the set of patterns based on the fitness score associated with each of the integration patterns, and migrating the source integration application based on the selected one or more integration patterns.. . ... International Business Machines Corporation

07/12/18 / #20180196655

Migrating applications to updated environments

A migration system for migrating an application between environments is provided. The migration system includes analyzes a profile of the application on a first environment based on a conformance check. ... International Business Machines Corporation

07/12/18 / #20180196652

Linker rewriting to eliminate toc pointer references

A method and associated computer program product are disclosed for generating an object file for subsequent linking by a linker. The object file comprises a function that references a table of contents (toc) pointer register. ... International Business Machines Corporation

07/12/18 / #20180196651

Efficiently transforming a source code file for different coding formats

A source code file is generated in accordance with a first coding format employed by a first user. In response to a request for the generated source code file from a second user employing a different coding format, the generated source code file is transformed to the different coding format employed by the second user, and the transformed source code file is presented to the second user in the different coding format.. ... International Business Machines Corporation

07/12/18 / #20180196650

Partial object instantiation for object oriented applications

One embodiment provides a method for transparent partial object instantiation for object oriented applications including analyzing, by a processor, application code to determine a list of objects. The processor determines a list of accessed fields for each of the objects based on performing analysis for each function in the application code for accessed fields and other functions invoked.. ... International Business Machines Corporation

07/12/18 / #20180196647

Application programming interface discovery using pattern recognition

Transforming application programming interface calls is provided. An application programming interface discovery process is performed on a second data processing system to determine how a task corresponding to a service request received from a first data processing system is performed on the second data processing system. ... International Business Machines Corporation

07/12/18 / #20180196643

Generating web api specification from online documentation

A tool that automatically generates a web api specification from a web api documentation is provided. The tool extracts a base uniform resource locator (url) string from the received documentation by identifying url strings in the documentation that are valid web application programming interface (api) calls. ... International Business Machines Corporation

07/12/18 / #20180196608

Hierarchical management of storage capacity and data volumes in a converged system

A computer-implemented method according to one embodiment includes identifying a plurality of storage resources. Additionally, the method includes creating a storage capacity, where the storage capacity has a first plurality of associated attributes. ... International Business Machines Corporation

07/12/18 / #20180196607

Apparatus, method, and program product for tape copying

An apparatus, method, system, and program product are disclosed for tape copying. One method includes mounting a first source tape of multiple source tapes on a source tape drive. ... International Business Machines Corporation

07/12/18 / #20180196606

Heat map transfer in space-efficient storage

The system includes a plurality of storage volumes, a data synchronization module, a space-efficient storage module, and a heat data module. A second storage volume of the plurality of storage volumes includes a backup storage location for a first storage volume. ... International Business Machines Corporation

07/12/18 / #20180196604

Physical address management in solid state memory

A storage system includes a controller connected to a solid state memory device. The controller releases the physical address for reassignment when no pending reads are associated with the physical address. ... International Business Machines Corporation

07/12/18 / #20180196595

Replacement of physical buttons with virtual controls

In an approach for controlling a computing device without mechanical buttons the computer detects an interaction with a touch capacitive sensing surface on a computing device. The computer determines that the detected interaction includes at least three interactions including at least two different touch capacitive sensing surfaces. ... International Business Machines Corporation

07/12/18 / #20180196594

Replacement of physical buttons with virtual controls

In an approach for controlling a computing device without mechanical buttons the computer detects an interaction with a touch capacitive sensing surface on a computing device. The computer determines that the detected interaction includes at least three interactions including at least two different touch capacitive sensing surfaces. ... International Business Machines Corporation

07/12/18 / #20180196515

Simulating obstruction in a virtual environment

A hand-wearable haptic interface device for simulating interaction with a virtual object in a virtual reality (vr) or augmented reality (ar) environment is provided. The hand-wearable haptic interface device can provide improved simulation of an obstruction caused by a virtual object in a virtual or augmented reality environment. ... International Business Machines Corporation

07/12/18 / #20180196510

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A first wearable device generates a gesture-based connection request to connect with a second wearable device. ... International Business Machines Corporation

07/12/18 / #20180196498

Method and apparatus for power savings in communications equipment

Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. ... International Business Machines Corporation

07/12/18 / #20180196497

Operating pulsed latches on a variable power supply

Operating pulsed latches on a variable power supply including turning on a first power rail powering a first latch of an integrated circuit, wherein the first latch is a pulsed latch; turning on a second power rail powering a second latch of the integrated circuit, wherein the second latch is operatively coupled to the first latch; performing a scan operation using the first latch and the second latch; turning off the first power rail powering the first latch; and performing a functional operation using the second latch, wherein the first power rail powering the first latch is off during the functional operation.. . ... International Business Machines Corporation

07/12/18 / #20180196496

Method and apparatus for power savings in communications equipment

Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. ... International Business Machines Corporation

07/12/18 / #20180196431

Autonomous vehicle parking using vehicle user information

In an approach, a processor receives a notification that an autonomous vehicle is parked at a first location within a parking area, wherein the autonomous vehicle is associated with a user. A processor receives a first set of information, wherein the first set of information comprises a first expected location of the user prior to returning to the parking area. ... International Business Machines Corporation

07/12/18 / #20180196429

Autonomous vehicle parking using vehicle user information

In an approach, a processor receives a notification that an autonomous vehicle is parked at a first location within a parking area, wherein the autonomous vehicle is associated with a user. A processor receives a first set of information, wherein the first set of information comprises a first expected location of the user prior to returning to the parking area. ... International Business Machines Corporation

07/12/18 / #20180196422

Methods and systems for drone network delivery system

Embodiments for managing drones by one or more processors are described. Information about each of a plurality of drones is received. ... International Business Machines Corporation

07/12/18 / #20180196403

Food freshness management

Disclosed aspects relate to food freshness management. A freshness triggering event may be identified for a food item. ... International Business Machines Corporation

07/12/18 / #20180196401

Food freshness management

Disclosed aspects relate to food freshness management. A freshness triggering event may be identified for a food item. ... International Business Machines Corporation

07/12/18 / #20180196260

Collaborative scene sharing for overcoming visual obstructions

Collaborative scene sharing for overcoming visual obstructions is provided. Video feeds of a scene are obtained from multiple devices viewing the scene from different angle. ... International Business Machines Corporation

07/12/18 / #20180196207

Alignment mechanism of optical interconnect structure

An optical interconnect structure includes a lens array and a waveguide substrate. The lens array has a dummy lens. ... International Business Machines Corporation

07/12/18 / #20180196200

Integrated optoelectronic chip and lens array

An optoelectronic coupling system and methods of forming the same include an optoelectronic chip mounted on a substrate. The optoelectronic chip includes one or more optoelectronic components. ... International Business Machines Corporation

07/12/18 / #20180196199

Integrated optoelectronic chip and lens array

An optoelectronic coupling system and methods of forming the same include an optoelectronic chip mounted on a substrate. The optoelectronic chip includes one or more optoelectronic components. ... International Business Machines Corporation

07/12/18 / #20180196195

Fluid control structure

An optical structure includes a substrate having a cavity on a first surface of the substrate, an optical component on the substrate, and an adhesive infiltrating into a gap between the substrate and the optical component to fix the optical component to the substrate. The optical component includes a recess on a second surface of the optical component, the second surface being opposed to the substrate, and the recess covers an opening of the cavity of the substrate.. ... International Business Machines Corporation

07/12/18 / #20180196023

Air quality forecasting based on dynamic blending

According to one or more embodiments of the present invention, a method of forecasting air quality is provided. The method includes determining weather pattern classifications based on global atmospheric information from a global weather model and determining a synoptic scale correction factor in response to the determination of the weather pattern classifications. ... International Business Machines Corporation

07/12/18 / #20180195876

Predicting an impact of a moving phenomenon on a travelling vehicle

Phenomenon data for at least one moving phenomenon that affects travel on at least one roadway can be received. An impact distribution for the phenomenon over a plurality of phenomenon cells can be determined and corresponding phenomenon impact distribution data can be generated. ... International Business Machines Corporation

07/12/18 / #20180195695

Directable light

A directable light, the light comprising: a light source for generating light; a first reflector for forming said generated light into a beam; a light switching layer, located between said light source and said first reflector, said light switching layer comprising a plurality of portions, each of said portions having at least two states, in a first state said light switching layer being substantially transparent to said generated light and in a second state said light switching layer being substantially opaque to said generated light; and a light controller which determines which of said portions of said light switching layer are substantially transparent and which of said portions of said light switching layer are substantially opaque.. . ... International Business Machines Corporation

07/12/18 / #20180195334

Entry technology for building automation

Managing an entryway for a building includes a computer system accessing identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associated with people. ... International Business Machines Corporation

07/12/18 / #20180195168

Growth of metal on a dielectric

A method for forming metal on a dielectric includes forming a seed layer on a surface including a reactant element. A first metal layer is formed on the seed layer wherein the first metal layer wets the seed layer. ... International Business Machines Corporation

07/12/18 / #20180194953

Subsurface modified silica materials

Methods and compositions related to subsurface modified silica materials are described. The silica materials include silicon- and carbon-containing groups covalently bonded to the silicon-oxygen matrix. ... International Business Machines Corporation

07/12/18 / #20180194815

Gluten-derived flame retardant materials

A process of forming a gluten-derived flame retardant material includes forming an amine-functionalized flame retardant molecule that includes an aryl halide group and a phosphorus moiety. The process also includes chemically reacting the amine-functionalized flame retardant molecule with a gluten protein under transamidation conditions to bind the phosphorus moiety to a first portion of the gluten protein. ... International Business Machines Corporation

07/12/18 / #20180194554

Recycling bin with mechanism for compacting individual containers

A fully integrated, low maintenance, manually operated beverage container compacting system featuring a free-standing, user powered, enclosed, beverage container compactor and storage receptacle. The compactor includes a self retracting puncture mechanism to release pressure due to air and liquids in sealed containers prior to their compacting. ... International Business Machines Corporation

07/12/18 / #20180194511

Container with integral interlocking clip(s)

An interlocking clip, a container incorporating the interlocking clip, and methods of fabricating of the interlocking clip and container are provided. The interlocking clip is formed integral with first and second container sections for fastening the container sections together, and includes a tab-receiving aperture and a locking tab. ... International Business Machines Corporation

07/12/18 / #20180194079

Methods and systems for 3d printing with modifiable support

Embodiments for 3d printing an object by a processor are described. An object is selected to be printed by a 3d printer. ... International Business Machines Corporation

07/12/18 / #20180194075

Methods and systems for detecting and rectifying faults in 3d printing processes

Embodiments for 3d printing an object by a processor are described. During a 3d printing process to form a 3d printed object, an at least partially completed 3d printed object formed by the 3d printing process is scanned. ... International Business Machines Corporation

07/12/18 / #20180193751

Secure data encoding for low-resource remote systems

A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an initial position, and receiving an input artefact. The method includes initializing an output string and a head index and a tail index. ... International Business Machines Corporation

07/12/18 / #20180193750

Secure data encoding for low-resource remote systems

A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an initial position, and receiving an input artefact. The method includes initializing an output string and a head index and a tail index. ... International Business Machines Corporation

07/12/18 / #20180193749

Secure data encoding for low-resource remote systems

A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an initial position, and receiving an input artefact. The method includes initializing an output string and a head index and a tail index. ... International Business Machines Corporation

07/12/18 / #20180193748

Secure data encoding for low-resource remote systems

A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an initial position, and receiving an input artefact. The method includes initializing an output string and a head index and a tail index. ... International Business Machines Corporation

07/12/18 / #20180193663

Probe for localized neural optogenetics stimulation and neurochemistry recordings

A neural probe is presented for local neural optogenetics stimulation and neurochemistry recordings. The neural probe includes a probe body, a shank extending from the probe body to a tip, a plurality of micro light-emitting diodes (leds) positioned across a length of a first surface of the shank for providing neuron-affecting light, a plurality of carbon devices, and a plurality of carbon electrodes positioned across a length of a second surface of the shank, the second surface in opposed relation to the first surface. ... International Business Machines Corporation

07/12/18 / #20180192599

Targeted irrigation using a central pivot irrigation system with a sensor network

A system includes a plurality of optical sensors located along at least one pipe segment of a rotating arm that pivots around an irrigation area of a field, the plurality of optical sensors continuously monitors soil and vegetation conditions and transmits sensed data to a central computer, and a plurality of in-ground sensors scattered in the irrigation area of the field, the plurality of in-ground sensors continuously monitors soil conditions and transmits sensed data to a plurality of gateway devices located in the rotating arm, the plurality of gateway devices transmits data from the plurality of in-ground sensors to the central computer where data from the plurality of optical sensors and the plurality of in-ground sensors is integrated with external data to determine water and fertilizer needs based on which an irrigation schedule is created.. . ... International Business Machines Corporation

07/05/18 / #20180192549

Server rack-dedicated vertical vortex airflow server cooling

A vortex-producing fan controller uses a variable-speed vortex-producing fan positioned above a server rack to create a helical airflow within the server rack that couples with cooled air entering a data center through a floor opening situated near a bottom of the server rack. A speed of the variable-speed vortex-producing fan and a flow rate of the cooled air coupled within the helical airflow up through the server rack are adjusted responsive to changes in input air temperature of air entering the variable-speed vortex-producing fan detected using a fan input air temperature sensor positioned above the server rack.. ... International Business Machines Corporation

07/05/18 / #20180192447

Using peripheral iot devices to identify primary device replacements

The present invention provides a method and system for updating device identification data of a user's paired mobile devices. A computing device determines that a mobile application is loaded onto the user's mobile phone which is paired with another device. ... International Business Machines Corporation

07/05/18 / #20180192275

Notification of potentially problematic textual messages

A processor may determine, using natural language processing, a writing style of content of a composed message written by a composer. The processor may analyze, using natural language processing, a set of previous message written by the composer. ... International Business Machines Corporation

07/05/18 / #20180192251

Targeting notifications intended for drivers to a trusted automobile passenger

Systems and methods for redirecting notifications, including determining that a first mobile device is in motion at a speed that exceeds a threshold value, determining that the while the first mobile device is in motion at a speed that exceeds the threshold value, the first mobile device is within a threshold distance of a second mobile device, determining that a notification has been received by the first mobile device and transmitting the notification to the second mobile device.. . ... International Business Machines Corporation

07/05/18 / #20180192244

Customer touchpoint patterns and associated sentiment analysis

Systems and methods for customer touchpoint pattern and sentiment analysis are disclosed. In embodiments, a computer-implemented method comprises: detecting, by a computer device, the presence of a mobile device of a participant within a venue during a first event; monitoring, by the computing device, the location of the mobile device of the participant within the venue during the first event; detecting, by the computing device, at least one interaction event between the participant and a venue associate; recording, by the computing device, first event data including interaction event data; detecting, by the computing device, the presence of the mobile device of the participant within the venue during a second event; determining, by the computing device, one or more customer service parameters based on the first event data; and generating, by the computing device, an alert based on the one or more customer service parameters.. ... International Business Machines Corporation

07/05/18 / #20180192243

Dynamic geofence

Systems, methods and tools for modifying existing geofence notifications using a plurality of overlapping geofences and geo-fencing rules to alter the notification messages as a function of triggering multiple overlapped geofences simultaneously. Triggering the two overlapping geofences may display notifications tied to a special event, marketing campaign or promotion designated by the subsequent geofence overlaying a pre-existing, first geofence. ... International Business Machines Corporation

07/05/18 / #20180192238

Matching and tracking of individual and mobile device

Disclosed embodiments provide systems, methods, and computer program products for associating mobile devices with identities of individuals, and tracking such individuals using the location of respective devices. Initially, a user registration process is performed to register an individual for a tracking list. ... International Business Machines Corporation

07/05/18 / #20180192040

Method and apparatus of private display device

There is provided a system and method for providing privacy viewing of an output from a electronic display, including a first polarizer configured to polarize a display signal at a first polarization angle; a second polarizer configured to polarize a noise signal at a second polarization angle orthogonal to the first polarization angle; a combiner configured to combine the polarized display signal and the polarized noise signal, and a third polarizer configured to receive the output of the electronic display and polarize the combined polarized display and noise signal at the first polarization angle. The system includes first and second polarization rotators configured to rotate the first and second polarization angles of the combined polarized display and noise signals prior to being output by the electronic display and prior to being received by the third polarizer.. ... International Business Machines Corporation

07/05/18 / #20180192014

Prohibiting facial exposure to projected light

Embodiments for prohibiting facial exposure to projected light from a projector device by a processor. A location of a facial region of a user may be determined in relation to the projected light emitted from a light source of a projector that displays an image. ... International Business Machines Corporation

07/05/18 / #20180191991

Isolating temporary images

A method for managing temporary images. The method comprises a computer system. ... International Business Machines Corporation

07/05/18 / #20180191987

Barrage message processing

Approaches presented herein enable displaying a barrage message. Specifically, one or more objects and location information for each object in a frame of a video are identified. ... International Business Machines Corporation

07/05/18 / #20180191944

Obtaining camera device image data representing an event

Methods, computer program products, and systems are presented and can include for instance: determining a location of interest; and obtaining image data from one or more camera device about the location of interest.. . ... International Business Machines Corporation

07/05/18 / #20180191907

Managing, monitoring and transcribing concurrent meetings and/or conference calls

A system, a method and a computer program product for managing multiple meetings and/or conference calls by performing the steps of receiving, by a computer, invitations to attend, by at least one attendee, two or more meetings, and detecting, by the computer, a one or more conflicts between the two meetings. The computer communicates, to the attendee, at least one detected conflict of the one or more detected conflicts. ... International Business Machines Corporation

07/05/18 / #20180191865

Global cloud applications management

Systems, methods, and computer program products to perform an operation comprising deploying a first application in a first cloud computing environment of a plurality of cloud computing environments, wherein the first application is composed of a first instance of a first service, determining that the first service has become unavailable in the first cloud computing environment, identifying, by an instance of inventory module executing in the first cloud computing environment, a second instance of the first service in one of the plurality of cloud computing environments, building the first application using the second instance of the first service; and redeploying the first application built using the second instance of the first service in the first cloud computing environment.. . ... International Business Machines Corporation

07/05/18 / #20180191864

Real-time resource negotiation with dynamic options

Automatically reserving a requested resource in real-time is provided. In response to posting a resource request message that includes a set of resource request criteria on a network, a set of resource availability options is received from a set of resource service providers via the network using a negotiation communication channel. ... International Business Machines Corporation

07/05/18 / #20180191852

Intelligently delivering notifications including summary of followed content and related content

A method, system and computer program product for handling notifications. A notification system monitors content (e.g., photograph) followed by a user for updates on a communication system. ... International Business Machines Corporation

07/05/18 / #20180191851

Event affinity detangling with broadcasts rolling over time zones

Social media inputs specific to a content of a broadcast program and received from a plurality of users are analyzed to determine a sentiment value expressed relative to a portion of the content. A group is formed of those users whose sentiment values expressed relative to the portion of the content are within a specified tolerance value of sentiment value and are expressed within a defined period during the broadcast of the program. ... International Business Machines Corporation

07/05/18 / #20180191845

Network delivery system

A method and system for improving network delivery is provided. The method includes receiving an internet based event for a user. ... International Business Machines Corporation

07/05/18 / #20180191844

Geolocation-based activation and de-activation of hardware and software functionalities in the cloud

A method, system and/or computer program product alters a computer resource while in a particular geolocation of a cloud computing environment. One or more processors detect that a geolocation of a computer resource has changed to a first geolocation within a cloud computing environment. ... International Business Machines Corporation

07/05/18 / #20180191823

Managing migration of an application from a source to a target

Aspects of the disclosure relate to managing migration of an application. The managing migration of an application includes establishing a source dataset. ... International Business Machines Corporation

07/05/18 / #20180191822

Execution of data logging in a networked computing environment

Embodiments of the present invention provide systems and methods for organization of data logging in a networked computing environment. A plurality of logging and monitoring zones, referred to as “logmon” zones are defined. ... International Business Machines Corporation

07/05/18 / #20180191820

Processing of complex workloads

Embodiments of the present invention provide systems and methods for enhancing the processing of workloads. The method includes identifying features associated with a workload. ... International Business Machines Corporation

07/05/18 / #20180191813

Mqtt cluster shared subscription hub for fat-pipe cloud applications

A computer implemented method of improving server coverage of a publish-subscribe cluster comprising using one or more hardware processors to execute one or more shared subscriptions hubs each adapted to retrieve shared subscriptions information from a cluster comprising multiple servers executing multiple messaging engines of a publish-subscribe service for forwarding messages to a plurality of subscribing clients, each message is associated with one or more of a plurality of topics, receive shared subscriptions requests for subscribing for one or more of the topics from distributed subscriptions client(s) applying shared subscriptions for the topic(s) through subscription group(s) comprising a subset of the subscribing clients, connect to preferred messaging engine(s) selected to improve server coverage of the subscription group(s) according to the shared subscriptions information to serve each of the plurality of shared subscriptions requests and forward messages associated with the topic(s) received from the selected messaging engine(s) to the subscription group(s).. . ... International Business Machines Corporation

07/05/18 / #20180191790

Document content pool

A method, a computing device and a computer program product are provided. A content pool view is displayed on a display. ... International Business Machines Corporation

07/05/18 / #20180191733

Verification of geolocation of devices in a cloud data center

A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has moved from a first geolocation to a new geolocation. ... International Business Machines Corporation

07/05/18 / #20180191727

Implementing data security within a synchronization and sharing environment

A computer-implemented method according to one embodiment includes receiving a request to share predetermined data with a device, identifying the predetermined data as sensitive, calculating a current security level for the device, and conditionally sharing the predetermined data with the device, based on the current security level for the device.. . ... International Business Machines Corporation

07/05/18 / #20180191698

Controlling access to electronic resources based on a user's sociometric identification document

A method establishes a session between a network resource and a user device used by a user having a particular sociometric identity. One or more processors identify an interaction between a user and one or more provider entities. ... International Business Machines Corporation

07/05/18 / #20180191663

Cluster assisted mqtt client coverage for fat-pipe cloud applications

A computer implemented method of improving server coverage of a publish-subscribe cluster of servers, comprising using a cluster comprising a plurality of servers each having hardware processor(s), the cluster is adapted to execute messaging engines of a publish-subscribe service for forwarding a plurality of messages to a plurality of subscribing clients, each message is associated with one of a plurality of topics, wherein distributed subscriptions client(s) applies shared subscriptions for one or more topics through subscription group(s) each comprising a subset of the subscribing clients, monitor shared subscriptions made by the subscription group(s) to each of the messaging engines for each topic, generate a shared subscriptions information for each topic by analyzing the shared subscriptions and publish the shared subscriptions information to the clients to allow client(s) of the subscription group(s) to subscribe for the topic(s) on a preferred messaging engine to improve a server coverage of their subscription group.. . ... International Business Machines Corporation

07/05/18 / #20180191658

Responding to an electronic message communicated to a large audience

A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. ... International Business Machines Corporation

07/05/18 / #20180191657

Responding to an electronic message communicated to a large audience

A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. ... International Business Machines Corporation

07/05/18 / #20180191633

Accessing a dispersed storage network

Methods and apparatus for selection of memory locations for data access operations in a dispersed storage network (dsn) are disclosed. In various embodiments, a dispersed storage (ds) processing module of the dsn receives a dsn access request regarding at least one data segment of a data object. ... International Business Machines Corporation

07/05/18 / #20180191582

Migrating legacy non-cloud applications into a cloud-computing environment

A method and associated system automatically migrates a non-cloud service from a legacy non-cloud virtualized computing environment into a cloud-computing environment. These methods and systems enhance standard cloud-management systems with the introduction of independent infrastructure-discovery and application-discovery tools. ... International Business Machines Corporation

07/05/18 / #20180191579

Method of certifying resiliency and recoverability level of services based on gaming mode chaosing

Embodiments of the present disclosure provide a method, system, and computer program product for certifying resiliency and recoverability level of services. The method, system and computer program product include receiving a level of testing for a target service used by an application in an ordinary course of operation. ... International Business Machines Corporation

07/05/18 / #20180191559

Live, in-line hardware component upgrades in disaggregated systems

Various embodiments for performing hardware upgrades in a disaggregated computing environment. A workload is run on a disaggregated computing system while providing a new component to at least one of a plurality of component pools used by the disaggregated computing system. ... International Business Machines Corporation

07/05/18 / #20180191492

Decryption-side initialization vector discovery

Selecting, from a plaintext block sequence, a first plaintext block subset that excludes a second plaintext block subset and that includes at least the first plaintext block in the plaintext sequence, generating an initialization vector from the first plaintext block subset, and producing a ciphertext by encrypting the plaintext using a block cipher encryption method that employs the initialization vector, and decrypting the ciphertext by selecting, from a block sequence of the ciphertext, a first ciphertext block subset that excludes a second ciphertext block subset and that includes at least the first ciphertext block in the ciphertext sequence, decrypting the first ciphertext block subset to produce a first set of plaintext blocks, generating an initialization vector from the first set of plaintext blocks, and decrypting the any of the ciphertext blocks in the second ciphertext block subset using the initialization vector to produce a second set of plaintext blocks.. . ... International Business Machines Corporation

07/05/18 / #20180191390

Methods and systems for aquatic infrastructure recharge and data transfer

Embodiments for managing aquatic infrastructure by one or more processors are described. A vehicle is detected within a vicinity of an aquatic infrastructure device. ... International Business Machines Corporation

07/05/18 / #20180190901

Structure and method to reduce shorting and process degradation in stt-mram devices

A method of making a magnetic random access memory device includes forming a magnetic tunnel junction (mtj) on an electrode, the mtj including a reference layer, a tunnel barrier layer, and a free layer; disposing a hard mask on the mtj; etching sidewalls of the hard mask and mtj to form a stack with a first width and redeposit metal along the mtj sidewall; depositing a sacrificial dielectric layer on the hard mask, surface of the electrode, exposed sidewall of the hard mask and the mtj, and on redeposited metal along the sidewall of the mtj; removing a portion of the sacrificial dielectric layer from sidewalls of the hard mask and mtj and redeposited metal from the mtj sidewalls; and removing a portion of a sidewall of the mtj and hard mask to provide a second width to the stack; wherein the second width is less than the first width.. . ... International Business Machines Corporation

07/05/18 / #20180190900

Structure and method to reduce shorting and process degradation in stt-mram devices

A method of making a magnetic random access memory device includes forming a magnetic tunnel junction (mtj) on an electrode, the mtj including a reference layer, a tunnel barrier layer, and a free layer; disposing a hard mask on the mtj; etching sidewalls of the hard mask and mtj to form a stack with a first width and redeposit metal along the mtj sidewall; depositing a sacrificial dielectric layer on the hard mask, surface of the electrode, exposed sidewall of the hard mask and the mtj, and on redeposited metal along the sidewall of the mtj; removing a portion of the sacrificial dielectric layer from sidewalls of the hard mask and mtj and redeposited metal from the mtj sidewalls; and removing a portion of a sidewall of the mtj and hard mask to provide a second width to the stack; wherein the second width is less than the first width.. . ... International Business Machines Corporation

07/05/18 / #20180190803

Method of manufacturing soi lateral si-emitter sige base hbt

A soi lateral heterojunction si-emitter sige-base bipolar transistor is provided that contains an intrinsic base region that includes a small band gap region (i.e., a silicon germanium alloy base of a first conductivity type) and a large band gap region (i.e., a silicon region of the first conductivity type) a silicon emitter of a second conductivity type that is opposite the first conductivity type is formed on the large-band gap side of the intrinsic base region and a silicon collector of the second conductivity type is formed on the small-band gap side of the intrinsic base region.. . ... International Business Machines Corporation

07/05/18 / #20180190794

Method of forming vertical transistor having dual bottom spacers

A method of forming a spacer for a vertical transistor is provided. The method includes forming a fin structure on a substrate, depositing a first spacer on exposed surfaces of the substrate to define gaps between the first spacer and the fin structure and depositing a second spacer on the exposed surfaces of the substrate in at least the gaps.. ... International Business Machines Corporation

07/05/18 / #20180190784

Shared metal gate stack with tunable work function

Semiconductor devices include at least one semiconductor fin in each of a first region and a second region. A first work function stack that includes a bottom layer, a middle layer, and a top layer is formed over the at least one semiconductor fin in the first region. ... International Business Machines Corporation

07/05/18 / #20180190782

Gate-all-around field effect transistor having multiple threshold voltages

One example of an apparatus includes a conducting channel region. The conducting channel region includes a plurality of epitaxially grown, in situ doped conducting channels arranged in a spaced apart relation relative to each other. ... International Business Machines Corporation

07/05/18 / #20180190781

Gate cut device fabrication with extended height gates

Semiconductor devices and methods of forming the same include forming a dummy gate structure across multiple device regions that includes a dummy gate and a dummy gate hardmask. A lower dielectric layer is formed to a height below a height of the dummy gate hardmask. ... International Business Machines Corporation

07/05/18 / #20180190769

Vertical gate-all-around transistor with top and bottom source/drain epitaxy on a replacement nanowire, and method of manufacturing the same

After providing a group iv semiconductor nanowire on a substrate, a sacrificial material portion is formed on sidewalls of a bottom portion of the group iv semiconductor nanowire. A sacrificial gate layer is then formed over the sacrificial material portion to laterally surround a middle portion of the group iv semiconductor nanowire, followed by forming a sacrificial spacer on sidewalls of a remaining top portion of the group iv semiconductor nanowire. ... International Business Machines Corporation

07/05/18 / #20180190760

Advanced metal insulator metal capacitor

A pattern is defined in a dielectric layer. The dielectric layer includes a low-k dielectric region and a high-k dielectric region. ... International Business Machines Corporation

07/05/18 / #20180190759

Advanced metal insulator metal capacitor

A pattern is defined in a dielectric layer. The dielectric layer includes a low-k dielectric region and a high-k dielectric region. ... International Business Machines Corporation

07/05/18 / #20180190758

Advanced metal insulator metal capacitor

A method for fabricating an advanced metal insulator metal capacitor structure includes providing a pattern in a dielectric layer. The pattern includes a set of features in the dielectric layer. ... International Business Machines Corporation

07/05/18 / #20180190757

Advanced metal insulator metal capacitor

A method for fabricating an advanced metal insulator metal capacitor structure includes providing a pattern in a dielectric layer. The pattern includes a set of features in the dielectric layer. ... International Business Machines Corporation

07/05/18 / #20180190756

Advanced metal insulator metal capacitor

A method for fabricating an advanced metal insulator metal capacitor structure includes providing a pattern in a dielectric layer. The pattern includes a set of features in the dielectric layer. ... International Business Machines Corporation

07/05/18 / #20180190755

Precise/designable finfet resistor structure

A resistive material is formed straddling over each semiconductor fin that extends upward from a surface of a substrate. The resistive material is then disconnected by removing the resistive material from atop each semiconductor fin. ... International Business Machines Corporation

07/05/18 / #20180190693

Array of optoelectronic structures and fabrication thereof

A method of fabrication of an array of optoelectronic structures includes first providing a crystalline substrate having cells corresponding to individual optoelectronic structures to be obtained. Each of the cells includes an opening to the substrate. ... International Business Machines Corporation

07/05/18 / #20180190674

Asymmetric band gap junctions in narrow band gap mosfet

A semiconductor device with one or more fin structures formed from a first material, gate, source, and drain regions formed from a second material, and a contact insulator layer deposited over the substrate, where an etching process applied to the substrate removes the insulator to create a trench over the source region. The device also includes a lower band gap source material that is deposited into the trench, a second contact insulator layer, and a metalizing material that is deposited over the substrate. ... International Business Machines Corporation

07/05/18 / #20180190609

Ball grid array rework

Embodiments relate to an apparatus for rework of a bga package. Memory shape material is placed adjacent to a plurality of solder joints of the package. ... International Business Machines Corporation

07/05/18 / #20180190592

Structure and method to reduce copper loss during metal cap formation

A copper or copper alloy is formed in a reflow enhancement layer lined opening present in an interconnect dielectric material layer. A ruthenium (ru) or osmium (os) doped copper or copper alloy cap is then formed via ion implantation and annealing in an upper portion of a copper or copper alloy present in the opening. ... International Business Machines Corporation

07/05/18 / #20180190585

Semiconductor device including a porous dielectric layer, and method of forming the semiconductor device

A method of forming a semiconductor device, includes forming a conductive layer in a recessed portion of a porous dielectric layer, partially removing a top portion of the conductive layer while maintaining a height of the porous dielectric layer, forming a conformal cap layer on the porous dielectric layer and the conductive layer in the recessed portion, polishing the conformal cap layer to form a gap in the conformal cap layer, such that an upper surface of the porous dielectric layer is exposed through the gap and an upper surface of the conductive layer is protected by the cap layer, and performing a heat treatment to burn out a pore filler of the porous dielectric layer through the exposed upper surface of the porous dielectric layer.. . ... International Business Machines Corporation

07/05/18 / #20180190565

Thermal interface material on package

A packaged assembly is disclosed, including thermal interface material dispensed on an organic package and methods of manufacturing. The method includes dispensing a thermal interface material (tim) on an electronic assembly. ... International Business Machines Corporation

07/05/18 / #20180190545

Hybrid-channel nano-sheet fets

Semiconductor devices and methods of forming a first layer cap at ends of layers of first channel material in a stack of alternating layers of first channel material and second channel material. A second layer cap is formed at ends of the layers of second channel material. ... International Business Machines Corporation

07/05/18 / #20180190544

Hybrid-channel nano-sheet fets

Integrated chips include a first device and a second device. The first device includes a stack of vertically arranged sheets of a first channel material, a source and drain region having a first dopant type, and a first work function metal layer formed from a first work function metal. ... International Business Machines Corporation

07/05/18 / #20180190491

Fin patterns with varying spacing without fin cut

Methods of forming semiconductor fins include forming first spacers on a first sidewall of each of a plurality of mandrels using a directional deposition process. A finless region is masked by forming a mask on a second sidewall of one or more of the plurality of mandrels. ... International Business Machines Corporation

07/05/18 / #20180190470

System and method for performing nano beam diffraction analysis

A system for performing diffraction analysis, includes a focused ion beam (fib) device for preparing a sample, a mill for removing a surface portion of the prepared sample, and an analyzer for performing diffraction analysis on the milled sample.. . ... International Business Machines Corporation

07/05/18 / #20180190317

Flexible media burnishing apparatus and method

An apparatus for burnishing media, according to one embodiment, includes a first block with a media bearing surface having a plurality of channels and lands. The channels and lands alternate in a direction of media travel. ... International Business Machines Corporation

07/05/18 / #20180190315

In-situ protective film

An apparatus according to one embodiment includes a magnetic read transducer comprised of a sensing portion and proximate magnetic shields, and a wear-resistant in-situ film on a media-facing side of the read transducer. The in-situ film is comprised of material derived from a flexible medium. ... International Business Machines Corporation

07/05/18 / #20180190243

Remediating interference of an instance of a visual notification with an output of an application on a display device

Methods, systems, and computer program products are provided for remediating an instance of a visual notification interfering with an output of an application on a display device of an electronic device. An instance of a visual notification is identified on a display device. ... International Business Machines Corporation

07/05/18 / #20180190144

System and method for cognitive intervention on human interactions

A determination regarding whether to intervene in a dialog to provide system-initiated assistive information involves monitoring a dialog between at least two participants and capturing data from a dialog environment containing at least one of the participants. The captured data represent the content of the dialog and physiological data for one or more participants. ... International Business Machines Corporation

07/05/18 / #20180190143

System and method for cognitive intervention on human interactions

A determination regarding whether to intervene in a dialog to provide system-initiated assistive information involves monitoring a dialog between at least two participants and capturing data from a dialog environment containing at least one of the participants. The captured data represent the content of the dialog and physiological data for one or more participants. ... International Business Machines Corporation

07/05/18 / #20180190140

System and method for augmenting answers from a qa system with additional temporal and geographic information

A method comprising receiving, by a question and answer system, a first question, generating, by the question and answer system, a first answer set corresponding to the first question, each answer in the first answer set including one or more evidence passages, identifying, by the question and answer system, a geospatial or temporal modifier in the evidence passages, generating, by the question and answer system, a second question based on the first question and the geospatial or temporal modifier, generating, by the question and answer system, a second answer set corresponding to the second question, and returning, by the question and answer system, a question answer set based on the second answer set to a user.. . ... International Business Machines Corporation

07/05/18 / #20180190138

Conditional provisioning of auxiliary information with a media presentation

Techniques for conditional presentation of auxiliary information are provided. In one example, a computer-implemented method comprises determining, by a device operatively coupled to a processor, feedback information for a user in response to a media presentation, wherein the feedback information is indicative of a mental state of the user during presentation of the media presentation. ... International Business Machines Corporation

07/05/18 / #20180190137

Conditional provisioning of auxiliary information with a media presentation

Techniques for conditional presentation of auxiliary information are provided. In one example, a computer-implemented method comprises determining, by a device operatively coupled to a processor, feedback information for a user in response to a media presentation, wherein the feedback information is indicative of a mental state of the user during presentation of the media presentation. ... International Business Machines Corporation

07/05/18 / #20180190042

Self-driving vehicle road safety flare deploying system

A method deploys a road safety flare near a faulty self-driving vehicle (sdv). One or more processors detect a driving problem severity level for a faulty sdv. ... International Business Machines Corporation

07/05/18 / #20180189970

Image-based device configuration

Embodiments for processing an image by a processor. The image may be analyzed for one or more identified image elements. ... International Business Machines Corporation

07/05/18 / #20180189954

Method and system for crop recognition and boundary delineation

A computer-implemented method for determining farm boundary delineations within a target geographic area, comprising extracting data from pixels of a satellite image of the target geographic area, evaluating the data using a classification algorithm to generate one or more line segments between adjacent pixels, the one or more line segments being representative of a portion of a boundary delineation, connecting the one or more line segments to an adjacent line segment to form a boundary delineation defining at least one parcel of land within the target geographic area, and generating a boundary delineation map including the boundary delineation.. . ... International Business Machines Corporation

07/05/18 / #20180189866

Implementing cognitive modeling techniques to provide bidding support

A method for providing bidding support to a user during an auction using cognitive modeling comprises obtaining data associated with the auction, with the obtained data comprising data associated with at least one bidder. The obtained data is analyzed, and at least one output is generated based on the analysis. ... International Business Machines Corporation

07/05/18 / #20180189851

Intelligently determining buying online and picking up in store based on commute patterns of connections in a social network and store parameters

A computer program product for determining buying online and picking up in store. A computer receives from a shopper a request for buying online and picking up in store. ... International Business Machines Corporation

07/05/18 / #20180189836

Campaign delivery system

Systems, methods and tools for targeting campaign notifications during specific times that a user performs related activities or events. The targeted delivery system retrieves information describing the user's day to day activities and the timing of the activities from a plurality of data sources such as social media, browser history, downloads, search engine activity, emails, audio data, video data etc. ... International Business Machines Corporation

07/05/18 / #20180189835

Geofence system

Systems and methods for modifying campaign dependent geofences by creating marketing campaigns and linking the marketing campaign to a specific geofence. Each campaign-linked geofence may be capable of delivering the campaign messages to geofence participants during the duration of a marketing campaign and the geofence system may subsequently deactivate the geofence automatically after the marketing campaign has concluded. ... International Business Machines Corporation

07/05/18 / #20180189831

Delivering personalized advertising

Personalized advertising is delivered to a subject at a time when the state of mind of the subject is most receptive to the receipt of advertising such that the content of the advertising is selected based on the state of mind of the subject at the time of delivery. Activities of a subject to receive the advertisement and indicators of physiological status of the subject are monitored, and the monitored activities and indicators of physiological status are used to determine a current state of mind of the subject. ... International Business Machines Corporation

07/05/18 / #20180189829

Cross-currency campaign delivery system

Systems, methods and tools for delivering campaign related messages to users engaging in potential cross-currency transactions. Embodiments of the disclosure combines analytics with data collection techniques to predict potential cross-currency transaction, learn about the user, user's location, the user's native currency type associated with the transaction predicted and obtain conversion rate information to make predictions about the strengths or weaknesses of the user's native currency. ... International Business Machines Corporation

07/05/18 / #20180189818

Rewarding online users as a function of network topology

A method and associated systems for rewarding online users as a function of network topology. An online-reward system receives a network topology and an unweighted base reward schedule that specifies amounts of incentive rewards to be awarded to performing users who perform a solicited desired action and to intermediary users who forward such a solicitation to another user. ... International Business Machines Corporation

07/05/18 / #20180189815

Group-based purchasing incentives

Approaches presented herein enable providing a group-based purchasing incentive related to a product or service at a retail store to a customer among a group of customers contingent on an action being performed by a predefined number of members from the group. Specifically, a customer in a retail store is identified as part of a group of customers. ... International Business Machines Corporation

07/05/18 / #20180189810

Processing user experience feedback in a retail environment to assist corrective action

A method for processing user feedback of a retail venue is provided. The method includes requesting a feedback response from a mobile device upon the mobile device leaving the retail venue, receiving the feedback response indicating a user dissatisfaction because the user could not locate at least one retail item while present in the retail venue, identifying the retail item, determining a reason for the user dissatisfaction by ascertaining whether the retail venue stocks the at least one retail item, and: if not, then recommending to the retail venue to add the at least one item to an inventory of the retail venue, and if so, then analyzing, a physical path taken by the user within the retail venue using a micro-location data of the mobile device, and providing the reason for the customer dissatisfaction to the retail venue to assist the retail venue in taking a corrective action.. ... International Business Machines Corporation

07/05/18 / #20180189807

Transforming social media re-shares to track referrer history and identify influencers

Approaches are provided for tracking and measuring the influence of social networking members on groups of friends to engage in electronic commerce. An approach includes receiving unique identifier information and activity information for a user that referred a social media link to one or more other users. ... International Business Machines Corporation

07/05/18 / #20180189802

System, method and computer program product for sensory simulation during product testing

A sensory simulation product testing method, system, and computer program product, include extracting at least one pain point associated with a user from a database, correlating at least one of an environment factor, a context factor, and a sentiment factor with the at least one user pain point, and creating an augmented reality in which to immerse the user to test a product based on the at least one of the environment factor, the context factor, and the sentiment factor.. . ... International Business Machines Corporation

07/05/18 / #20180189759

Transaction processing based on comparing actions recorded on multiple devices

The present disclosure relates to authenticating transactions based on actions performed on a merchant and a customer device. An example method generally includes receiving, from a point of sale system, data identifying a transaction, wherein the data includes a merchant identifier and a payment account identifier. ... International Business Machines Corporation

07/05/18 / #20180189745

System, method and computer program product for estimating, scheduling, and monitoring farm activity

A farm activity control method, system, and computer program product includes generating a list of optimal farming activities including different phases of farming, translating the list of optimal farming activates into a plurality of tasks that are sequenced in an order of operation or according to a time scale, and generating a visual electronic calendar that displays and tracks a completion of the sequenced tasks while providing a notification based on a time and a criticality of each task.. . ... International Business Machines Corporation

07/05/18 / #20180189743

Intelligent scheduling management

Embodiments for intelligent scheduling management by a processor. One or more time slots are cognitively identified for scheduling a meeting according to a plurality of identified contextual factors, scheduling availability, an attendance confidence level assigned to each of the one or more users, and meeting topic and objective such that a user aggregation contribution score is provided for the one or more time slots. ... International Business Machines Corporation

07/05/18 / #20180189737

Automatic organizational change processing in a cognitive networked collaboration environment

Disclosed embodiments provide methods and systems for automatically reflecting organization changes in a cognitive collaboration environment. Upon transfer from a first group to a second group, a human resources system notifies a cognitive organizational system. ... International Business Machines Corporation

07/05/18 / #20180189732

Blockchain for program code credit and programmer contribution in a collective

A system for producing a computer program code collaboratively using blockchain includes a plurality of computer nodes, the plurality of computer nodes forming a distributed network for collaborative work. Each of the computer nodes communicates directly with the others, and is operated by a user in accordance with a common smart contract. ... International Business Machines Corporation

07/05/18 / #20180189698

Contextual analysis of business intelligence reports

Adjusting a business intelligence report is provided. An identification of an input data source corresponding to content of the business intelligence report is received from a client device via a network. ... International Business Machines Corporation

07/05/18 / #20180189663

Leveraging an external ontology for graph expansion in inference systems

A mechanism is provided in a data processing system for exploring knowledge. The mechanism receives a set of known facts. ... International Business Machines Corporation

07/05/18 / #20180189657

Deploying local q and a systems in iot devices

Using a specification of a device, a performance capability of the device is computed for hosting a local question and answer (q and a) system on the device. Based on the specification and a q and a need, a knowledgebase is selected from a set of knowledgebases in use at a remote q and a system. ... International Business Machines Corporation

07/05/18 / #20180189656

Managing questions

Managing questions is provided. A question is sent to a subject matter expert corresponding to a selected subject matter expert class via a network. ... International Business Machines Corporation

07/05/18 / #20180189644

Structural descriptions for neurosynaptic networks

Embodiments of the invention provide a method comprising creating a structural description for at least one neurosynaptic core circuit. Each core circuit comprises an interconnect network including plural electronic synapses for interconnecting one or more electronic neurons with one or more electronic axons. ... International Business Machines Corporation

07/05/18 / #20180189637

Implementing a neural network algorithm on a neurosynaptic substrate based on metadata associated with the neural network algorithm

One embodiment of the invention provides a system for mapping a neural network onto a neurosynaptic substrate. The system comprises a metadata analysis unit for analyzing metadata information associated with one or more portions of an adjacency matrix representation of the neural network, and a mapping unit for mapping the one or more portions of the matrix representation onto the neurosynaptic substrate based on the metadata information.. ... International Business Machines Corporation

07/05/18 / #20180189634

Determining context-aware distances using deep neural networks

A knowledge graph is traversed by receiving a knowledge graph at a deep neural network, the knowledge graph including a plurality of nodes connected by a plurality of edges, each respective edge of the plurality of edges being associated with a corresponding distance representing embedded semantic information. The deep neural network is trained to capture the embedded semantic information. ... International Business Machines Corporation

07/05/18 / #20180189630

Augment politeness in question answer systems

An approach is provided to receive, at a question answering (qa) system, a question and identify a politeness corresponding to a number of terms corresponding to the question that are included in a corpus of the qa system. The approach identifies the politeness of one or more terms included in each of a set of candidate answers responsive to the question. ... International Business Machines Corporation

07/05/18 / #20180189593

Associating a comment with an object in an image

An approach is provided for correlating a comment about an image with first object(s) in the image. Object(s) in the image are detected and identified. ... International Business Machines Corporation

07/05/18 / #20180189564

Method and system for crop type identification using satellite observation and weather data

A computer-implemented method for crop type identification using satellite observation and weather data. The method includes extracting current and historical data from pixels of satellite images of a target region, generating temporal sequences of vegetation indices, based on the weather data, converting each timestamp of the temporal sequences into a modified temporal variable correlating with actual crop growth, training a classifier using a set of historical temporal sequences of vegetation indices with respect to the modified temporal variable as training features and corresponding historically known crop types as training labels, identifying a crop type for each pixel location within the satellite images using the trained classifier and the historical temporal sequences of vegetation indices with respect to the modified temporal variable for a current crop season, and estimating a crop acreage value by aggregating identified pixels associated with the crop type.. ... International Business Machines Corporation

07/05/18 / #20180189530

Hybrid tag for radio frequency identification system

Rfid (radio frequency identification) systems are provided in which tag and interrogator devices implement a hybrid framework for signaling including an optical transmitter/receiver system and an rf transmitter/receiver system. For instance, an rfid tag device includes: optical receiver circuitry configured to receive an optical signal having an embedded clock signal from an interrogator device, and convert the optical signal into an electrical signal comprising the embedded clock signal; clock extraction circuitry configured to extract the embedded clock signal from the electrical signal, and output the extracted clock signal as a clock signal for controlling clocking functions of the tag device; voltage regulator circuitry configured to generate a regulated supply voltage from the electrical signal, wherein the regulated supply voltage is utilized as a bias voltage for components of the tag device; and data transmitter circuitry configured to wirelessly transmit tag data to the interrogator device.. ... International Business Machines Corporation

07/05/18 / #20180189528

Tracking assets with a blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example method of operation may include reading a tag affixed to an asset, transmitting a request to update an asset status of the asset in a blockchain, receiving validation confirmation based on content of the request, and updating the asset status of the asset in the blockchain.. ... International Business Machines Corporation

07/05/18 / #20180189509

Purpose-based control of data used by computer software applications

Controlling computer-based access to data by receiving from a computer software application a request specifying a computer user, a type of data associated with an entity, and an intended purpose for the type of data associated with the entity, accessing, responsive to receiving the request, a consent record indicating an association between the specified entity, the specified type of data associated with the entity, and the computer software application, and granting the request if the consent record includes an indication of consent in association with a specified purpose for the type of data associated with the entity, and if the specified purpose matches the intended purpose.. . ... International Business Machines Corporation

07/05/18 / #20180189503

Secure database backup and recovery

As disclosed herein a computer system for secure database backup and recovery in a secure database network has n distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. ... International Business Machines Corporation

07/05/18 / #20180189449

Tracking items used for providing medical services

A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed network of computing nodes, and wherein each of the set of computing nodes maintains the secure chain of data blocks. The secure chain of data blocks maintained at each computing node comprises one or more data blocks that respectively represent one or more transactions associated with a physical item used for providing a medical service. ... International Business Machines Corporation

07/05/18 / #20180189445

Synthetic pathway engine

A process includes receiving information associated with a target molecule to be synthesized via a synthetic pathway engine user interface. The process also includes determining, using a synthetic pathway engine, synthetic pathway data for synthesis of the target molecule. ... International Business Machines Corporation

07/05/18 / #20180189441

Checking wafer-level integrated designs for antenna rule compliance

Methods and systems for checking a wafer-level design for compliance with a rule include identifying nets that cross chip boundaries for each of a set of chip layouts. Interconnected identified nets are combined into one or more virtual ensembles having properties defined by a sum of properties of the respective interconnected nets. ... International Business Machines Corporation

07/05/18 / #20180189439

Area sharing between multiple large block synthesis (lbs) blocks

Respective large block synthesis (lbs) blocks of an integrated circuit (ic) are overlapped along a corner of each respective lbs block to form an overlap area having an area less than respective areas of respective lbs blocks that are overlapped. A first portion of the overlap area is allocated to a first lbs block and configured to be used by the first lbs block, and a second portion of the overlap area is allocated to a second lbs block and configured to be used by the second lbs block.. ... International Business Machines Corporation

07/05/18 / #20180189437

Generating a layout for an integrated circuit

In an approach for generating a file, a computer generates a modified layout for an integrated circuit. The computer receives a draft layout for an integrated circuit. ... International Business Machines Corporation

07/05/18 / #20180189417

Dynamic faceting for personalized search and discovery

Methods, computer program products, and systems are presented. The methods include, for instance: determining user clusters and navigation-type clusters based on multiple information requests, and training facets and corresponding usefulness factor of the facets from the multiple information requests by machine learning. ... International Business Machines Corporation

07/05/18 / #20180189415

Controlling access to one or more datasets of an operating system in use

A method and system for controlling access to data. Each dataset of l datasets is stored. ... International Business Machines Corporation

07/05/18 / #20180189414

Method and apparatus for using proxies to interact with webpage analytics

An overlay may be displayed over a webpage for displaying different analytics, such as displayed with heatmaps. The webpage is parsed to identify webpage objects. ... International Business Machines Corporation

07/05/18 / #20180189411

Flow-directed collaborative communication

Resolving a query received from a first node in a network includes accepting, by a second node in the network, ownership of the query from the first node, receiving, at the second node, an identification of a third node in the network, wherein the identification is received from a user of the second node and the user of the second node believes that a user of the third node has information necessary to resolve at least part of the query, and transferring, by the second node, ownership of the at least part of the query to the third node, wherein the accepting, the receiving, and the transferring dynamically generates a data structure that traces a propagation of the query, and the data structure is accessible to an origin of the query.. . ... International Business Machines Corporation

07/05/18 / #20180189410

Identification of target audience for content delivery in social networks by quantifying semantic relations and crowdsourcing

A mechanism is provided in a data processing system for content delivery. The mechanism identifies a candidate user of a social networking service. ... International Business Machines Corporation

07/05/18 / #20180189403

Website domain specific search

A method and system for improving a domain specific search is provided. The method includes executing a user initiated search query and analyzing associated. ... International Business Machines Corporation

07/05/18 / #20180189394

Hashtag segmentation

Segmenting hashtags is provided. A selection of a sub-hashtag contained within a hashtag is received from a client device via a network. ... International Business Machines Corporation

07/05/18 / #20180189389

Representation of a data analysis using a flow graph

Techniques facilitating using flow graphs to represent a data analysis program in a cloud based system for open science collaboration and discovery are provided. In an example, a system can represent a data analysis execution as a flow graph where vertices of the flow graph represent function calls made during the data analysis program and edges between the vertices represent objects passed between the functions. ... International Business Machines Corporation

07/05/18 / #20180189388

Representation of a data analysis using a flow graph

Techniques facilitating using flow graphs to represent a data analysis program in a cloud based system for open science collaboration and discovery are provided. In an example, a system can represent a data analysis execution as a flow graph where vertices of the flow graph represent function calls made during the data analysis program and edges between the vertices represent objects passed between the functions. ... International Business Machines Corporation

07/05/18 / #20180189378

Personalized social media actions based on eminence traits

An approach for creating personalized recommended social media actions to improve social eminence within a social network. A social action engine receives persona social traits, social graphs associated with a user. ... International Business Machines Corporation

07/05/18 / #20180189377

Personalized social media actions based on eminence traits

An approach for creating personalized recommended social media actions to improve social eminence within a social network. A social action engine receives persona social traits, social graphs associated with a user. ... International Business Machines Corporation

07/05/18 / #20180189370

Accelerator based data integration

A method, system and computer program product for providing consolidated access to data of a plurality of source databases. Tables of each of the source databases are replicated to a shared accelerator. ... International Business Machines Corporation

07/05/18 / #20180189357

Detection and utilization of attributes

A method and system of improving the detection and utilization of attributes of a user. A query is sent to a device operated by a user. ... International Business Machines Corporation

07/05/18 / #20180189351

Forecasting query access plan obsolescence

A query is received. Based on statistics for a database, a first query access plan is generated for executing the query on the database. ... International Business Machines Corporation

07/05/18 / #20180189333

Limiting blockchain size to optimize performance

A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. ... International Business Machines Corporation

07/05/18 / #20180189319

Space management for a hierarchical set of file systems

One embodiment provides a method for storage management in a hierarchical file system. The method includes tracking directories for sub-file systems of the hierarchical set of file systems and maintaining a corresponding directory in a top-file system and a number of symbolic pointers in the corresponding directory which each point from the corresponding directory to a sub-file system where any portion of the tracked directory resides. ... International Business Machines Corporation

07/05/18 / #20180189318

Global namespace for a hierarchical set of file systems

One embodiment provides a method for storage management in a hierarchical file system. The method includes tracking directories for sub-file systems of the hierarchical file system. ... International Business Machines Corporation

07/05/18 / #20180189310

Space management for a hierarchical set of file systems

One embodiment provides a method for storage management in a hierarchical file system. The method includes tracking directories for sub-file systems of the hierarchical set of file systems and maintaining a directory while providing the directory is capable of residing in more than one sub-file system within the hierarchical file system. ... International Business Machines Corporation

07/05/18 / #20180189309

Storage space management in union mounted file systems

One embodiment provides a method for re-balancing data and metadata across multiple sub-file systems of a file system. The method includes determining sub-file systems including an amount of data that exceeds a threshold. ... International Business Machines Corporation

07/05/18 / #20180189308

Mitigation of geolocation based data remanence problems

A method, system, and/or computer program product modify a computer resource that has been moved to a new geolocation. One or more processors detect that a geolocation of a software resource has changed to a new geolocation. ... International Business Machines Corporation

07/05/18 / #20180189305

Global namespace for a hierarchical set of file systems

One embodiment provides a method for storage management in a hierarchical file system. The method includes tracking directories for sub-file systems of the hierarchical file system. ... International Business Machines Corporation

07/05/18 / #20180189304

Providing unique inodes across multiple file system namespaces

One embodiment provides a method for storage management in an aggregated file system. The method includes tracking inode numbers for sub-file systems of the aggregated file system. ... International Business Machines Corporation

07/05/18 / #20180189296

Multimedia analytics in spark using docker

A computer implemented method of mapping multimedia analytics of multimedia objects into a resilient distributed dataset (rdd), comprising one or more processors adapted to obtain an rdd of a cluster computing framework executed by a cluster comprising a plurality of computing nodes, the rdd comprises a plurality of entries each comprising a pointer to one of a plurality of multimedia objects stored in a shared storage, instruct each of a plurality of framework tasks executed by at least some members of the cluster to apply a docker operator for retrieving and executing one of a plurality of multimedia containers each associated with a respective one of the multimedia objects and comprising a multimedia processing algorithm for processing the respective multimedia object, receive from the framework tasks multimedia analytics results generated simultaneously by the multimedia containers and map the multimedia analytics results into the rdd.. . ... International Business Machines Corporation

07/05/18 / #20180189264

Enhancing qa system cognition with improved lexical simplification using multilingual resources

An approach is provided that returns a simplified set of text to a user of a natural language processing (nlp) system with the simplified set of text having a complexity appropriate to the reading level of the user. The approach receives a word that belongs to a first natural language and retrieves a first set of complexity data pertaining to the word in the first natural language. ... International Business Machines Corporation

07/05/18 / #20180189263

Using multilingual lexical resources to improve lexical simplification

An approach is provided that receives a word that belongs to a first natural language and retrieves a first set of complexity data pertaining to the word in the first natural language. The approach translates the word to one or more translated words, with each of the translated words corresponding to one or more second natural languages. ... International Business Machines Corporation

07/05/18 / #20180189262

Enhancing qa system cognition with improved lexical simplification using multilingual resources

An approach is provided that returns a simplified set of text to a user of a natural language processing (nlp) system with the simplified set of text having a complexity appropriate to the reading level of the user. The approach receives a word that belongs to a first natural language and retrieves a first set of complexity data pertaining to the word in the first natural language. ... International Business Machines Corporation

07/05/18 / #20180189261

Using multilingual lexical resources to improve lexical simplification

An approach is provided that receives a word that belongs to a first natural language and retrieves a first set of complexity data pertaining to the word in the first natural language. The approach translates the word to one or more translated words, with each of the translated words corresponding to one or more second natural languages. ... International Business Machines Corporation

07/05/18 / #20180189257

Checking documents for spelling and/or grammatical errors and/or providing recommended words or phrases based on patterns of colloquialisms used among users in a social network

A method, system and computer program product for checking documents using colloquialisms. Colloquialisms used in messages by users in a social network are tracked. ... International Business Machines Corporation

07/05/18 / #20180189233

Interconnect circuits at three-dimensional (3-d) bonding interfaces of a processor array

Embodiments of the invention relate to processor arrays, and in particular, a processor array with interconnect circuits for bonding semiconductor dies. One embodiment comprises multiple semiconductor dies and at least one interconnect circuit for exchanging signals between the dies. ... International Business Machines Corporation

07/05/18 / #20180189189

Implementing paging device selection based on wear-level data

A method, system and computer program product for implementing paging device selection based on wear-level factor data in a computer system. Paging is used to store the temporary memory pages in a virtualization environment. ... International Business Machines Corporation

07/05/18 / #20180189166

System and method for using development objectives to guide implementation of source code

An information processing system, computer readable storage medium, and method with an integrated development environment to guide development of applications to implement a programming design objective. A method includes analyzing a selected portion of source code according to meeting each programming design objective from a set of programming design objectives; selecting, based on the analyzing, at least one programming design objective from the programming design objectives, the selected at least one programming design objective being determined suitable for the selected portion of source code based on one of conforming with constraints of the objective, or failing to conform and determining a quick fix can be applied by update to the source code to make it conform. ... International Business Machines Corporation

07/05/18 / #20180189163

Optimizing adaptive monitoring in resource constrained environments

Adaptive monitoring dynamically optimizes the monitoring frequency of metrics with respect to system constraints. One or more metrics are monitored. ... International Business Machines Corporation

07/05/18 / #20180189147

Risk measurement driven data protection strategy

Techniques are disclosed for dynamically changing a data protection plan based on a risk score. The risk score is continuously or periodically recalculated based on situational factors that are detected from external modules. ... International Business Machines Corporation

07/05/18 / #20180189146

Risk measurement driven data protection strategy

Techniques are disclosed for dynamically changing a data protection plan based on a risk score. The risk score is continuously or periodically recalculated based on situational factors that are detected from external modules. ... International Business Machines Corporation

07/05/18 / #20180189143

Simultaneous compression of multiple stored videos

A method and associated systems for simultaneously compressing multiple stored videos. A file-backup system receives a set of uncompressed media files. ... International Business Machines Corporation

07/05/18 / #20180189141

Self-healing using a virtual boot device

Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer having a memory and a physical boot device failing to successfully load a boot image, a second computer defines a virtual boot device in communication with the first computer and the second computer and having a boot image for the first computer. ... International Business Machines Corporation

07/05/18 / #20180189139

Using an eventually consistent dispersed memory to implement storage tiers

A method for a dispersed storage network begins by receiving one or more revisions of a data object for storage within a time frame and facilitating, for each revision of the one or more revisions, storage of the revision in the selected primary storage target including at least some encoded data slices of each set of encoded data slices of a plurality of sets of encoded data slices are stored in the selected primary storage target and, for each of the revisions, facilitating subsequent storage of remaining encoded data slices of each set of encoded data slices that were not stored in the selected primary storage target, and determining to store the remaining encoded data slices in another storage target, identifying a most recently stored revision of the data object and facilitating storage of the remaining encoded data slices of the most recently stored revision in the other storage target.. . ... International Business Machines Corporation

07/05/18 / #20180189138

Detecting and data loss events in a dispersed storage network

A method for use in a dispersed storage network operates to identify missing, out-of-date or otherwise compromised encoded data slices in a dispersed storage network (dsn), and when a decode threshold of encoded data slices is not available to rebuild an associated data object, determine whether a data loss event has occurred. When a data loss event is determined to have occurred the method continues by initiating a process to recover all or some of the lost data and may include notification to dsn entities that a data loss event has occurred.. ... International Business Machines Corporation

07/05/18 / #20180189128

Hybrid and hierarchical outlier detection system and method for large scale data protection

One embodiment provides a method comprising receiving metadata comprising univariate time series data for each variable of a multivariate time series. The method comprises, for each variable of the multivariate time series, applying a hybrid and hierarchical model selection process to select an anomaly detection model suitable for the variable based on corresponding univariate time series data for the variable and covariations and interactions between the variable and at least one other variable of the multivariate time series, and detecting an anomaly on the variable utilizing the anomaly detection model selected for the variable. ... International Business Machines Corporation

07/05/18 / #20180189124

Rebuilding the namespace in a hierarchical union mounted file system

One embodiment provides a method for file system namespace rebuilding. The method includes creating attribute data structures for a top-file system and sub-file system hierarchy system. ... International Business Machines Corporation

07/05/18 / #20180189114

Breaking dependence of distributed service containers

Managing service container dependency is provided. A notification that a first service container is running on a host environment is received. ... International Business Machines Corporation

07/05/18 / #20180189106

Technology for increasing data processing by users

An event is detected for a first user of a computer system in a computer network, where the event indicates the first user intends for predetermined users in the computer network to perform user-processing of predetermined data via computer systems of the predetermined users. An historical, use-metric value is determined for historical user-processing of data by the predetermined users. ... International Business Machines Corporation

07/05/18 / #20180189089

Virtual machine image conversion

Example embodiments of the present disclosure provide methods, devices, and computer programs for virtual machine image conversion. A delta file system between a file system of a first virtual machine (vm) image and a file system of a first operating system (os) base image is determined. ... International Business Machines Corporation

07/05/18 / #20180189088

Attaching a pluggable agent to a virtual machine (vm) in a networked computing environment

Aspects of the present invention provide an approach for attaching a pluggable agent to a virtual machine (vm) in a networked computing environment. In an embodiment, a vm is provisioned with a base operating system. ... International Business Machines Corporation

07/05/18 / #20180189084

Data flow affinity for heterogenous virtual machines

A method and technique for data flow affinity for heterogeneous virtual machines includes disabling large receive offload (lro) processing of data by a physical adapter. First and second logical partitions are connected to a shared virtual adapter where the first logical partition has a maximum receive unit (mru) different than a mru of the second logical partition. ... International Business Machines Corporation

07/05/18 / #20180189067

Prefetching of discontiguous storage locations in anticipation of transactional execution

Discontiguous storage locations are prefetched by a prefetch instruction. Addresses of the discontiguous storage locations are provided by a list directly or indirectly specified by a parameter of the prefetch instruction, along with metadata and information about the list entries. ... International Business Machines Corporation

07/05/18 / #20180189050

Rolling upgrades in disaggregated systems

Embodiments for performing rolling software upgrades in a disaggregated computing environment. A rolling upgrade manager is provided for upgrading one or more disaggregated servers. ... International Business Machines Corporation

07/05/18 / #20180189036

Code origination data management for code assembly

A first set of code origination data which corresponds to a first computing object and a second set of code origination data which corresponds to a second computing object may be detected for utilization to develop a streaming application in the stream computing environment. Based on the first and second sets of code origination data, a code assembly arrangement with respect to the first and second computing objects may be determined. ... International Business Machines Corporation

07/05/18 / #20180189009

Mobile device application view management

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining output data of one or more sensor of a mobile device; prioritizing the first though nth applications of the mobile device based on the output data and based on criteria characterizing the first through nth applications; and establishing information for display on a display of the mobile device based on the prioritizing.. ... International Business Machines Corporation

07/05/18 / #20180189003

File system block-level tiering and co-allocation

A method includes separating a file into multiple blocks. Each block of the multiple blocks are separated into at least two correlated sub-blocks. ... International Business Machines Corporation

07/05/18 / #20180189001

Method and system for processing data

Methods, computer systems, and computer program products for processing data a computing environment are provided. The computer environment for data deduplication storage receives a plurality of write operations for deduplication storage of the data. ... International Business Machines Corporation

07/05/18 / #20180188992

Securing encoding data slices using an integrity check value list

A method includes retrieving a read threshold number of integrity check value list (icvl) encoded data slices of a set of icvl encoded data slices. The method further includes determining whether an appended icvl of each icvl encoded data slice of the read threshold number of icvl encoded data slices substantially match. ... International Business Machines Corporation

07/05/18 / #20180188964

Managed storage unit shutdown in a distributed storage network

A method begins by a load balancing module of a distributed storage network (dsn) receiving status information from a set of dsn processing units and selecting a dsn processing unit from the set of dsn processing units to process the data access request based on the status information. The method continues with the load balancing module transmitting, by the data access request to the dsn processing unit selected to process a data access request and receiving an indication of unfavorable performance from the dsn processing unit. ... International Business Machines Corporation

07/05/18 / #20180188955

Predetermined placement for tape cartridges in an automated data storage library

Embodiments for predetermining optimal demount position for demounting data storage cartridges in an automated data storage library by a processor. A selected demount position may be predetermined, while performing one of a plurality of robotic movements by an accessor, for each mounted data storage cartridge for demounting data storage cartridges in the automated data storage library such that each predetermined selected demount position is stored in a lookup table of predetermined selected demount positions for a subsequent demount operation. ... International Business Machines Corporation

07/05/18 / #20180188928

Display control of an image on a display screen

Methods, computer program products, and systems, for example, for controlling display of an image on a display screen includes, for example, receiving, by one or more processor, data regarding a user selected area relative to a first portion of an image displayed on a display screen to define a second portion of the image, at least a portion of the second portion of the image being outside the first portion of the image displayed on the display screen, and automatically controlling, by the one or more processor, display of the second portion of the image on the display screen based on the user selected area of the image to generally maximize display of the second portion of the image within the display screen.. . ... International Business Machines Corporation

07/05/18 / #20180188914

Text resources processing in an application

Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. ... International Business Machines Corporation

07/05/18 / #20180188909

Searching and displaying child objects of a parent object

A method for searching and displaying child objects of a parent object based on a drag event. The child objects are associated with the parent object. ... International Business Machines Corporation

07/05/18 / #20180188904

Searching and displaying child objects of a parent object

A method, a computer program product, and a computer system for searching and displaying child objects of a parent object based on a drag event. The child objects are associated with the parent object. ... International Business Machines Corporation

07/05/18 / #20180188824

Autocorrect with weighted group vocabulary

Methods, computer program products, and systems are presented. The method, computer program products, and systems can include, for instance: obtaining entered textual information of a user of a messaging system; and outputting word usage corrective information to the user based on word use accuracy models for first through nth users of the messaging system, wherein the word use accuracy models for first through nth users of the messaging system are established by examining messages of the messaging system.. ... International Business Machines Corporation

07/05/18 / #20180188823

Autocorrect with weighted group vocabulary

Methods, computer program products, and systems are presented. The method, computer program products, and systems can include, for instance: obtaining entered textual information of a user of a messaging system; and outputting word usage corrective information to the user based on word use accuracy models for first through nth users of the messaging system, wherein the word use accuracy models for first through nth users of the messaging system are established by examining messages of the messaging system.. ... International Business Machines Corporation

07/05/18 / #20180188792

Reconfigurable caching and backup for devices

Apparatus, systems and methods for managing and aggregating cached data of aggregated electronic devices for sharing functionality to fulfill requested tasks, while monitoring and controlling battery energy levels in the electronic devices to ensure sufficient battery power is available, individually or collectively, to fulfill a requested task. The electronic devices are positioned in proximity to a computing device for sharing cached hierarchies of each device as well as hierarchies of the aggregated devices. ... International Business Machines Corporation

07/05/18 / #20180188728

System, method and computer program product for drone swarm road lighting

A drone road lighting method, system, and computer program product, includes detecting a need for illumination near a road and deploying a drone to perform an illumination action based on the detected need.. . ... International Business Machines Corporation

07/05/18 / #20180188722

Myoelectric control of unmanned aerial vehicle by prosthetic limb

A system for controlling an unmanned aerial vehicle (uav). The system includes a prosthetic limb configured to receive myoelectric control signals from a user. ... International Business Machines Corporation

07/05/18 / #20180188462

Illuminating cable for enhanced traceability

Enhanced traceability of cables is provided using illumination. An embodiment comprises introducing a chemiluminescent (alternatively, fluorescent) solution into a chamber coupled to at least a portion of an insulating jacket that surrounds a transmission medium, the chamber being initially hollow and, in at least a portion thereof, comprised of a substance through which light is viewable, such that upon introduction of the solution through a port, light emitted by the solution is viewable through at least a portion of the chamber. ... International Business Machines Corporation

07/05/18 / #20180188261

Identification of enzyme activity through determination of its localization

A method of determining enzyme activity and identifying and classifying cellular targets, enzymatic pathways, and enzymatic agents involved in regulating metabolism in order to treat pathophysiological disorders. Monitoring enzyme activity is performed via a label-free bio cellular assay or fluorescence imaging. ... International Business Machines Corporation

07/05/18 / #20180188171

Chemical sensing based on plasmon resonance in carbon nanotubes

A chemical sensor, methods of forming the same, and methods of performing chemical detection include a carbon nanotube test surface. A detector is configured to receive a signal from the carbon nanotube test surface responsive to illumination on the nanotube test surface. ... International Business Machines Corporation

07/05/18 / #20180188089

Methods and systems for monitoring groundwater discharge

Embodiments for monitoring groundwater discharge by one or more processors are described. A groundwater head at each of at least some of a plurality of locations is measured. ... International Business Machines Corporation

07/05/18 / #20180188057

Detecting and simulating a moving event for an affected vehicle

Event data for at least one moving event is received. From the event data, moving event data indicating a trend of the moving event can be generated. ... International Business Machines Corporation

07/05/18 / #20180188056

Methods and systems for event initiated navigational assistance

Embodiments for providing navigation routes by one or more processors are described. An indication of a destination is received. ... International Business Machines Corporation

07/05/18 / #20180188053

Route generation based on aggregated path data

Generating routes based on aggregated path data includes accumulating trajectory data from a plurality of users, wherein data entries in the trajectory data each include an origin and a destination. When a request for a route from a designated location to a particular destination is received from a particular user, one or more of the data entries are identified as relevant to the request for the route when the origin of a particular data entry is similar to the designated location and the destination of the particular data entry is similar to the particular destination. ... International Business Machines Corporation

07/05/18 / #20180188050

Navigation system based on air pollution exposure profiling

Systems and methods for navigating in consideration of estimated air quality in an individual area of a geographic region includes receiving traffic data for the individual area and sensor data of environmental pollution sensors within the individual region.. . ... International Business Machines Corporation

07/05/18 / #20180187801

Article with tunable flexibility using reversible cross-linking fluids

A hose, connector, and hose assembly are described with mechanical properties that can be varied by exposure to specific energy stimuli. The hose has a wall with a first material, a second material, and one or more energy conduits, wherein the first material has a first rigidity with a first variability, and the second material has a second rigidity with a second variability, the first variability depends on energy emitted from the one or more energy conduits, and the second variability is substantially independent of energy emitted from the one or more energy conduits. ... International Business Machines Corporation

07/05/18 / #20180187460

Self-driving vehicle contextual lock control system

A computer-implemented method selectively controls locks on a self-driving vehicle. One or more processors receive sensor readings from sensors on a self-driving vehicle (sdv) that describe a vehicle context assessment of the sdv and a passenger context assessment of a passenger in the sdv. ... International Business Machines Corporation

07/05/18 / #20180187309

Pretreatment of iron-based substrates for electroless plating

A method of electrolessly plating an iron-based substrate, including immersing an iron-based substrate in an acidic solution, immersing the iron-based substrate in a basic complexing solution, immersing the iron-based substrate in a catalytic metal solution including a catalytic metal, and immersing the iron-based substrate in an electroless nickel plating solution or an electroless cobalt plating solution.. . ... International Business Machines Corporation

07/05/18 / #20180187301

Functionally graded material by in-situ gradient alloy sputter deposition management

Embodiments relate to a sputter chamber with a configurable surface in communication with a target material. A control system is in communication with the chamber and functions to prepare an alloy film by changing a composition of the configurable surface. ... International Business Machines Corporation

07/05/18 / #20180186928

Side-chain-functionalized polyhydroxyalkanoate materials

A process of forming a side-chain-functionalized polyhydroxyalkanoate (pha) material is disclosed. The process includes forming a pha material having a hydroxyl-terminated side-chain. ... International Business Machines Corporation

07/05/18 / #20180186473

Drone hotel and system, method and computer program product for a drone hotel

A drone hotel including a plurality of compartments arranged in a docking array for selectively docking at least one drone in a compartment and a connector disposed in each compartment for providing a connection to the docked drone of the compartment, a location of the plurality of compartments in the docking array is based on a function provided in the compartment and a drone hotel control method, system, and computer program product for the same.. . ... International Business Machines Corporation

07/05/18 / #20180186451

Deployment of lubricant with an unmanned aerial vehicle

A system for lubricating a machine. The system includes an unmanned aerial vehicle configured to fly to a lubrication location proximate the machine. ... International Business Machines Corporation

07/05/18 / #20180186366

Self-driving vehicle collision management system

A method generates and implements a real-time amelioration action for ameliorating an imminent collision between a self-driving vehicle (sdv) and an object. One or more processors detect that an imminent collision by a self-driving vehicle (sdv) is imminent with a confidence c1, and determine whether the sdv has an occupant of occupant type p with a confidence c2. ... International Business Machines Corporation

07/05/18 / #20180186364

Cargo vehicle loading control

A method, system, and/or computer program product controls positioning of cargo being loaded onto a cargo vehicle based on sensor readings from another cargo vehicle. One or more processors receive output from a cargo sensor that describes shifting experienced by a first cargo while being transported by a first cargo vehicle and based on the output, determine that the first cargo has shifted beyond a predetermined amount. ... International Business Machines Corporation

07/05/18 / #20180186212

System, method and computer program product for an air quality amelioration action

A computer-implemented air quality amelioration method, computer program product, and system for a self-driving vehicle, the method including detecting a value of an air quality within a cabin of the self-driving vehicle and performing an amelioration action to improve the value of the air quality based on the detection of the value of the air quality being less than a predetermined value.. . ... International Business Machines Corporation

07/05/18 / #20180185945

Solder paste misprint cleaning

A processor receives solder paste information, where the solder paste information describes a solder paste used in assembly of a printed circuit board. A processor determines a minimum magnetic force required for removing the solder paste from the printed circuit board based on the solder paste information. ... International Business Machines Corporation

07/05/18 / #20180185944

Solder paste misprint cleaning

A processor receives solder paste information, where the solder paste information describes a solder paste used in assembly of a printed circuit board. A processor determines a minimum magnetic force required for removing the solder paste from the printed circuit board based on the solder paste information. ... International Business Machines Corporation

07/05/18 / #20180185704

Normalizing scores of one or more predefined segments to establish pace comparisons of actors that participate in physical activities on the predefined segments

A computer-implemented method, according to one embodiment, includes calculating or receiving a normalized score for each segment of at least one route based on physical route conditions and environmental route conditions of the associated route, generating a pace comparison of multiple actors participating in a physical activity under different route conditions, and outputting the pace comparison. The pace comparison is based on the normalized scores of the segments of the route associated with each respective actor and a pace of each respective actor on the respective route. ... International Business Machines Corporation

07/05/18 / #20180185500

Functionalized nanomaterials

A functionalized nanomaterial, such as a nanoparticle, can include a polythioaminal functionalized surface. The polythioaminal linked to the surface of the nanomaterial can be bonded to a compound such as therapeutic and/or diagnostic materials. ... International Business Machines Corporation

07/05/18 / #20180184637

System, method and computer program product for locust swarm amelioration

A locust swarm amelioration method, system, and computer program product, includes detecting a locust swarm either about to form, or having formed, and controlling a drone to perform an amelioration action against the locust swarm about to form or having been formed.. . ... International Business Machines Corporation

06/28/18 / #20180183887

Generation of content recommendations

A computer identifies data detailing usage of a first set of one or more applications by a first user and a first set of users, and information associated with usage of a second set of one or more applications by the first set of users. The computer determines one or more similarity coefficients between the first user and the first set of users and determines an overall predicted taste score for each content associated with the second set of one or more applications based on the determined one or more similarity coefficients. ... International Business Machines Corporation

06/28/18 / #20180183877

Distributed load processing using forecasted location-based internet of things device clusters

For distributed processing using forecasted location-based iot device clusters, at a central iot device, a data source that is to be used and a duration for processing a workload is determined. A set of iot devices operating within a threshold distance from the data source at a first time is selected. ... International Business Machines Corporation

06/28/18 / #20180183864

Automated etl resource provisioner

Aspects automatically provisioning of cloud resources for etl job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an sql commands against a relational database. ... International Business Machines Corporation

06/28/18 / #20180183863

Automated etl resource provisioner

Aspects automatically provision cloud resources for extract, transform and load job execution as a function of optimizer output data. Aspect access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing structured english query language command against a relational database. ... International Business Machines Corporation

06/28/18 / #20180183800

Choosing object names based on storage unit (su) and/or memory device availability

A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and functions. ... International Business Machines Corporation

06/28/18 / #20180183747

Analyzing messages in social networks

Embodiments of the invention provide a computer-implemented method, computing system and computer program product for analyzing a message in a social network. The method comprises identifying an entity from the message; detecting historical popularity of the entity in a social network; identifying a topic from the message; detecting historical popularity of the topic in the social network; and generating an entity-topic correlation factor for the entity and the topic based on the historical popularity of the entity and the historical popularity of the topic. ... International Business Machines Corporation

06/28/18 / #20180183707

Initiating an action based on a determined navigation path data structure

A current sharing, in a system by a first user, of first content with at least one other user can be detected. A navigation path data structure indicating at least one navigation path from a second content to the first content within a network environment can be automatically determined. ... International Business Machines Corporation

06/28/18 / #20180183519

Establishing optical communication links

Aspects of the present invention disclose a method, computer program product, and system for establishing an optical communication link. The method includes one or more processors controlling an optical detection apparatus to scan an environment to detect at least one marker. ... International Business Machines Corporation

06/28/18 / #20180182892

Precise junction placement in vertical semiconductor devices using etch stop layers

A semiconductor device is provided that includes a first of a source region and a drain region comprised of a first semiconductor material, wherein an etch stop layer of a second semiconductor material present within the first of the source region and the drain region. A channel semiconductor material is present atop the first of the source region and the drain region. ... International Business Machines Corporation

06/28/18 / #20180182848

Forming nanosheet transistors with differing characteristics

A method of forming a transistor in an integrated circuit device can include forming a first and second nanosheet structure with alternating sheets of silicon and silicon germanium. A first and second transistor structure are constructed using the first and second nanosheet structures as first and second channels. ... International Business Machines Corporation

06/28/18 / #20180182720

Thin low defect relaxed silicon germanium layers on bulk silicon substrates

A strain relaxed silicon germanium layer that has a low defect density is formed on a surface of a silicon substrate without causing wafer bowing. The strain relaxed silicon germanium layer is formed using multiple epitaxial growing, bonding and transferring steps. ... International Business Machines Corporation

06/28/18 / #20180182687

Phase changing on-chip thermal heat sink

A method of forming an on-chip heat sink includes forming a device on a substrate. The method also includes forming a plurality of insulator layers over the device. ... International Business Machines Corporation

06/28/18 / #20180182686

Counter-flow expanding channels for enhanced two-phase heat removal

A structure for cooling an integrated circuit. The structure may include; an interposer cold plate having at least two expanding channels, each expanding channel having a flow direction from a channel inlet to a channel outlet, the flow direction having different directions for at least two of the at least two expanding channels, the channel inlet having an inlet width and the channel outlet having an outlet width, wherein the inlet width is less than the outlet width.. ... International Business Machines Corporation

06/28/18 / #20180182672

Ir assisted fan-out wafer level packaging using silicon handler

A support structure for use in fan-out wafer level packaging is provided that includes, a silicon handler wafer having a first surface and a second surface opposite the first surface, a release layer is located above the first surface of the silicon handler wafer, and a layer selected from the group consisting of an adhesive layer and a redistribution layer is located on a surface of the release layer. After building-up a fan-out wafer level package on the support structure, infrared radiation is employed to remove (via laser ablation) the release layer, and thus remove the silicon handler wafer from the fan-out wafer level package.. ... International Business Machines Corporation

06/28/18 / #20180182156

Storing and comparing three-dimensional objects in three-dimensional storage

A computer-implemented method includes receiving first data representing a first physical object that has three dimensions. The first data may be stored, by a computer processor, as a first digital object representing the first physical object. ... International Business Machines Corporation

06/28/18 / #20180182151

Text-to-articulatory movement

According to an embodiment of the present invention, a computer-implemented method for modeling text-to-articulatory movement conversion is provided. In the method, text features are generated for a plurality of texts, wherein the text feature comprises a phoneme. ... International Business Machines Corporation

06/28/18 / #20180182103

3d segmentation reconstruction from 2d slices

Registration-based interpolation between images slices is provided. In various embodiments, a plurality of 2d images is read. ... International Business Machines Corporation

06/28/18 / #20180181979

Incentive-based crowdvoting using a blockchain

An instant operation may include one or more of creating a smart contract identifying content and review requirements for performing a review of the content, signing and validating the smart contract, storing the smart contract in a blockchain, receiving content review feedback from one or more reviewers of the content, and amending the blockchain to include the content review feedback.. . ... International Business Machines Corporation

06/28/18 / #20180181970

System and method for providing preview results for search systems integrating multiple collections

A system and method for providing previews of search results and, more particularly, to a system and method for providing preview results for search systems integrating multiple collections. The method includes providing search results associated with a first collection based on at least one search term and providing a customizable preview of search results for the at least one search term. ... International Business Machines Corporation

06/28/18 / #20180181896

Policy-based scaling of computing resources in a networked computing environment

Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. ... International Business Machines Corporation

06/28/18 / #20180181774

Encryption engine with an undetectable/tamper-proof private key in late node cmos technology

A private key of a public-private key pair with a corresponding identity is written to an integrated circuit including a processor, a non-volatile memory, and a cryptographic engine coupled to the processor and the non-volatile memory. The private key is written to the non-volatile memory. ... International Business Machines Corporation

06/28/18 / #20180181744

User trusted device for detecting a virtualized environment

A computer to boot from a user trusted device, the user trusted device comprising a connection interface enabling connection with said computer, the method comprising: enabling said computer to start booting from the user trusted device upon connection of the user trusted device with said computer via said connection interface; instructing a processor of the computer to execute virtualization sensitive code and issue completion data upon completion of execution, which completion data depends on the virtualization sensitive code and its execution by the processor; determining, based on said completion data, whether the execution was not performed in a virtualized environment; and enabling said computer to complete booting from the user trusted device upon determining that the execution was not performed in a virtualized environment. The invention is further directed to a user trusted device enabling this method and to related systems.. ... International Business Machines Corporation

06/28/18 / #20180181722

Eliciting habit formation via coordination between patient and patient care team

Mechanisms are provided for implementing a personalized health care management system. The mechanisms receive a personalized health care plan for a patient, and dynamic patient monitoring data from patient monitoring devices associated with the patient. ... International Business Machines Corporation

06/28/18 / #20180181721

Continuous health care plan coordination between patient and patient care team

Mechanisms are provided for implementing a personalized health care management system. The mechanisms receive a personalized health care plan for a patient having at least one health goal of the patient, and dynamic patient monitoring data from one or more patient monitoring devices associated with the patient. ... International Business Machines Corporation

06/28/18 / #20180181711

Continuous health care plan coordination and habit eliciting patient communications

Mechanisms are provided to implement a personalized health care management system. The mechanisms receive a personalized health care plan for a patient, and dynamic patient monitoring data from one or more patient monitoring devices associated with the patient. ... International Business Machines Corporation

06/28/18 / #20180181687

Accommodating engineering change orders in integrated circuit design

A method includes receiving a register-transfer-level description and a gate-level description for an integrated circuit design. The gate-level description includes one or more spare latches implemented as reconfigurable latch filler cells. ... International Business Machines Corporation

06/28/18 / #20180181686

Accommodating engineering change orders in integrated circuit design

A method includes receiving a register-transfer-level description and a gate-level description for an integrated circuit design. The gate-level description includes one or more spare latches implemented as reconfigurable latch filler cells. ... International Business Machines Corporation

06/28/18 / #20180181627

Method and system for processing data in a parallel database environment

An exemplary computer implemented method for processing data in a database management system implemented on a network of two or more nodes is disclosed. The method includes receiving a query referencing first and second user-defined table functions and a table distributed across the two or more nodes. ... International Business Machines Corporation

06/28/18 / #20180181523

Adjustment of buffer credits and other parameters in a startup phase of communications between a plurality of channels and a control unit

A control unit provides a number of buffer credits, to one or more channels, in response to an initiation of a startup phase of communication between the one or more channels and the control unit, where the provided number of buffer credits when used for transferring data causes transfer ready operations but no retry operations. The control unit iteratively increases the number of buffer credits by an amount that is high enough to eliminate any transfer ready operations or cause retry operations to occur within a predetermined amount of time from the initiation of the startup phase.. ... International Business Machines Corporation

06/28/18 / #20180181516

Programming interface operations in a driver in communication with a port for reinitialization of storage controller elements

A driver of a host bus adapter of a storage controller performs hardware resets of buses and other logic to which an embedded port of the host bus adapter is connected, in a first period of quiescing of i/o operations in the embedded port. The driver transmits one or more commands to the embedded port to resume selected i/o operations in the embedded port. ... International Business Machines Corporation

06/28/18 / #20180181497

Invoking demote threads on processors to demote tracks from a cache

Provided are a computer program product, system, and method for invoking demote threads on processors to demote tracks from a cache. A plurality of demote ready lists indicate tracks eligible to demote from the cache. ... International Business Machines Corporation

06/28/18 / #20180181428

Adjusting virtual machine migration plans based on alert conditions related to future migrations

Migration of virtual machines within a computing environment is facilitated. A processor obtains a current virtual machine to host mapping in the computing environment, as well as a plurality of future virtual machine to host mappings. ... International Business Machines Corporation

06/28/18 / #20180181427

Feedback analysis for virtual machines manager scheduling

Embodiments of the present invention include a method for running a virtual manager scheduler for scheduling activities for virtual machines. The method may include: defining a schedule for one or more activities to be executed for a virtual machine; applying an adjustment to the schedule in accordance with feedback information received via a virtual machine client aggregating the feedback information from a plurality of virtual machine clients, each being related to a virtual machine, per scheduled activity type; and determining of a group adjustment for a determined group of the virtual machine clients based on a function of the feedback information of the plurality of virtual machine clients.. ... International Business Machines Corporation

06/28/18 / #20180181389

Synchronizing comments in source code with text documents

Various embodiments synchronize comments in a source code file with text of a source code document. In one embodiment, a source code document is compared to a corresponding source code file. ... International Business Machines Corporation

06/28/18 / #20180181332

Expanding a dispersed storage network memory beyond two locations

A method for a dispersed storage network includes generating expansion encoded data slices for identified expansion storage units of an expanded set of storage units. The method continues by relocating at least some of the expanded set of storage units to at least one other existing storage site associated with at least one other storage target and at least one new storage site associated with at least one storage target of a desired plurality of storage targets and relocating at least some storage units of the at least one other existing storage site to the existing storage site and to the at least one new storage site, facilitating population of the relocated at least some storage units of the at least one other existing storage site with corresponding encoded data slices and synchronizing, on an ongoing basis, storage of common data in each storage target.. ... International Business Machines Corporation

06/28/18 / #20180181327

Method, apparatus or software for transferring a storage replication system between storage systems

A method, apparatus or software is disclosed for transferring storage replication system configurations between heterogeneous storage systems. Storage replication system configuration data for a source storage system is translated from a source form into a canonical form for representing a storage replication system. ... International Business Machines Corporation

06/28/18 / #20180181314

Dispersed bloom filter for determining presence of an object

A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and functions. ... International Business Machines Corporation

06/28/18 / #20180180989

Modifying design layer of integrated circuit (ic)

Various embodiments include approaches for modifying a design layer of an integrated circuit (ic). In some cases, an approach includes: identifying at least one empty region in a design layer used to form the ic; determining whether the at least one empty region requires a fill object; placing at least one fill object in the at least one empty region and tagging the at least one fill object in response to determining the at least one empty region requires a fill object; performing a simplified optical proximity correction (opc) on the tagged at least one fill object and a complete opc on the design layer; and generating a modified design layer including a corrected version of the design layer and modified fill objects after the performing of the simplified opc on the tagged at least one fill object and the complete opc on the design layer.. ... International Business Machines Corporation

06/28/18 / #20180179052

Micro-electro-mechanical system (mems) structures and design structures

Micro-electro-mechanical system (mems) structures, methods of manufacture and design structures are disclosed. The method includes forming a micro-electro-mechanical system (mems) beam structure by venting both tungsten material and silicon material above and below the mems beam to form an upper cavity above the mems beam and a lower cavity structure below the mems beam.. ... International Business Machines Corporation

06/28/18 / #20180178912

Drone receiver

Embodiments of the present invention provide an apparatus comprising a body including a cavity for storing one or more packages, and a conveyor belt disposed above a top surface of the body. The belt is shaped to receive one or more packages, and the belt is controllable to rotate a package placed on the belt either from the top surface to the cavity for storage or from the cavity to the top surface for dispatch. ... International Business Machines Corporation

06/28/18 / #20180178168

Anti-fouling coatings with star polymers for filtration membranes

A porous membrane with a molecular weight cut-off (mwco) greater than about 10 kda, and a coating on at least a portion of a major surface of the porous membrane. The coating includes a star polymer having a hydrophobic core and hydrophilic arms, wherein the hydrophobic core contacts the porous membrane.. ... International Business Machines Corporation

06/21/18 / #20180176795

Visual representation of signal strength using machine learning models

. . . . Information about a signal device is received at a first location in a first physical environment. The signal device broadcasts a signal to a computing device. ... International Business Machines Corporation

06/21/18 / #20180176794

Visual representation of signal strength using machine learning models

Information about a signal device is received at a first location in a first physical environment. The signal device broadcasts a signal to a computing device. ... International Business Machines Corporation

06/21/18 / #20180176758

Notification of potentially problematic textual messages

A processor may determine, using natural language processing, a writing style of content of a composed message written by a composer. The processor may analyze, using natural language processing, a set of previous message written by the composer. ... International Business Machines Corporation

06/21/18 / #20180176657

Social delivery of iptv streams

Delivery of internet protocol television (iptv) content, in one aspect, may comprise monitoring social media streams. Trends may be identified from the social media streams, the trends describing interests in iptv content by location, time and subscriber types. ... International Business Machines Corporation

06/21/18 / #20180176371

System and methods for providing voice transcription

A system and methods is provided for providing sip based voice transcription services. A computer implemented method includes: transcribing a session initiation protocol (sip) based conversation between one or more users from voice to text transcription; identifying each of the one or more users that are speaking using a device sip_id of the one or more users; marking the identity of the one or more users that are speaking in the text transcription; and providing the text transcription of the speaking user to non-speaking users.. ... International Business Machines Corporation

06/21/18 / #20180176322

Smart cache for offline data availability

At an application executing in a system, a usage pattern of the system and an entry in a data use history of the system are analyzed. Responsive to the analyzing, a data item is identified for caching at the system, wherein the data item is accessible to the system from at a remote data processing system over a data network at a present time, and the data item will be requested from the system at a future time when no network connectivity will be available to the system. ... International Business Machines Corporation

06/21/18 / #20180176317

Fog computing for machine translation

Pre-emptive configuration of a fog computing environment for on-demand services is provided. On-demand services are supported by service modules. ... International Business Machines Corporation

06/21/18 / #20180176316

Updating time-related information in post to make it more relevant for the requester on subsequent retrieval of post

A method, system and computer program product for updating the time-related information in a post to make it more relevant for the requester on a subsequent retrieval of the post. A post with a reference to an event or activity (e.g., “leaving for florida in 3 days”) is identified using natural language processing. ... International Business Machines Corporation

06/21/18 / #20180176315

Updating time-related information in post to make it more relevant for the requester on subsequent retrieval of post

A method, system and computer program product for updating the time-related information in a post to make it more relevant for the requester on a subsequent retrieval of the post. A post with a reference to an event or activity (e.g., “leaving for florida in 3 days”) is identified using natural language processing. ... International Business Machines Corporation

06/21/18 / #20180176303

Tape reconstruction from object storage

A computer-implemented method, according to one embodiment, includes: receiving a request for a set of data at a first data storage tier, looking up corresponding metadata to each portion of the requested set of data, using the metadata to recall each of the portions of the requested set of data from object storage, and using the portions of the requested set of data to recompile a master object, the master object having a 1-to-1 mapping to the requested set of data. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation

06/21/18 / #20180176296

Dynamic client-based leader election

A method, including deploying multiple servers as a distributed computing system (dcs) configured to provide a service to clients. At a first time, a given server is configured as an active node in the dcs, the active node configured to and to process requests for the service received from the clients. ... International Business Machines Corporation

06/21/18 / #20180176275

Moving a portion of a streaming application to a public cloud based on sensitive data

A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be increased, selects based on the sensitive data which portion(s) of the streaming application can be moved to a public cloud. The streams manager then interacts with the public cloud manager to move the selected portion(s) of the streaming application to the public cloud. ... International Business Machines Corporation

06/21/18 / #20180176253

Placement of operators and encryption of communication based on risk in a computer system node

A streams manager assesses the security risk of streaming communication and dynamically migrates operators of a streaming application based on the security risk. The streams manager may also dynamically change encryption of intranode communication between the operators to increase performance of the computer node. ... International Business Machines Corporation

06/21/18 / #20180176229

Decentralized automated software updates via blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example operation may comprise one or more of identifying an updated software build, creating a hash based on the updated software build, storing the hash of the updated software build in a blockchain, and storing a binary representation of the updated software build in a distributed hash table (dht).. ... International Business Machines Corporation

06/21/18 / #20180176228

Monitoring actions performed by a network of peer devices using a blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties. One example may comprise one or more of creating one or more control commands configured to control one or more smart devices, signing the one or more control commands via a key maintained by an entity creating the control commands, broadcasting the one or more control commands to the one or more smart devices, and storing the one or more control commands in a blockchain. ... International Business Machines Corporation

06/21/18 / #20180176176

Dns resolution of overlapping domains in a mutli-tenant computing environment

A method and associated systems for a multi-tenant dns mechanism. A multi-tenant computing environment hosts multiple private overlay networks, each of which comprises one tenant's domain. ... International Business Machines Corporation

06/21/18 / #20180176167

Email chain navigation

Technical solutions are described to arbitrarily order and access email messages based on text analysis and social network analysis. One general aspect includes a system that includes an email server and an email client. ... International Business Machines Corporation

06/21/18 / #20180176163

Automatic summarization of emails and generation of subject lines

Embodiments include techniques for performing automated email summarization and subject line generation. The technique includes determining, by a computing system, that an email exceeds a threshold length, and responsive to determining that the email exceeds the threshold length, executing an email summarization. ... International Business Machines Corporation

06/21/18 / #20180176146

Management of storage cluster performance with hybrid workloads

Embodiments relate to management of hybrid workloads in a shared pool of configurable computer resources. Resource utilization in the shared pool is dynamically tracked, and employed for assessing a set of servers a parallel access protocol should utilize for one or more i/o requests in conjunction with any serial workload optimizations. ... International Business Machines Corporation

06/21/18 / #20180176137

Enforcing datacenter-level congestion control

At an application executing in conjunction with a vswitch in a host system, a cwnd value is computed corresponding to a flow from a vm using a period measured by a timer and a number of packets of the flow received and acknowledged in response packets, the number being counted by a counter, the timer being associated with a packet of the flow. The cwnd value is stored in a field in a response packet received from a receiver of the flow, the field being designated for carrying a rwnd value, the response packet corresponding to a packet in the flow. ... International Business Machines Corporation

06/21/18 / #20180176127

Multipathing using a network of overlays

For multipathing using a network of overlays, a set of virtual network interfaces (vnics) corresponding to a physical network interface (pnic) is created in a first data processing system. A first virtual network interface (vnic) from the set of vnics is bound to a virtual machine (vm) executing in a first data processing environment across a data network from the first data processing system. ... International Business Machines Corporation

06/21/18 / #20180175608

Distributed environment analog multiplexor with high-voltage protection

An analog multiplexer includes a plurality of voltage-protecting transmission gate circuits to select an input voltage signal among different input signals. Each voltage-protecting transmission gate circuit includes a pass gate pfet interconnected between an input pfet and an output pfet, as well as a parallel pass gate nfet. ... International Business Machines Corporation

06/21/18 / #20180175454

Thin film lithium ion battery

A method for forming a thin film lithium ion battery includes, under a same vacuum seal, forming a stack of layers on a substrate including an anode layer, an electrolyte, a cathode layer and a first cap over the stack of layers to protect the layers from air. Under a same vacuum seal, the stack of layers is etched with a non-reactive etch process in accordance with a hardmask, and a second cap layer is formed over the stack of layers without breaking the vacuum seal. ... International Business Machines Corporation

06/21/18 / #20180175242

Plasmonic light emitting diode

A light emitting diode includes a square quantum well structure, the quantum well structure including iii-v materials. A dielectric layer is formed on the quantum well structure. ... International Business Machines Corporation

06/21/18 / #20180175212

Vertical transistor including controlled gate length and a self-aligned junction

A vertical transistor includes a gate structure interposed between a proximate spacer doped with a first dopant-type and a distal spacer doped with the first dopant-type. The proximate spacer is formed on an upper surface of a semiconductor substrate. ... International Business Machines Corporation

06/21/18 / #20180175174

Shallow, abrupt and highly activated tin extension implant junction

Embodiments are directed to a method of forming a semiconductor device and resulting structures having a shallow, abrupt and highly activated tin (sn) extension implant junction. The method includes forming a semiconductor fin on a substrate. ... International Business Machines Corporation

06/21/18 / #20180174988

Corrosion resistant aluminum bond pad structure

A method of manufacturing a bond pad structure may include depositing an aluminum-copper (al—cu) layer over a dielectric layer; and depositing an aluminum-chromium (al—cr) layer directly over the al—cu layer.. . ... International Business Machines Corporation

06/21/18 / #20180174969

Self-aligned vertical transistor with local interconnect

A metallization scheme for vertical field effect transistors (fets) is provided. By forming lower-level local interconnects connecting source regions located at bottom portions of semiconductor fins, and upper-level interconnects connecting adjacent metal gates located along sidewalls of channel regions of the semiconductor fins, electrical connections to the source regions and the metal gates can be provided through the lower-level local interconnects and the upper-level local interconnects, respectively. ... International Business Machines Corporation

06/21/18 / #20180174949

Metal cored solder decal structure and process

A system of producing metal cored solder structures on a substrate includes: a decal, a carrier, and receiving elements. The decal includes one or more apertures each of which is tapered from a top surface to a bottom surface thereof. ... International Business Machines Corporation

06/21/18 / #20180174903

Semiconductor device with reduced via resistance

A method of fabricating a semiconductor interconnect structure by providing a semiconductor structure with a dielectric layer with and an embedded electrically conductive structure. A dielectric capping layer and a metal capping layer separating a second dielectric layer located above the first dielectric layer. ... International Business Machines Corporation

06/21/18 / #20180174899

Barrier layers in trenches and vias

A semiconductor structure includes a dielectric layer having a trench formed therein and a barrier layer formed on a bottom and sidewalls of the trench, and on a top surface of the dielectric layer. The trench comprises a flared top gap opening and additional area at the bottom such that the top and bottom of the trench are wider than sidewalls of the trench. ... International Business Machines Corporation

06/21/18 / #20180174882

Thermoplastic temporary adhesive for silicon handler with infra-red laser wafer de-bonding

A bonding material including a phenoxy resin thermoplastic component, and a carbon black filler component. The carbon black filler component is present in an amount greater than 1 wt. ... International Business Machines Corporation

06/21/18 / #20180174852

Sacrificial shorting straps for superconducting qubits

A technique relates to protecting a tunnel junction. A first electrode paddle and a second electrode paddle are on a substrate. ... International Business Machines Corporation

06/21/18 / #20180174847

Method of lateral oxidation of nfet and pfet high-k gate stacks

A method for fabricating a semiconductor circuit includes obtaining a semiconductor structure having a gate stack of material layers including a high-k dielectric layer; oxidizing in a lateral manner the high-k dielectric layer, such that oxygen content of the high-k dielectric layer is increased first at the sidewalls of the high-k dielectric layer; and completing fabrication of a n-type field effect transistor from the gate stack after laterally oxidizing the high-k dielectric layer of the gate stack.. . ... International Business Machines Corporation

06/21/18 / #20180174844

Hybrid iii-v technology to support multiple supply voltages and off state currents on same chip

Techniques for forming dual iii-v semiconductor channel materials to enable fabrication of different device types on the same chip/wafer are provided. In one aspect, a method of forming dual iii-v semiconductor channel materials on a wafer includes the steps of: providing a wafer having a first iii-v semiconductor layer on an oxide; forming a second iii-v semiconductor layer on top of the first iii-v semiconductor layer, wherein the second iii-v semiconductor layer comprises a different material with an electron affinity that is less than an electron affinity of the first iii-v semiconductor layer; converting the first iii-v semiconductor layer in at least one second active area to an insulator using ion implantation; and removing the second iii-v semiconductor layer from at least one first active area selective to the first iii-v semiconductor layer.. ... International Business Machines Corporation

06/21/18 / #20180174671

Cognitive adaptations for well-being management

Disclosed aspects relate to cognitive adaptations for well-being management in a living environment. A set of sensor-derived data for the living environment may be ingested. ... International Business Machines Corporation

06/21/18 / #20180174666

Testing content addressable memory and random access memory

The present invention provides a system and method of testing cams and rams. In an exemplary embodiment, the system includes a multiple input signature register (misr) logically coupled to digital outputs of a cam, to digital inputs of a ram, and to digital outputs of an abist controller circuit, where the misr includes a plurality of l1 latch circuits logically coupled to a plurality of l2 latch circuits, a plurality of multiplexer circuits logically coupled to the plurality of l1 latch circuits, a plurality of exclusive or circuits (inner xor circuits) logically coupled to the plurality of mux circuits and to the plurality of l2 latch circuits, and at least two xor circuits (outer xor circuits), each of the outer xor circuits logically coupled to one of the inner xor circuits, to at least one of the mux circuits, and to at least one of the l2 latch circuits.. ... International Business Machines Corporation

06/21/18 / #20180174645

Overvoltage protection for a fine grained negative wordline scheme

A fine grained negative wordline scheme for sram memories is disclosed. The scheme includes a circuit having a static random access memory (sram) cell including at least a wordline coupled to a plurality of nfets of a transistor array. ... International Business Machines Corporation

06/21/18 / #20180174330

Mobile user interface design testing tool

A tool for verifying a user interface (ui) design of a mobile application is provided. The tool receives a screenshot of the application's ui operating at a target device and retrieves a reference ui design image that corresponds to the received screenshot. ... International Business Machines Corporation

06/21/18 / #20180174204

Collaboration group recommendations derived from request-action correlations

In response to a user-initiated interaction request sent by a user using an electronic communication, subsequent actions performed by other users that received the user-initiated interaction request are analyzed. A determination is made as to whether the subsequent actions performed by the other users that received the user-initiated interaction request correlate to an intended interaction result of the user-initiated interaction request. ... International Business Machines Corporation

06/21/18 / #20180174155

Mapping user actions to historical paths to determine a predicted endpoint

A first signature log generated by a first processing system is received, the first signature log including a first listing of at least a recorded series of user inputs received by a computer program. The first listing of the recorded series of user inputs can be compared to at least one historical log indicating at least one historical path, each historical path including at least second listing of a series of historical user inputs that corresponds to a historical endpoint in the computer program. ... International Business Machines Corporation

06/21/18 / #20180174143

Differential commit time in a blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example method of operation may include one or more of identifying a blockchain transaction including a buyer and a seller and a product or service, identifying one or more attributes of the blockchain transaction, initializing a sale commit time window assigned to the blockchain transaction based on the one or more attributes, and committing the blockchain transaction to a blockchain when the sale commit time window has elapsed.. ... International Business Machines Corporation

06/21/18 / #20180174112

Physical location scheduling management

Disclosed aspects relate to physical location scheduling management. A meetup event having a set of parameters which includes a set of users may be detected. ... International Business Machines Corporation

06/21/18 / #20180174111

Physical location scheduling management

Disclosed aspects relate to physical location scheduling management. A meetup event having a set of parameters which includes a set of users may be detected. ... International Business Machines Corporation

06/21/18 / #20180174097

Tracking shipments with a local and remote blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example method of operation may comprise one or more of identifying shipment locations for a product shipment, storing the shipment locations in a local blockchain, transmitting the shipment locations to a remote blockchain, comparing the shipment locations of the remote blockchain with the shipment locations stored in the local blockchain, and verifying the shipment locations of the remote blockchain are consistent with the shipment locations stored in the local blockchain.. ... International Business Machines Corporation

06/21/18 / #20180174094

Blockchain-based food product shelf-life management

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example method of operation may comprise one or more of identifying a production date associated with a product, creating a unique code to represent the production date and the product based on a hash of one or more blocks of a blockchain, and forwarding the unique code to a verification server to verify the product.. ... International Business Machines Corporation

06/21/18 / #20180174069

System and method for improving problematic information technology device prediction using outliers

A computer-implemented method of increasing reliability of an information technology environment comprising a plurality of hardware devices. Training data is received and a random forest is built from the training data using machine learning. ... International Business Machines Corporation

06/21/18 / #20180174048

Estimating cardinality selectivity utilizing artificial neural networks

A database query comprising predicates may be received. Each predicate may operate on database columns. ... International Business Machines Corporation

06/21/18 / #20180174029

Synaptic neural network core based sensor system

A sensor system comprises: an energy storage device electrically coupled to an intermittent energy release device that causes the energy storage device to release stored energy intermittently; a sensor electrically coupled to the energy storage device, where the sensor detects physical events occurring at a physical device and is intermittently powered by electrical energy received from the energy storage device; a synaptic neural network core electrically coupled to the sensor, where the synaptic neural network core converts sensor readings into an object that describes the physical events occurring at the physical device; a transponder electrically coupled to the synaptic neural network core; and a storage buffer within the transponder, where the storage buffer stores the object for transmission from the transponder to a monitoring system, where the intermittent energy release device provides power to the sensor in response to the transponder transmitting the object to the monitoring system.. . ... International Business Machines Corporation

06/21/18 / #20180173887

Enabling secure big data analytics in the cloud

Methods are provided for enabling secure big data analytics in the cloud. A method includes reading a secure file, by a secure distributed file system in a public cloud service provider. ... International Business Machines Corporation

06/21/18 / #20180173880

Verifying proper operation of the instruction execution protection architecture

A computer-implemented method includes executing one or more tests on a computing device. The computing device has instruction execution protection (iep), and each test of the one or more tests includes selectively setting one or more iep bits of one or more page tables, where each iep bit prevents code in a respective storage block from being executed. ... International Business Machines Corporation

06/21/18 / #20180173861

Access control of software applications based on biometric identifiers

In one implementation, the present invention is directed to a method for controlling access to a software application using one or more processors configured by code, the method comprising repeating a usage verification cycle continually during a usage session of the software application, wherein each repetition of the usage verification cycle includes receiving a digital image of an access area used to access the software application, identifying a representation of one or more persons in the digital image, estimating an age of each one of the persons within the digital image, and comparing the estimated age of each one of the persons within the digital image to a predetermined age value provided in a usage policy dataset associated with at least of one of the persons within the digital image. The method further comprises interrupting the usage of the software application in response to the age of at least one of the persons within the digital image exceeding the predetermined age value provided in a usage policy dataset.. ... International Business Machines Corporation

06/21/18 / #20180173857

Prevention of unauthorized resource updates

Embodiments include method, systems and computer program products for preventing unauthorized resource updates. In some embodiments, it may be determined that a mainframe computer is not within a service period. ... International Business Machines Corporation

06/21/18 / #20180173853

Cognitive adaptations for well-being management

Disclosed aspects relate to cognitive adaptations for well-being management in a living environment. A set of sensor-derived data for the living environment may be ingested. ... International Business Machines Corporation

06/21/18 / #20180173833

Callback based constraint processing for clock domain independence

A method, system and computer program product perform timing analysis of an integrated circuit design with callback-based constraint processing for clock domain independence. A timing graph representation of the integrated circuit design includes nodes interconnected by edges. ... International Business Machines Corporation

06/21/18 / #20180173820

Inferring ecological niche model input layers

An aspect includes aggregating a plurality of disparate datasets into a document store with semi-structured attributes that includes a plurality of documents specifying a plurality of different geo spatial locations and a plurality of different environmental parameters. Niche model layers are generated for the environmental parameters at the geospatial locations based on contents of the document store. ... International Business Machines Corporation

06/21/18 / #20180173817

Automated attribute propagation and hierarchical consistency checking for non-standard extensions

Examples of techniques for automated attribute propagation and hierarchical consistency checking are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: detecting, by a processor, a non-standard extension during convergence of an integrated circuit logic design; propagating, by the processor, the non-standard extension to each level of a plurality of hierarchies of the integrated circuit design for which a net utilizes a special constraint; and verifying, by the processor, a hierarchy consistency across each level of the plurality of hierarchies.. ... International Business Machines Corporation

06/21/18 / #20180173816

Device array locks and keys

This invention relates to a system, method, and computer program product for managing a plurality of devices with associated lock mechanisms. According to one embodiment, a method is provided comprising: detecting, by one or more computer processors, a status of a device corresponding to a lock mechanism; recommending, by one or more computer processors, a service action on the device requiring performance by an operator; and providing, by one or more computer processors, a printable key pattern for printing a key that allows the operator to lock and unlock the lock mechanism in order to perform the service action.. ... International Business Machines Corporation

06/21/18 / #20180173795

Automatic ontology generation

An ontology is automatically generated for a set of data from multiple data sources. A semantic network of known concepts serves as an ontology template for a target domain of knowledge with known concepts defined as base entity types. ... International Business Machines Corporation

06/21/18 / #20180173775

Database process with virtual nodes

A database processing system includes a coordinator agent controller and a virtual node data base. The coordinator agent controller detects a request to access a database by an application program and to extracts database objects from a database protocol stream based on a requirement requested by the application program. ... International Business Machines Corporation

06/21/18 / #20180173773

Database process with virtual nodes

A database processing system includes a coordinator agent controller and a virtual node data base. The coordinator agent controller detects a request to access a database by an application program and to extracts database objects from a database protocol stream based on a requirement requested by the application program. ... International Business Machines Corporation

06/21/18 / #20180173765

Determining a collection of data visualizations

A set of transition characteristics can be identified. The set of transition characteristics can include continuities and discontinuities between data fields and data visualization channels among a plurality of data visualizations. ... International Business Machines Corporation

06/21/18 / #20180173759

Query restart based on changing system resources and an amount of data change

Techniques are described for re-starting queries based on an expected amount of data to be changed in a database. Embodiments of the present disclosure may generally receive a first query to be executed against a database, and start execution of the first query against the database according to a first access plan. ... International Business Machines Corporation

06/21/18 / #20180173758

Query restart based on changing system resources and an amount of data change

Techniques are described for re-starting queries based on system resource availability. Embodiments of the present disclosure may generally receive a query to be executed against a database, determine, based on an amount of available system resources, a first access plan to use for executing the query against the database, and start execution of the query against the database according to the first access plan. ... International Business Machines Corporation

06/21/18 / #20180173744

Determining integrity of database workload transactions

Evaluating integrity of database workloads includes receiving transactional database lock commands from concurrent users and identifying a usage pattern of lock actions when results of an execution of the transactional database lock commands match a usage pattern for a data integrity rule. The data integrity rule is added to a set of one or more data integrity rules for the transactional database lock commands. ... International Business Machines Corporation

06/21/18 / #20180173737

Optimizing tables with too many columns in a database

Systems for database optimization include a database rebuild module configured to compact columns in an unoptimized database that co-appear in queries to the unoptimized database into a single hyper-column to form an optimized database. A database interface module is configured to accept queries according to a schema for the unoptimized database and to translate the accepted queries into queries according to a schema for the optimized database.. ... International Business Machines Corporation

06/21/18 / #20180173735

System and method for dynamically estimating data classification job progress and execution time

Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for providing classification job estimation for a data security platform comprising one or more data sources, the method comprising: for each of the one or more data sources: counting the number of databases; counting the number of tables in each database; selecting a random database; selecting a random table within the random database; retrieving a database data sample from the random table; measuring one or more latencies associated with issuing and retrieving the database data sample; measuring a processing time required to evaluate the database data sample against one or more policy rules; compiling one or more mean times for the latencies and processing times; and calculating a data source scan time using the one or more mean times and the number of tables in each database; and calculating a total estimation time through summation of each of the one or more data source scan times compiled for each of the one or more data sources.. . ... International Business Machines Corporation

06/21/18 / #20180173719

Shared document editing in the blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example operation may comprise one or more of identifying determining a shared file is being edited by one or more entities, identifying one or more changes to the shared file while the shared file is being edited, signing the one or more changes with one or more public keys, and adding the one or more changes to a blockchain.. ... International Business Machines Corporation

06/21/18 / #20180173718

Data restructuring of deduplicated data

Various embodiments for enhancing storage of deduplicated data in a computing storage environment. Analytics are applied to at least one data storage characteristic observed in the computing storage environment to restructure the deduplicated data in a more sequential manner so as to enhance performance of the computing storage environment. ... International Business Machines Corporation

06/21/18 / #20180173630

Target cache line arbitration within a processor cluster

A computer-implemented method for managing cache memory in a distributed symmetric multiprocessing computer is described. The method may include receiving, at a first central processor (cp) chip, a fetch request from a first chip. ... International Business Machines Corporation

06/21/18 / #20180173591

Manipulating a distributed agreement protocol to identify a desired set of storage units

A method includes obtaining, by a computing device, a plurality of sets of encoded data slices for storage in memory of a dispersed storage network (dsn). The method further includes identifying, by the computing device, a desired set of storage units within pools of storage units for storing the plurality of sets of encoded data slices. ... International Business Machines Corporation

06/21/18 / #20180173586

Method for fault handling in a distributed it environment

An improved method provides fault handling in a distributed it environment. The distributed it environment executes a workflow application interacting with at least one application by using interface information about the at least one application. ... International Business Machines Corporation

06/21/18 / #20180173582

Dual physical-channel systems firmware initialization and recovery

Aspects of the present invention include a method, system and computer program product. The method includes a processor operating first and second physical channel identifier (pchid) devices comprised of a plurality of functional logic components, wherein one or more of the functional logic components are specific to one or more of the first and second pchids and wherein one or more of the functional logic components are in common and not specific to one or more of the first and second pchids; determining that an error condition exists in the first pchid or the second pchid; executing a recovery method to remove the error condition from the first pchid or the second pchid in which the error condition exists; and executing, by the processor, an initialization method for both of the first and second pchids.. ... International Business Machines Corporation

06/21/18 / #20180173566

Workload-to-cloud migration analysis based on cloud aspects

Methods and systems for evaluating compatibility of a cloud of computers to perform one or more workload tasks. One or more computing solution aspects are determined that corresponding to one or more sets of workload factors, where the workload factors characterize one or more workloads, to characterize one or more computing solutions. ... International Business Machines Corporation

06/21/18 / #20180173556

Optimizing runtime performance of an application workload by minimizing network input/output communications between virtual machines on different clouds in a hybrid cloud topology during cloud bursting

A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (i/o) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram. ... International Business Machines Corporation

06/21/18 / #20180173524

Isa-ported container images

A software container image that includes components dependent on a first computer instruction set architecture (isa) is ported to enable a container to execute using the container image on a computer having a second isa different from the first. Porting the container image entails replacing components of the container image not compatible with the second isa with equivalent components compatible with the second isa. ... International Business Machines Corporation

06/21/18 / #20180173523

Cross-validation based code feature tagging

Method and systems for tagging code include organizing code units in a hierarchical structure that associates the code units with respective description units. The hierarchical structure is filtered to remove un-meaningful description units from the hierarchical structure. ... International Business Machines Corporation

06/21/18 / #20180173513

Optimized creation of distributed storage and distributed processing clusters on demand

A mechanism is provided in a data processing system for creating clusters on demand. The mechanism installs a cluster on the data processing system. ... International Business Machines Corporation

06/21/18 / #20180173512

Optimized creation of distributed storage and distributed processing clusters on demand

A mechanism is provided in a data processing system for creating clusters on demand. The mechanism installs a cluster on the data processing system. ... International Business Machines Corporation

06/21/18 / #20180173509

On-demand codeset converter generation

A computer-implemented method includes receiving from a codeset compiler a request for a codeset converter to convert from a source codeset to a target codeset. A mapping table is generated responsive to the request, where the mapping table maps from the source codeset to the target codeset. ... International Business Machines Corporation

06/21/18 / #20180173508

Generating code for real-time stream processing

A computer-implemented method for generating code for real-time stream processing, where data is streamed in tuples. One or more processors receive source code which includes code to be applied in a sequential series to one or more tuples. ... International Business Machines Corporation

06/21/18 / #20180173507

Generating code for real-time stream processing

A computer-implemented method for generating code for real-time stream processing, where data is streamed in tuples, and where each tuple has a timestamp and a value. One or more processors receive source code. ... International Business Machines Corporation

06/21/18 / #20180173505

Mobile accessibility evaluation from application binary

An approach is provided that identifies interface changing events in the binary executable of an application. The approach generates code modules that are directed at evaluating accessibility requirements pertaining to the identified interface changing events. ... International Business Machines Corporation

06/21/18 / #20180173455

Storage profiler for a computer operating system

Embodiments include a technique for operating a storage profiler for a computer operating system. The technique includes analyzing statements of an application to identify instructions that are associated with obtaining storage and statements that alter storage values in the obtained storage upon entry to every compile unit in the application, and overlaying storage statement hooks on the identified instructions and the identified statements. ... International Business Machines Corporation

06/21/18 / #20180173446

Pre-allocating save areas of a memory

Examples of techniques for pre-allocating save areas of memory of a computer processing system are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include initiating, by a host processing device, a control program. ... International Business Machines Corporation

06/21/18 / #20180173440

Low latency lateral decoding of data for retrieval from magnetic tape

In one embodiment, a method includes reading a plurality of narrow-spread (ns) codewords from m tracks of a magnetic tape medium using a plurality of read elements, the plurality of ns codewords collectively comprising data logically organized as a predetermined number of two-dimensional arrays. Rach two-dimensional array includes a predetermined number of ns codewords positioned orthogonally to a predetermined number of wide-spread (ws) codewords, with a first ns codeword from a first two-dimensional array being read in its entirety from the magnetic tape medium prior to reading a second ns codeword from the first two-dimensional array. ... International Business Machines Corporation

06/21/18 / #20180173439

Logical format utilizing lateral encoding of data for storage on magnetic tape

In one embodiment, a method includes receiving data to store to a magnetic tape medium using a tape drive, the data being organized into a predetermined number of two-dimensional arrays, each two-dimensional array including a plurality of narrow-spread (ns) codewords positioned orthogonally to a plurality of wide-spread (ws) codewords (relative spread referring to space occupied on the magnetic tape medium when written). The method also includes successively writing each of the ns codewords onto a plurality of tracks of the magnetic tape medium using a first number of channels of the tape drive capable of writing data to tape tracks simultaneously. ... International Business Machines Corporation

06/21/18 / #20180173429

Predictive scheduler for memory rank switching

Scheduling memory accesses in a memory system having a multiple ranks of memory, at most r ranks of which may be powered up concurrently, in which r is less than the number of ranks. If fewer than r ranks are powered up, a subset of requested powered down ranks is powered up, such that at r ranks are powered up, the subset of requested powered down ranks to be powered up including the most frequently accessed requested powered down ranks. ... International Business Machines Corporation

06/21/18 / #20180173428

Predictive scheduler for memory rank switching

Scheduling memory accesses in a memory system having a multiple ranks of memory, at most r ranks of which may be powered up concurrently, in which r is less than the number of ranks. If fewer than r ranks are powered up, a subset of requested powered down ranks is powered up, such that at r ranks are powered up, the subset of requested powered down ranks to be powered up including the most frequently accessed requested powered down ranks. ... International Business Machines Corporation

06/21/18 / #20180173423

Tape processing offload to object storage

A computer-implemented method, according to one embodiment, includes: receiving a data volume having data from multiple tenants therein; separating data in the data volume into objects using tenant identifiers from metadata corresponding to portions of the data, wherein each object corresponds to a respective tenant; and storing the objects in object storage. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation

06/21/18 / #20180173287

Managing electrical power in a virtual power delivery network

Systems and methods are provided for managing power to devices in a virtual power delivery network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving device information from one or more devices connected in a virtual power delivery network. ... International Business Machines Corporation

06/21/18 / #20180172745

On-demand detection of electromagnetic disturbances using mobile devices

A subset of mobile devices is selected from a set of mobile devices located in a local area. From a mobile device in the subset, a magnetic measurement value obtained by performing a magnetic measurement is received. ... International Business Machines Corporation

06/21/18 / #20180172654

Humidity and sulfur concentration in test chamber

A method is provided. The method may include controlling a relative humidity in a sample chamber by circulating air sequentially from the sample chamber through a humidity control chamber and back to the sample chamber, and controlling a pollutant concentration in the sample chamber by circulating air sequentially from the sample chamber to a pollutant control chamber and back to the sample chamber.. ... International Business Machines Corporation

06/21/18 / #20180172632

Detection of translocation events using graphene-based nanopore assemblies

Translocation events are sensed using composite nanopore assemblies including nanopores formed in graphene sheets. Single molecule detection and characterization and multi-molecule characterization and identification are provided using such assemblies. ... International Business Machines Corporation

06/21/18 / #20180172466

Creating route based on image analysis or reasoning

A method, system and computer program product for creating a route are disclosed. In embodiments, the method comprises identifying a start location and a destination for a user; identifying defined needs of the user; obtaining satellite imagery of a specified area between the start location and the destination. ... International Business Machines Corporation

06/14/18 / #20180168051

Coating metal foil with n-heterocyclic carbene compounds containing organic functionalities for improving metal-to-resin adhesion

A carbene-coated metal foil is produced by applying an n-heterocyclic carbene (nhc) compound to one or more surfaces of a metal foil (e.g., an electrodeposited copper foil having a surface that is smooth and non-oxidized). The nhc compound contains a matrix-reactive pendant group that includes at least one of a vinyl-, allyl-, acrylic-, methacrylic-, styrenic-, amine-, amide- and epoxy-containing moiety capable of reacting with a base polymer (e.g., a vinyl-containing resin such as a polyphenylene oxide/triallyl-isocyanurate (ppo/taic) composition). ... International Business Machines Corporation

06/14/18 / #20180168038

Multi-stacked electronic device with defect-free solder connection

A method includes forming a multi-stacked electronic device having two or more electronic components, each of the electronic components includes a leadframe, the leadframes of each electronic component are physically joined together using a non-solder metal joining process to form a joint, and the joint is located outside a solder connection region.. . ... International Business Machines Corporation

06/14/18 / #20180168030

Implementing reworkable strain relief packaging structure for electronic component interconnects

A method and structure are provided for implementing enhanced reworkable strain relief packaging for electronic component interconnects. A plurality of custom strain relief pads is provided with a component footprint wiring layout on a component carrier or a component. ... International Business Machines Corporation

06/14/18 / #20180167887

Energy efficient location tracking on smart phones

A gps-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the gps-enabled cellular electronic device. ... International Business Machines Corporation

06/14/18 / #20180167818

Security enabled predictive mobile data caching

An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing device, retrieving external data associated with network service availability, predicting a location the user is travelling to based on the personal user data retrieved, determining a data security risk profile associated with the location predicted, based on the personal user data and the external data retrieved, determining data to be prefetched in advance of a user request for the data, wherein the data is determined based on an analysis of the personal user data retrieved, the location predicted and the data security risk profile and prefetching the data determined in advance of the user request for the data.. . ... International Business Machines Corporation

06/14/18 / #20180167817

Security enabled predictive mobile data caching

An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing device, retrieving external data associated with network service availability, predicting a location the user is travelling to based on the personal user data retrieved, determining a data security risk profile associated with the location predicted, based on the personal user data and the external data retrieved, determining data to be prefetched in advance of a user request for the data, wherein the data is determined based on an analysis of the personal user data retrieved, the location predicted and the data security risk profile and prefetching the data determined in advance of the user request for the data.. . ... International Business Machines Corporation

06/14/18 / #20180167583

Dynamic video image management

Disclosed aspects relate to dynamic video image management. A set of dynamic image quality factors may be collected with respect to a dynamic video image. ... International Business Machines Corporation

06/14/18 / #20180167582

Dynamic video image management

Disclosed aspects relate to dynamic video image management. A set of dynamic image quality factors may be collected with respect to a dynamic video image. ... International Business Machines Corporation

06/14/18 / #20180167579

Dynamic video image management

Disclosed aspects relate to dynamic video image management. A set of dynamic image quality factors may be collected with respect to a dynamic video image. ... International Business Machines Corporation

06/14/18 / #20180167479

Systems and methods to anonymize web browsing

A method includes sending one or more messages, from a computing device to a server, to cause the server to establish a connection with the computing device, to cause the server to identify a first set of anonymization characteristics, and to cause the server to instantiate a first instance of an access application within a first cloud container using the first set of anonymization characteristics. The method also includes receiving, by the computing device, second data from the server via the connection. ... International Business Machines Corporation

06/14/18 / #20180167475

Dynamic distribution of persistent data

A dynamic data distribution system allows publication of data values for hierarchical keys (paths) and subscriptions to key (path) patterns which include wildcard characters. Permission to publish or subscribe is controlled by an access control list associated with each key. ... International Business Machines Corporation

06/14/18 / #20180167464

Systems and methods to anonymize web browsing

A method includes, in response to a request from a computing device, establishing a connection between a server and the computing device. The method additionally includes identifying a first set of anonymization characteristics for a first instance of an access application. ... International Business Machines Corporation

06/14/18 / #20180167454

Load-balancing input/output requests in clustered storage systems

A computer-implemented method for load-balancing client input/output (i/o) requests in a clustered storage system may include receiving a request by a first node of a clustered storage system from a client to initiate a session between the client and the first node. The request may specify a multi-channel communication session. ... International Business Machines Corporation

06/14/18 / #20180167448

Self-recoverable multitenant distributed clustered systems

A mechanism is provided for automatically recovering one or more distributed cluster nodes on a host system. Responsive to the host system recovering, restoring, or restarting, a set of distributed clustered systems affected due to the reboot of the host system and details associated with each of the set of distributed clustered systems are identified. ... International Business Machines Corporation

06/14/18 / #20180167447

Self-recoverable multitenant distributed clustered systems

A mechanism is provided tor automatically recovering one or more distributed cluster nodes on a host system. Responsive to the host system recovering, restoring, or restarting, a set of distributed clustered systems affected due to the reboot of the host system and details associated with each of the set of distributed clustered systems are identified. ... International Business Machines Corporation

06/14/18 / #20180167411

Protecting against notification based phishing attacks

A method, system and computer program product are disclosed for protecting against notification based phishing attacks on a computing device. In an embodiment, the method comprises when the computing device receives a notification, identifying a pattern for the notification and identifying an application that triggered the notification; determining if the identified pattern matches any of a defined group of pre-specified patterns, each of the pre-specified patterns being associated with a specified application; when the identified pattern matches one of the pre-specified patterns, determining if the specified application associated with the matched pattern is the same as the application that triggered the notification; and when the specified application associated with the matched pattern is not the same as the application that triggered the notification, generating a message to alert a user of the computing device that the received notification may be a phishing attack.. ... International Business Machines Corporation

06/14/18 / #20180167408

Method and system to prevent ultrasound data leaks in mobile devices

A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an operating system on a mobile computing device, and includes: an app flow analysis system that generates and maintains runtime flow graphs for apps running on the mobile device and analyzes the runtime flow graphs to identify a set of apps having confidential data flow application programming interfaces (apis) in their execution paths; a detector that further evaluates the set of apps having confidential data flow apis to identify a subset of vulnerable apps also having ultrasound emitting apis; and a runtime correlation system that flags a vulnerable app as a potential data leak when a call to an ultrasound emitting api is detected from the vulnerable app. ... International Business Machines Corporation

06/14/18 / #20180167388

Distributed storage of authentication data

A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted enrollment template comprises an encrypted mathematical representation of historical biometric data of the user, and wherein the biometric sample comprises a current snapshot of the biometric data. The biometric server decrypts the encrypted enrollment template to an enrollment template using an enrollment template key. ... International Business Machines Corporation

06/14/18 / #20180167385

Method and apparatus to identify and authorize caller via ultrasound

A system for authenticating an identity of an end-user on an electronic device associated with a subscriber is provided. The system includes: a processor in communication with a server, the processor being configured to perform a method including: storing, at the server, a signal database registered to a client end-user, the processor being configured to retrieve, from the signal database, an ultrasound signature associated with the client end-user; establishing an active communication with the end-user on the electronic device to initiate an end-user voice call; identifying, using the end-user voice call, an ultrasound signature associated with the end-user; and dynamically verifying the ultrasound signature associated with the end-user with the ultrasound signature of the client-end user to validate the end-user voice call, while maintaining the active communication with the end-user.. ... International Business Machines Corporation

06/14/18 / #20180167358

Generating and managing names of instances

A method includes provisioning, by a cloud provisioning server, a first instance based on a template. The template belongs to a tenant, and the first instance includes one of an instantiated software and an instantiated computing service. ... International Business Machines Corporation

06/14/18 / #20180167310

Data flow configuration in hybrid system of silicon and micro-electro-mechanical-switch (mems) elements

Certain embodiments of the present disclosure provide a method for communicating data flows. The method generally includes receiving control flow information corresponding to a data flow for communication from a first device to a second device, and determining one or more characteristics of the data flow based on the control flow information. ... International Business Machines Corporation

06/14/18 / #20180167292

Rerouting data of a streaming application

A streams manager monitors performance of a streaming application and determines if operators are underperforming according to a threshold. When the performance needs to be improved, the streams manager automatically modifies the flow graph to offload or reroute a stream of data, or part of a stream of data, to a similar operator to more efficiently utilize streaming resources. ... International Business Machines Corporation

06/14/18 / #20180167291

Visualization of analysis results of contents

A method, system and computer program product for visualizing analysis results of contents. Contents collected from various kinds of communication tools are read into memory. ... International Business Machines Corporation

06/14/18 / #20180167290

Visualization of analysis results of contents

A method, system and computer program product for visualizing analysis results of contents. Contents collected from various kinds of communication tools are read into memory. ... International Business Machines Corporation

06/14/18 / #20180167284

Discovery of a set of nodes in a network

Methods and systems for discovery of a set of nodes in a network. The method comprises selecting a node amongst nodes in a group of nodes to be processed; and instructing to implement a discovery procedure for the selected node. ... International Business Machines Corporation

06/14/18 / #20180167273

Determining identities for executing cloud processing and approvers of the executing

A method includes configuring, by a cloud provisioning server, a first user identity to execute a provisioning to provision an instance. The instance to be provisioned includes one of an instantiated software resource and a computing service. ... International Business Machines Corporation

06/14/18 / #20180167270

Configuring and naming of cloud provisioning entities

A method includes configuring, by a cloud provisioning server, a first cloud domain. The first cloud domain and a second cloud domain use at least one of the same operating system and the same system resource pool. ... International Business Machines Corporation

06/14/18 / #20180167267

Performing actions that have been defined for provisioned instances

A method includes provisioning, by a cloud provisioning server, an instance of a software resource or service for an end user. The provisioning is based on a template for the software resource or service. ... International Business Machines Corporation

06/14/18 / #20180167217

Container-based operating system and method

In a distributed network hosting a shared pool of configurable computing resources there is provided one or more system instances of a blockchain. Each system instance comprises a virtual machine and a set of containers. ... International Business Machines Corporation

06/14/18 / #20180166631

Small molecule acceptors derived from renewable furan source

Embodiments described herein provide a precursor for synthesizing a number of molecules for use in organic photovoltaics. The precursor is diiodo-furopyran (dfp), such as dibromo-dfp (dbdfp), to be used to synthesize a number of different molecules for use in organic photovoltaics. ... International Business Machines Corporation

06/14/18 / #20180166586

Monolithically integrated thin-film device with a solar cell, an integrated battery, and a controller

A thin-film monolithically integrated solar module with a solar cell, an integrated energy storage device, and a controller may be provided. It may comprise a thin-film solar cell, having at least one solar diode, on a transparent substrate, a thin-film energy storage device, and an electronic controller comprising at least one thin-film transistor above the thin-film energy storage device. ... International Business Machines Corporation

06/14/18 / #20180166577

Gate-all-around fin device

A gate-all around fin double diffused metal oxide semiconductor (dmos) devices and methods of manufacture are disclosed. The method includes forming a plurality of fin structures from a substrate. ... International Business Machines Corporation

06/14/18 / #20180166563

Lateral bipolar junction transistor with controlled junction

A method of forming a lateral bipolar junction transistor (lbjt) that includes providing a germanium containing layer on a crystalline oxide layer, and patterning the germanium containing layer stopping on the crystalline oxide layer to form a base region. The method may further include forming emitter and collector extension regions on opposing sides of the base region using ion implantation, and epitaxially forming an emitter region and collector region on the crystalline oxide layer into contact with the emitter and collector extension regions. ... International Business Machines Corporation

06/14/18 / #20180166561

Contact structure and extension formation for iii-v nfet

Finfet devices including iii-v fin structures and silicon-based source/drain regions are formed on a semiconductor substrate. Silicon is diffused into the iii-v fin structures to form n-type junctions. ... International Business Machines Corporation

06/14/18 / #20180166456

Integration of floating gate memory and logic device in replacement gate flow

After forming a first sacrificial gate stack over a portion of a first semiconductor fin located in a logic device region of a substrate, and a second sacrificial gate stack over a portion of a second semiconductor fin located in a memory device region of the substrate, in which each of the first sacrificial gate stack and the second sacrificial gate stack includes, from bottom to top, a tunneling oxide portion, a floating gate electrode, a control oxide portion, a gate conductor and a gate cap, an entirety of the first sacrificial gate stack is removed to provide a first gate cavity, and only the gate cap and the gate conductor are removed from the second sacrificial gate stack to provide a second gate cavity. Next, a high-k gate dielectric and a gate electrode are formed within each of the first gate cavity and the second gate cavity.. ... International Business Machines Corporation

06/14/18 / #20180166398

Core-shell particles for anti-tampering applications

Devices and methods for resisting or preventing physical tampering of electronic components are described. A tamper resistant apparatus comprises a tampering sensor having a surface at which a first and second conductive portion are disposed. ... International Business Machines Corporation

06/14/18 / #20180166336

Self-aligned contact cap

A method for forming a semiconductor device includes recessing a gate conductor in a gate structure to form a first divot, forming a gate cap in the first divot and recessing a dielectric fill that encapsulates the gate structures to a position below a top of the gate cap. An extension layer is deposited over the dielectric fill and the top of the gate cap and is planarized to the top of the gate cap. ... International Business Machines Corporation

06/14/18 / #20180166278

Resist having tuned interface hardmask layer for euv exposure

A method is disclosed to prepare a substrate for photolithography. The method includes forming an underlayer over a surface of the substrate; depositing an interface hardmask layer on the underlayer using one of a vapor phase deposition process or an atomic layer deposition process; and forming a layer of extreme uv (euv) resist on the interface hardmask layer, where the interface hardmask layer is comprised of material having a composition and properties tuned to achieve a certain secondary electron yield from the interface hardmask layer. ... International Business Machines Corporation

06/14/18 / #20180166277

Resist having tuned interface hardmask layer for euv exposure

A method is disclosed to prepare a substrate for photolithography. The method includes forming an underlayer over a surface of the substrate; depositing an interface hardmask layer on the underlayer using one of a vapor phase deposition process or an atomic layer deposition process; and forming a layer of extreme uv (euv) resist on the interface hardmask layer, where the interface hardmask layer is comprised of material having a composition and properties tuned to achieve a certain secondary electron yield from the interface hardmask layer. ... International Business Machines Corporation

06/14/18 / #20180166098

Magnetic recording module having differing tunnel valve sensors

An apparatus according to one embodiment includes a module having an array of first read transducers each having a tunnel valve structure and a second read transducer coupled to the array of first read transducers, the second read transducer having a tunnel valve structure. The apparatus also includes a controller, and a cable coupling the read transducers to the controller, thereby forming a plurality of circuits extending from the controller, each circuit corresponding to one of the transducers. ... International Business Machines Corporation

06/14/18 / #20180166096

Magnetic recording module having tunnel valve sensors with dissimilar tunnel barrier resistivities

An apparatus according to one embodiment includes a first read transducer having a tunnel valve structure, and a second read transducer coupled to the first read transducer. The second read transducer has a tunnel valve structure as well, but the tunnel valve structure of the first read transducer has a different resistivity than the tunnel valve structure of the second read transducer. ... International Business Machines Corporation

06/14/18 / #20180166067

Using recurrent neural network for partitioning of audio data into segments that each correspond to a speech feature cluster identifier

Audio features, such as perceptual linear prediction (plp) features and time derivatives thereof, are extracted from frames of training audio data including speech by multiple speakers, and silence, such as by using linear discriminant analysis (lda). The frames are clustered into k-means clusters using distance measures, such as mahalanobis distance measures, of means and variances of the extracted audio features of the frames. ... International Business Machines Corporation

06/14/18 / #20180166066

Using long short-term memory recurrent neural network for speaker diarization segmentation

Speaker diarization is performed on audio data including speech by a first speaker, speech by a second speaker, and silence. The speaker diarization includes segmenting the audio data using a long short-term memory (lstm) recurrent neural network (rnn) to identify change points of the audio data that divide the audio data into segments. ... International Business Machines Corporation

06/14/18 / #20180165969

Method for prioritizing and transmitting data generated from an airplane during flight

A method, system, and computer product for transmitting data generated from an airplane includes collecting a plurality of flight data generated from the airplane, analyzing the plurality of flight data, generating a feedback signal based on an analyzed result on the plurality of flight data, selecting a first group of flight data from the plurality of flight data based on the feedback signal, changing a respective data resolution of each of the first group of flight data based on the feedback signal, providing each of the first group of flight data with the changed data resolution to a transmitting device, and transmitting, using the transmitting device, the first group of flight data with the changed data resolution.. . ... International Business Machines Corporation

06/14/18 / #20180165922

Alert processing

Controlling transmission of an alert to a user of a device providing audio. An event which is identified as an alert is detected, and it is determined that the alert is a notifiable alert. ... International Business Machines Corporation

06/14/18 / #20180165847

Interface for data analysis

A method, system and computer program product for generating instances of dashboards, each dashboard instance including a set of visualizations of analytical data, relating to a collection of data. User interaction data representative of a user's actions undertaken during data exploration of the collection of data is obtained. ... International Business Machines Corporation

06/14/18 / #20180165843

Interface for data analysis

A method, system and computer program product for generating instances of dashboards, each dashboard instance including a set of visualizations of analytical data, relating to a collection of data. User interaction data representative of a user's actions undertaken during data exploration of the collection of data is obtained. ... International Business Machines Corporation

06/14/18 / #20180165835

Tampering detection for digital images

A computing system for tampering detection for digital images is disclosed. The computing system uses a lti filter to filter time series data representing images in one or both of two videos and/or a still image of a live photo captured by a camera. ... International Business Machines Corporation

06/14/18 / #20180165724

Method and system for contextual business intelligence report generation and display

A method, system and computer program for generating a business intelligence report, comprising the steps of providing a user-operated device, whereby a user selects at least one keyword from an electronic document displayed on the user-operated device. The user then defines a contextual relationship between the keyword(s) and a business intelligence issue by way of annotations input by the user into the user-operated device. ... International Business Machines Corporation

06/14/18 / #20180165652

Assisting user in managing a calendar application

A method, system and computer program product for managing a calendar application. A need to optimize a calendar is identified. ... International Business Machines Corporation

06/14/18 / #20180165600

Dynamic message categorization for optimized message targeting

An automated dynamic message categorization system is provided and includes first, second and third processing units. The first processing unit is configured to generate a user interface (ui) and to present the ui to a user. ... International Business Machines Corporation

06/14/18 / #20180165580

Performance of time intensive question processing in a cognitive system

Mechanisms are provided for performing watched question processing. The mechanisms detect a change in content of electronic documents in a corpus of electronic documents, and retrieve a watched question from a watched question database. ... International Business Machines Corporation

06/14/18 / #20180165550

Signal classification using sparse representation

A system, method and computer program product is provided. An input signal for classification and a set of pre-classified signals are received, each comprising a vector representation of an object having a plurality of vector elements. ... International Business Machines Corporation

06/14/18 / #20180165549

Signal classification using sparse representation

A system, method and computer program product is provided. An input signal for classification and a set of pre-classified signals are received, each comprising a vector representation of an object having a plurality of vector elements. ... International Business Machines Corporation

06/14/18 / #20180165476

Interlocked blockchains to increase blockchain security

Systems and methods for preventing vulnerabilities in a blockchain due to quiescence are disclosed including submitting a first crosslink transaction for addition to a first blockchain that includes cross-referencing information for a second crosslink transaction that corresponds to the first crosslink transaction and submitting the second crosslink transaction for addition to a second blockchain that includes cross-referencing information corresponding to the first crosslink transaction. The first and second crosslink transactions are configured to be usable together by a user of at least one of the first and second blockchains to validate at least a portion of one of the first and second blockchains after a period of quiescence in the one of the first and second blockchains.. ... International Business Machines Corporation

06/14/18 / #20180165469

Access operation request management

Disclosed aspects relate to access operation management to a database management system (dbms) on a shared pool of configurable computing resources having a set of members. A map of the set of table names to the set of members may be established. ... International Business Machines Corporation

06/14/18 / #20180165457

Ranking security scans based on vulnerability information from third party resources

A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. ... International Business Machines Corporation

06/14/18 / #20180165445

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. ... International Business Machines Corporation

06/14/18 / #20180165444

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. ... International Business Machines Corporation

06/14/18 / #20180165419

Biometric disease growth prediction

Embodiments include methods, systems and computer program products for patterning and predicting the growth of infectious diseases through analysis of portable objects. Aspects include receiving biometric data from a plurality of nodes. ... International Business Machines Corporation

06/14/18 / #20180165415

Method and system for automatic knowledge-based feature extraction from electronic medical records

A method, device, and computer program storage product for generating a query to extract clinical features into a set of electronic medical record (emr) tables based on clinical knowledge. A knowledge tree is constructed according to a set of clinical knowledge data. ... International Business Machines Corporation

06/14/18 / #20180165405

Timing based net constraints tagging with zero wire load validation

A method is provided for facilitating an integrated circuit design layout. The method includes receiving a netlist including a plurality of subnets. ... International Business Machines Corporation

06/14/18 / #20180165392

Simulation employing level-dependent multitype events

In a data processing system, a processor creating level qualifying logic within instrumentation of a hardware description language (hdl) simulation model of a design. The level qualifying logic is configured to generate a first event of a first type for a first simulation level and to generate a second event of second type for a second simulation level. ... International Business Machines Corporation

06/14/18 / #20180165385

Constructing and enhancing a deployment pattern

An approach is provided for optimizing a deployment pattern. Event and configuration data of precedent systems is aggregated. ... International Business Machines Corporation

06/14/18 / #20180165377

System, method and computer program product for data transfer management

According to one aspect of the present disclosure a method and technique for managing data transfer includes receiving and storing a plurality of different data patterns anticipated to be encountered by a processor unit of a data processing system corresponding to a particular application being processed. Responsive to receiving a read request for data, the requested data is read from a memory subsystem, and the read data is compared by the memory subsystem to the stored data patterns. ... International Business Machines Corporation

06/14/18 / #20180165357

Dynamic message categorization for optimized message targeting

An automated dynamic message categorization system is provided and includes first, second and third processing units. The first processing unit is configured to generate a user interface (ui) and to present the ui to a user. ... International Business Machines Corporation

06/14/18 / #20180165356

Storage efficiency

A method, a processing device, and a computer program product are provided. At least two data elements common between multiple documents are combined into a combined group. ... International Business Machines Corporation

06/14/18 / #20180165355

Log-aided automatic query expansion approach based on topic modeling

A base query having a plurality of base query terms is obtained. A plurality of problem log files are accessed. ... International Business Machines Corporation

06/14/18 / #20180165347

Multi-dimensional analysis using named filters

Computer-implemented, multi-dimensional analysis can include storing, in a memory and using a processor, a named filter dimension as part of a multi-dimensional data model for a database. The named filter dimension includes a plurality of named filters with each named filter having an expression specifying a subset of original data of the database. ... International Business Machines Corporation

06/14/18 / #20180165346

Multi-dimensional analysis using named filters

Computer-implemented, multi-dimensional analysis can include storing, in a memory and using a processor, a named filter dimension as part of a multi-dimensional data model for a database. The named filter dimension includes a plurality of named filters with each named filter having an expression specifying a subset of original data of the database. ... International Business Machines Corporation

06/14/18 / #20180165328

Apply corrections to an ingested corpus

An approach is provided to correct documents ingested by a question answering (qa) system. A document previously ingested by the qa system is selected. ... International Business Machines Corporation

06/14/18 / #20180165325

Verifying data structure consistency across computing environments

According to one aspect of the present disclosure, a method and technique for verifying data structure consistency across computing environments includes computing a first signature for a data structure of an application subject to checkpointing corresponding to a first computing environment residing on a server computer. A second signature for the data structure of the application corresponding to a second computing environment residing on a client computer is computed. ... International Business Machines Corporation

06/14/18 / #20180165322

Fixing anomalies in a preserved data structure used to generate a temporary data structure during system initialization

Provided are a computer program product, system, and method for fixing anomalies in a preserved data structure used to generate a temporary data structure during system initialization. A preserved data structure in persistent storage is used to build a temporary data structure in a memory of the computing system during initialization of the computing system. ... International Business Machines Corporation

06/14/18 / #20180165319

Atomically moving data elements between or within linked data structures having no support for atomic moves

A technique for atomically moving a linked data element may include providing an atomic-move wrapper around the data element, along with an existence header whose status may be permanent, outgoing or incoming to indicate whether the data element is not in transition, or if in transition is either outgoing or incoming. The existence header may reference an existence group having a state field that changes state using a single store operation. ... International Business Machines Corporation

06/14/18 / #20180165307

Executing queries referencing data stored in a unified data layer

A mechanism is provided in a data processing system for executing queries referencing data stored in a unified data layer. A relational engine executing on the data processing system receives a structured query language (sql) query from a client. ... International Business Machines Corporation

06/14/18 / #20180165306

Executing queries referencing data stored in a unified data layer

A mechanism is provided in a data processing system for executing queries referencing data stored in a unified data layer. A relational engine executing on the data processing system receives a structured query language (sql) query from a client. ... International Business Machines Corporation

06/14/18 / #20180165296

Avoiding redundant presentation of content

A first application executing on a client device can access content and present the content to a user. An operating system of the client device can store into a database metadata identifying at least the content. ... International Business Machines Corporation

06/14/18 / #20180165292

Identifying partial update for tape file system

A request to open a file from a plurality of files in a storage is received from an application. The storage is made up of an index partition, containing recordings of file system indexes, and a data partition, containing recordings of the indexes and the file system data body. ... International Business Machines Corporation

06/14/18 / #20180165282

Worm data falsification detection

A computer determines the file system that contains a first partition, a second partition and a third partition. The first partition contains metadata comprising metadata associated with a worm-specified file, and metadata associated with a rewritable file. ... International Business Machines Corporation

06/14/18 / #20180165277

Dynamic translation of idioms

Dynamic translation of idioms is performed with respect to electronic communications. An idiom search application is activated which identifies an idiom within a phrase and searches a corpus for a translation of the idiom and one or more associated characteristics. ... International Business Machines Corporation

06/14/18 / #20180165275

Identification and translation of idioms

Identification and translation of idioms is performed with respect to electronic communications. Confusion with an expression is determined. ... International Business Machines Corporation

06/14/18 / #20180165274

Identification and processing of idioms in an electronic environment

Identification and processing of idioms is performed with respect to electronic communications. An expression is detected in connection with a potential idiom and a confidence level is assigned to the potential idiom. ... International Business Machines Corporation

06/14/18 / #20180165271

Optimization of sentence boundary placement

Natural language processing of raw text data for optimal sentence boundary placement. Raw text is extracted from a document and subject to cleaning. ... International Business Machines Corporation

06/14/18 / #20180165270

Preprocessing of string inputs in natural language processing

Natural language processing of raw text data for optimal sentence boundary placement. Raw text is extracted from a document and subject to cleaning. ... International Business Machines Corporation

06/14/18 / #20180165268

Determining a reading speed based on user behavior

Examples of techniques for determining a reading speed based on user behavior are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include monitoring, by a processing device, data continuously, wherein the data is generated by a sensor of the user device; determining, by the processing device, an orientation and a wobble of the user device based on the data generated by the sensor; determining, by the processing device, a reading speed of a user using the user device based on the orientation and the wobble; detecting, by the processing device, a change in at least one of the orientation and the wobble of the user device based on the data; and adjusting, by the processing device, the reading speed of the user using the user device based on the change in the at least one of the orientation and the wobble.. ... International Business Machines Corporation

06/14/18 / #20180165265

Indicating property inheritance in object hierarchies

A method for indicating property inheritance in object hierarchies is disclosed. In one embodiment, such a method includes enabling a user to select an object in an object hierarchy. ... International Business Machines Corporation

06/14/18 / #20180165239

Optimizing routing of a signal path in a semiconductor device

Methods are provided for optimizing a routing of a signal path in terms of delay and signal integrity in a semiconductor device. The signal path includes at least one track in a metal layer. ... International Business Machines Corporation

06/14/18 / #20180165233

Network controller - sideband interface port controller

A network interface controller includes a media access controller and a host adapter. The host adapter includes a transmit route connected to receive an in-band packet from a host and further connected to transmit the in-band packet to the media access controller. ... International Business Machines Corporation

06/14/18 / #20180165220

Expiring virtual content from a cache in a virtual universe

Approaches for expiring cached virtual content in a virtual universe are provided. In one approach, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe, an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe, the behavior indicating a likely future location of the avatar, and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe, wherein the cached virtual content associated with the avatar in the future location is maintained in the cache longer than cached virtual content associated with the avatar in another region of the virtual universe.. ... International Business Machines Corporation

06/14/18 / #20180165195

Reducing defragmentation in a multi-grained writeback cache

In one embodiment, a computer-implemented method includes selecting a cache block descriptor (cbd) from amongst a plurality of cbds stored to a cache storage device to defragment based on a determination of utilization of a particular fine block descriptor (fbd) having a first size that is allocated to the selected cbd. The cache storage device includes a free pool of fbds having various sizes that is available for use in the plurality of cbds. ... International Business Machines Corporation

06/14/18 / #20180165175

Common debug scripting framework for driving hybrid applications consisting of compiled languages and interpreted languages

Aspects of the present invention include a method which includes a processor providing a debug extension library; providing a common debug interface and at least two common debug interface implementations, a first one of the common debug interface implementations being dedicated to a native debugger of an interpreted language computer program, a second one of the common debug interface implementations being dedicated to a native debugger of a compiled language computer program, wherein an application contains a first portion written in an interpreted programming language and a second portion written in a compiled programming language; and responding to a user command provided through a debug script program to debug the application by commanding one of the native debugger of an interpreted language computer program or the native debugger of a compiled language computer program through the corresponding dedicated common debug interface implementation.. . ... International Business Machines Corporation

06/14/18 / #20180165169

Data storage system employing a hot spare to proactively store array data in absence of a failure or pre-failure event

A data storage system includes a controller, a hot spare storage device and a plurality of primary storage devices. The controller utilizes the hot spare storage device to mirror only a subset of each stripe of logical pages written across the data storage array, where the subset includes a logical page determined by a write input/output operation (iop) policy. ... International Business Machines Corporation

06/14/18 / #20180165162

Restore point calendar

A method for presenting options associated with restoring data is disclosed. In one embodiment, such a method includes providing a calendar, such as a monthly calendar, showing multiple days. ... International Business Machines Corporation

06/14/18 / #20180165137

Integrating heterogeneous business events in hybrid cloud environments

Systems, methods, and computer program products to perform an operation comprising receiving a request from a first application to receive business events from a second application, deploying a first connector selected according to a set of parameters specified in the request, receiving, by the first connector from the second application, a first unit of event data of a first format, and converting the first unit of event data to a second format specified in the request.. . ... International Business Machines Corporation

06/14/18 / #20180165128

Detecting application instances that are operating improperly

A method includes determining whether an application instance has properly used computing resources to process a workload request. The determination is based on one or more characteristics of the workload request to be processed. ... International Business Machines Corporation

06/14/18 / #20180165126

Enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping rcu grace periods finite

A technique for enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping read-copy update (rcu) grace periods finite. In an embodiment, a per-cpu indicator may be set to indicate that a cpu running the cpu-bound in-kernel workload has not reported an rcu quiescent state within a defined time. ... International Business Machines Corporation

06/14/18 / #20180165125

Enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping rcu grace periods finite

A technique for enabling real-time cpu-bound in-kernel workloads to run infinite loops while keeping read-copy update (rcu) grace periods finite. In an embodiment, a per-cpu indicator may be set to indicate that a cpu running the cpu-bound in-kernel workload has not reported an rcu quiescent state within a defined time. ... International Business Machines Corporation

06/14/18 / #20180165119

Application execution environment

An application is executed within an application execution environment. One or more service requests made by the executing application are monitored, and a service requesting profile is created for the application. ... International Business Machines Corporation

06/14/18 / #20180165111

Predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives

Embodiments include a technique for predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives is provided. Techniques include calculating a capacity requirement for each virtual server based on an administrator defined performance objective for each virtual server. ... International Business Machines Corporation

06/14/18 / #20180165109

Predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives

Embodiments include a technique for predictive virtual server scheduling and optimization of dynamic consumable resources to achieve priority-based workload performance objectives is provided. Techniques include calculating a capacity requirement for each virtual server based on an administrator defined performance objective for each virtual server. ... International Business Machines Corporation

06/14/18 / #20180165104

Executing instructions to store context information based on routine to be executed

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165103

Marking external sibling caller routines

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165102

Marking external sibling caller routines

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165095

Pointer associated branch line jumps for accelerated line jumps

A method includes a processor providing at least one line entry address tag in each line of a branch predictor; indexing into the branch predictor with a current line address to predict a taken branch's target address and a next line address; re-indexing into the branch predictor with one of a predicted next line address or a sequential next line address when the at least one line entry address tag does not match the current line address; using branch prediction content compared against a search address to predict a direction and targets of branches and determining when a new line address is generated; and re-indexing into the branch predictor with a corrected next line address when it is determined that one of the predicted next line address or the sequential next line address differs from the new line address.. . ... International Business Machines Corporation

06/14/18 / #20180165094

Branch predictor search qualification using stream length prediction

A computer-implemented method includes determining, by a stream-based index accelerator predictor of a processor, a predicted stream length between an instruction address and a taken branch ending an instruction stream. A first-level branch predictor of a hierarchical asynchronous lookahead branch predictor of the processor is searched for a branch prediction in one or more entries in a search range bounded by the instruction address and the predicted stream length. ... International Business Machines Corporation

06/14/18 / #20180165091

Marking sibling caller routines

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165082

Concurrent i/o enclosure firmware/field-programmable gate array (fpga) update in a multi-node environment

Provided are techniques for concurrent input/output (i/o) enclosure firmware/field-programmable gate array (fpga) update in a multi-node environment. First notifications are sent to each i/o enclosure management engine on each of a plurality of server nodes that code activation for a first set of i/o enclosures is starting. ... International Business Machines Corporation

06/14/18 / #20180165076

Context information based on type of routine being called

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165075

Call sequence generation based on type of routine

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165074

Suppressing storing of context information

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165073

Context information based on type of routine being called

Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling routine. ... International Business Machines Corporation

06/14/18 / #20180165063

Overflow detection for sign-magnitude adders

A circuit is provided which includes arithmetic computation logic configured to add or subtract operands of variable length to produce a result in a sign-magnitude data format. The circuit also includes an overflow detector to provide an overflow signal indicative of whether the result fits within a specified result length l. ... International Business Machines Corporation

06/14/18 / #20180165038

Techniques for storage command processing

A technique for handling storage commands includes receiving, by an interface node of a data storage system, a first storage command. The interface node determines whether the first storage command is a head of queue (hoq) command. ... International Business Machines Corporation

06/14/18 / #20180165033

Identification of volumes for thin provisioning

One embodiment provides a method, including: generating, for each of a plurality of storage volumes, an actual used storage capacity model and identifying a potential storage capacity savings using the actual used capacity model, wherein each of the plurality of storage volumes has been identified as a candidate for migration to a thin provisioned volume; generating, for each of the plurality of storage volumes, an input/output profile model and identifying a potential change in performance of an application accessing the storage volume using the input/output profile model; generating, for each of the plurality of storage volumes, a growth profile and identifying a potential change in capacity using the growth profile; and determining, using an optimization algorithm, a subset of the plurality of storage volumes to be migrated to thin provisioned volumes based upon the volume capacity model, the performance model, and the volume growth profile.. . ... International Business Machines Corporation

06/14/18 / #20180165030

Dynamic management of memory allocation in a database

A method for managing memory allocation in a database receives an invocation of a stored statement defined to allocate objects, each with a stored size. The method determines an actual size relating to the invocation and determines a preferred statement among defined statements with defined object sizes. ... International Business Machines Corporation

06/14/18 / #20180165027

Copy-redirect on write

A system, method, and computer program product for managing storage volumes in a point-in-time copy cascade. A processor swaps a host portion of a source volume with a host portion of a snapshot point-in-time copy volume. ... International Business Machines Corporation

06/14/18 / #20180165022

Health-aware garbage collection in a memory system

A data storage system includes a controller that controls a non-volatile memory array including a plurality of garbage collection units of physical memory. For each of the plurality of garbage collections units storing valid data, the controller determines an invalidation metric and a health-based adjustment of the invalidation metric. ... International Business Machines Corporation

06/14/18 / #20180165021

Adaptive health grading for a non-volatile memory

A data storage system includes a controller that controls a non-volatile memory array including a plurality of blocks. The controller assigns blocks to a plurality of different health grades. ... International Business Machines Corporation

06/14/18 / #20180165019

Optimized reading of multiple objects from tape

A method for restoring multiple objects from tape is disclosed. In one embodiment, such a method (1) generates a list of objects to be restored from tape and (2) identifies a starting location of a first object on the tape. ... International Business Machines Corporation

06/14/18 / #20180165017

Reduced data access time on tape with data redundancy

A computer-implemented method, according to one embodiment, includes: selecting a first tape to write a first copy of a first portion of data to, sending an instruction to write the first copy of the first portion of data to a first partition on the first tape, wherein the first tape has at least the first partition and a second partition, selecting a second tape that is different than the first tape to write a second copy of the first portion of data to, and sending an instruction to write the second copy of the first portion of data to a second partition on the second tape, wherein the second tape has at least a first partition and the second partition. The first partition on each of the first and second tapes is closer to a beginning of the respective tape than the second partition on the respective tape.. ... International Business Machines Corporation

06/14/18 / #20180165008

Memory transaction prioritization

Examples of techniques for memory transaction prioritization for a memory are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: the method may further include: allocating, by a memory controller, a reserved portion of the memory controller to process prioritized transactions; receiving, by the memory controller, a request transaction from a processor to the memory, wherein the request transaction comprises a priority; determining, by the memory controller, whether the priority of the request transaction is above a priority threshold; and responsive to determining that the priority of the request transaction is above the priority threshold, executing the request using the reserved portion of the memory controller.. ... International Business Machines Corporation

06/14/18 / #20180165007

Touchscreen keyboard

Operating a touch-screen device includes displaying at least a portion of a keyboard on a touch-screen, detecting a touch on the touch-screen, and detecting movement of the touch on the touch-screen. Operating the touch-screen device also includes moving the displayed keyboard in response to the detected movement of the touch on the touch-screen, detecting a release of the touch from the touch-screen, and assigning a character according to a final location of the touch relative to a location of the displayed keyboard.. ... International Business Machines Corporation

06/14/18 / #20180165000

Alternate video summarization

A method and system for improving video summary visualization is provided. The method includes detecting via a touch screen display of a hardware device, user contact with a specified portion of a progress bar of a video file being presented via the touch screen display. ... International Business Machines Corporation

06/14/18 / #20180164982

Method and system for generating a holographic image having simulated physical properties

A method, system and program for producing an interactive three-dimensional holographic image, including the steps of generating, by one or more processors of a computer system, a virtual object and assigning physical properties to the virtual object using metadata. Signals are received from a virtual tool to determine a position of the virtual tool. ... International Business Machines Corporation

06/14/18 / #20180164968

Providing user interface language options

User interface (ui) language options are provided. A request event of a visible text string for a ui element is identified. ... International Business Machines Corporation

06/14/18 / #20180164966

Providing user interface language options

User interface (ui) language options are provided. A request event of a visible text string for a ui element is identified. ... International Business Machines Corporation

06/14/18 / #20180164860

Enhanced cooling design for computing device

Enhanced cooling for electronic components within a computing device is provided. Blowers are preferably leveraged as air movers, and an airflow deflection surface (preferably configured as a ramp) is disposed within a plenum to guide airflow under an electronic component (such as a hard disk drive or solid state drive), the electronic component being placed in an inverted alignment whereby a surface having a higher heat transfer rate is facing down (toward the blower), and then into an intake of the blower. ... International Business Machines Corporation

06/14/18 / #20180164425

Determination of a change in atmospheric pressure based on radio frequency return signal

Apparatus and methods to determine a change in atmospheric pressure between a forward portion of a flying object and a rear portion of the flying object based on at least one radio frequency (rf) return signal, and to determine a password using the determined change in atmospheric pressure.. . ... International Business Machines Corporation

06/14/18 / #20180164181

Detecting structural integrity of a structural component

Each of a plurality electronic circuit devices fixed to a structural component of a physical structure can be scanned a first time, using a radio frequency (rf) scanner to receive, from each of the plurality of electronic circuit devices, first data indicating a first measured electrical impedance of a respective conductor connected to the electronic circuit device and an identifier assigned to the electronic circuit device. For each of the plurality of electronic circuit devices, the first data indicating the first measured electrical impedance and the identifier assigned to the electronic circuit device can be stored to a first memory. ... International Business Machines Corporation

06/14/18 / #20180164048

Pin fin compliant heat sink with enhanced flexibility

Methods of using heat sinks include placing a pin fin compliant heat sink on a non-flat surface. The pin fin complaint heat sink has top and bottom plates connected by a plurality of pins arranged vertically between the top and bottom plates. ... International Business Machines Corporation

06/14/18 / #20180163139

Cross-linkable flame retardant materials

A cross-linkable flame retardant material includes a terminal furan-containing flame retardant moiety. The terminal furan-containing flame retardant moiety includes a furan moiety bonded to a phosphorus moiety via a phosphoryl linkage or via a phosphinyl linkage.. ... International Business Machines Corporation

06/14/18 / #20180163076

Surface modification by polymer anchoring on porous substrates

Disclosed is a method for mechanically anchoring polymers on the surface of a porous substrate by trapping polymer chains within the pores of the substrate under capillary forces. Surface modification of the porous substrate is achieved by anchoring one end of the polymer chains within the pores while one or more other ends of the polymer chains dangle from the surface of the porous substrate. ... International Business Machines Corporation

06/14/18 / #20180163016

Renewable cross-linker for increased bio-content from fructose

A class of bio-based bifuran cross-linkers are disclosed. Polymers cross-linked using the cross-linkers are also disclosed.. ... International Business Machines Corporation

06/14/18 / #20180162888

Furan-containing flame retardant molecules

A furan-containing flame retardant molecule includes a furan moiety bonded to a phosphorus moiety via a phosphoryl linkage or via a phosphinyl linkage.. . ... International Business Machines Corporation

06/14/18 / #20180162307

Risk situations for vehicle occupants based on data provided by vehicle sensors and contextual information

A method for improving risk situations for vehicle occupants in a vehicle which includes: configuring a set of circumstances; defining a set of values for each circumstance where each value has a rate; collecting context information for the circumstances, values and rates; collecting real-time sensor measurements pertaining to a vehicle, a driver and vehicle occupants; retrieving risk patterns from a risk pattern database; matching the sensor measurements to the risk patterns to find a matching risk pattern having a risk similarity value; contextualizing the matching risk pattern by increasing the risk similarity value to result in a personalized risk value; comparing the personalized risk value to a threshold; and executing a context modifying action to lower the personalized risk value below a predefined threshold when the personalized risk value exceeds the predefined threshold.. . ... International Business Machines Corporation

06/14/18 / #20180162267

Contextual priority signal in autonomous environment

Determining contextual priority of an autonomous vehicle and whether the passengers have a genuine event based on priority input, which is greater than a threshold and is classified as an emergency, activating the notification system to alert other vehicles.. . ... International Business Machines Corporation

06/14/18 / #20180160963

Sensors and analytics for reading comprehension

An approach is provided that receives, from a neurological sensor worn by a user, words as they are silently read the user. The words being read by the user correspond to a set of actual words that are included in a passage that is being read by the user. ... International Business Machines Corporation

06/07/18 / #20180160565

Cold plate with combined inclined impingement and ribbed channels

Methods for making heat transfer devices include forming a jet plate with a plurality of inclined jets set at an angular deviation from normal. A bottom plate is formed with channel walls that have ribs. ... International Business Machines Corporation

06/07/18 / #20180160561

Detecting a type of storage adapter connected and miscabling of a microbay housing the storage adapter

Provided are techniques for detecting a type of storage adapter connected to an input/output (i/o) bay and miscabling of a microbay housing the storage adapter. Under control of an input/ouput (i/o) bay, cable sidebands are driven high for a predetermined period of time. ... International Business Machines Corporation

06/07/18 / #20180160524

Integrated circuit device assembly

A method for assembling an integrated circuit device includes positioning a thermal interface material (tim) on top of an electronic component, positioning a load frame onto a printed circuit board, the load frame having an open region for the electronic component to extend through, and positioning a heat sink onto the tim. The method further comprises fastening a first screw fastener, resulting in a tim bond line between the heat sink and the electronic component, and actuating a second screw fastener disposed within a bore of the heat sink and threaded into the load frame. ... International Business Machines Corporation

06/07/18 / #20180160308

User access verification

Embodiments are directed to a method of providing access verification for a system that includes activating a security control device, which is in communications with a host device. The method also includes having the security control device receiving a verification signal coming from outside the system while being locally-based, and comparing the verification signal to a table of stored criteria values. ... International Business Machines Corporation

06/07/18 / #20180160265

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine an emotional state of a user of a user equipment and a cognitive environment in an area proximate to the user of the user equipment. ... International Business Machines Corporation

06/07/18 / #20180160264

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine an emotional state of a user of a user equipment and a cognitive environment in an area proximate to the user of the user equipment. ... International Business Machines Corporation

06/07/18 / #20180160263

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine a cognitive dimension associated with each of the data points and a location associated with each of the data points. ... International Business Machines Corporation

06/07/18 / #20180160262

Cognitive geofencing

A computing device and method is usable to determine a cognitive geofence according to a plurality of data points. The computing device may analyze the plurality of data points to determine a cognitive dimension associated with each of the data points and a location associated with each of the data points. ... International Business Machines Corporation

06/07/18 / #20180160120

Dual technique compression

Systems and methods for ensuring that images are compressed in a format that may be decompressed at a speed that is acceptable to a particular user and/or viewing environment are disclosed herein.. . ... International Business Machines Corporation

06/07/18 / #20180160036

Automated image capture based on image context

According to an embodiment of the present invention, a system dynamically captures and stores an image based on the context of the image being captured. Initially, an image capture device receives and analyzes an image to determine a first set of one or more attributes associated with the image. ... International Business Machines Corporation

06/07/18 / #20180159956

Techniques for implementing a usage aware standby service in a grid environment

A technique for operating a grid includes receiving, by a resource manager executing on a data processing system of the grid, an allocation request from a first application for one or more resources. The resource manager determines whether a service that is in standby mode is available for utilization by the first application. ... International Business Machines Corporation

06/07/18 / #20180159922

Job assignment using artificially delayed responses in load-balanced groups

A detection is made that a first handshake packet has been received from a data processing system at a first system. The first system participates in a load-balanced group managed by a load-balancer. ... International Business Machines Corporation

06/07/18 / #20180159892

Runtime protection of web services

Protecting a runtime web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. ... International Business Machines Corporation

06/07/18 / #20180159876

Consolidating structured and unstructured security and threat intelligence with knowledge graphs

An automated method for processing security events. It begins by building an initial version of a knowledge graph based on security information received from structured data sources. ... International Business Machines Corporation

06/07/18 / #20180159873

Push notifications of system events in a restricted network

Methods, computing systems and computer program products implement embodiments of the present invention that include associating a token with a computing device, defining preferences for the computing device, and conveying, by the computing device, the token and the preferences to an event processing system. Upon the event processing system, an event message from a computing system via a one-way firewall and matching the computing device preferences to the event message, the event processing system can convey the token and the event message to a push notification system. ... International Business Machines Corporation

06/07/18 / #20180159794

Integrated capacity and architecture design tool

A method implemented in a computer infrastructure having computer executable code, including consolidating collected capacity architecture information, which includes data for installed resources, allocated resources and reserved resources and determining available resources based on the collected capacity architecture information. Additionally, the method includes displaying an indication the available resources and performing capacity planning based on the collected capacity architecture information and the available resources.. ... International Business Machines Corporation

06/07/18 / #20180159775

Offloading at a virtual switch in a load-balanced group

A determination is made at an application executing in conjunction with a switch that a request packet sent to a virtualized computing entity (vce) connected to the switch should be offloaded to a second vce. A destination of the request packet is changed from the vce to the second vce, to form a first modified request packet. ... International Business Machines Corporation

06/07/18 / #20180159749

Rerouting data of a streaming application

A streams manager monitors performance of a streaming application and determines if operators are underperforming according to a threshold. When the performance needs to be improved, the streams manager automatically modifies the flow graph to offload or reroute a stream of data, or part of a stream of data, to a similar operator to more efficiently utilize streaming resources. ... International Business Machines Corporation

06/07/18 / #20180159694

Wireless connections to a wireless access point

A method and apparatus for establishing a wireless connection. A digital certificate having a second name is obtained by a processor unit in response to receiving a selection of a network using a first name broadcast by a wireless access point. ... International Business Machines Corporation

06/07/18 / #20180159431

Free programmable power supply array

An integrated circuit module including at least one semiconductor chip. The at least one semiconductor chip includes a plurality of voltage converters and switching circuitry for connecting an input terminal of one of the plurality of voltage converters to an input power supply rail and an output terminal of at least one of the plurality of voltage converters to an output supply rail. ... International Business Machines Corporation

06/07/18 / #20180159191

Flexible electronic circuits including shape memory materials

A flexible electronic circuit includes a shape memory material disposed within a flexible dielectric material.. . ... International Business Machines Corporation

06/07/18 / #20180159042

Ladder tetrazine polymers

A ladder tetrazine polymer is disclosed.. . ... International Business Machines Corporation

06/07/18 / #20180158952

Method and structure for incorporating strain in nanosheet devices

A semiconductor structure includes a plurality of stacked and suspended semiconductor nanosheets located above a semiconductor substrate. Each semiconductor nanosheet has a pair of end sidewalls that have a v-shaped undercut surface. ... International Business Machines Corporation

06/07/18 / #20180158949

Spacer formation in vertical field effect transistors

Embodiments of the present invention provide systems and methods for generating oxide spacers in a vertical field transistor. The fin of the channel facilitates the electrical current flowing between the source terminal and the drain terminal. ... International Business Machines Corporation

06/07/18 / #20180158948

Self-aligned replacement metal gate spacerless vertical field effect transistor

A method of making a vertical field effect transistor includes forming a semiconductor nanowire that extends from a substrate surface. A first sacrificial layer is deposited over the substrate surface, and a second sacrificial layer is deposited over the first sacrificial layer such that each of the first and second sacrificial layers are formed peripheral to the nanowire. ... International Business Machines Corporation

06/07/18 / #20180158925

Fabrication of an isolated dummy fin between active vertical fins with tight fin pitch

A method of forming an arrangement of active and inactive fins on a substrate, including forming at least three vertical fins on the substrate, forming a protective liner on at least three of the at least three vertical fins, removing at least a portion of the protective liner on the one of the at least three of the at least three of vertical fins, and converting the one of the at least three of the at least three vertical fins to an inactive vertical fin.. . ... International Business Machines Corporation

06/07/18 / #20180158924

Sloped finfet with methods of forming same

Embodiments of the present disclosure provide an integrated circuit (ic) structure, which can include: a semiconductor fin; a gate dielectric positioned above a first region of the semiconductor fin; a spacer positioned above a second region of the semiconductor fin and adjacent to the gate dielectric; and a source/drain region contacting a third region of the semiconductor fin; wherein the first region of the semiconductor fin includes substantially vertical sidewalls, and the third region of the semiconductor fin includes sloped sidewalls.. . ... International Business Machines Corporation

06/07/18 / #20180158923

Contact area to trench silicide resistance reduction by high-resistance interface removal

A method for manufacturing a semiconductor device comprises forming a silicide region on a semiconductor substrate, forming a gate structure on the semiconductor substrate adjacent the silicide region, forming a dielectric layer on the gate structure and on the silicide region, forming a first liner layer on the dielectric layer, removing a portion of the first liner layer and a portion of the dielectric layer to form an opening exposing a top surface of the silicide region, forming a second liner layer on the first liner layer and on sides and a bottom of the opening, removing a portion of the second liner layer from a top surface of the first liner layer and from the bottom of the opening to re-expose a portion of the top surface of the silicide region, and forming a contact layer in the opening directly on the re-exposed portion of the top surface of the silicide region.. . ... International Business Machines Corporation

06/07/18 / #20180158818

Air gap spacer for metal gates

A method of forming a semiconductor device that includes forming a trench adjacent to a gate structure to expose a contact surface of one of a source region and a drain region. A sacrificial spacer may be formed on a sidewall of the trench and on a sidewall of the gate structure. ... International Business Machines Corporation

06/07/18 / #20180158797

Structures and methods to enable a full intermetallic interconnect

A method forming an interconnect structure includes depositing a first solder bump on a chip; depositing a second solder bump on a laminate, the second solder bump including a nickel copper colloid surrounded by a nickel or copper shell and suspended in a tin-based solder; aligning the chip with the laminate; performing a first reflow process to join the chip to the laminate; depositing an underfill material around the first solder bump and the second solder bump; and performing a second reflow process at a temperature that is lower than the first reflow process to convert the first solder bump and the second solder bump to an all intermetallic interconnect; wherein depositing the underfill material is performed before or after performing the second reflow process.. . ... International Business Machines Corporation

06/07/18 / #20180158769

Modifying execution flow in save-to-return code scenarios

A computer-implemented method includes, in a code transformation system, identifying save-to-return code instructions, function call code instructions, comparison code instructions, and exceptional code instructions. The function call code instructions are associated with the save-to-return code instructions. ... International Business Machines Corporation

06/07/18 / #20180158731

Method of optimizing wire rc for device performance and reliability

A method of tailoring beol rc parametrics to improve chip performance. According to the method, an integrated circuit design on an integrated circuit chip is analyzed. ... International Business Machines Corporation

06/07/18 / #20180158649

Cross sectional depth composition generation utilizing scanning electron microscopy

A method for generating cross-sectional profiles using a scanning electron microscope (sem) includes scanning a sample with an electron beam to gather an energy-dispersive x-ray spectroscopy (eds) spectrum for an energy level to determine element composition across an area of interest. A mesh is generated to locate positions where a depth profile will be taken. ... International Business Machines Corporation

06/07/18 / #20180158543

Automated report generation

Provided herein are various systems and methods for improved report interaction and generation. A computing system receives selection of an exam for display on a display device, either from a user or as automatically determined by a computing device. ... International Business Machines Corporation

06/07/18 / #20180158521

Sram cell with dynamic split ground and split wordline

An sram cell with dynamic split ground (gnd) and split wordline (wl) for extreme scaling is disclosed. The memory cell includes a first access transistor enabled by a first wordline to control access to cross coupled inverters by a first bitline. ... International Business Machines Corporation

06/07/18 / #20180158484

Preventing condensation in a tape library

In an approach for preventing damage to a tape library, a processor receives a first sensor reading, wherein the first sensor is located within a tape library. A processor receives a second sensor reading, wherein the second sensor is located external to the tape library. ... International Business Machines Corporation

06/07/18 / #20180158480

Mounting a smartphone to robotic accessor of automated data storage library

According to one embodiment, a method for mounting a wireless capture device to an accessor to capture images of an operation in a data storage library includes mounting a bracket to the accessor, where the accessor is configured to transport data storage cartridges in a library environment. Moreover, the bracket is configured to receive a wireless image capture device therein, and the bracket is mounted in a position to orient the wireless image capture device to capture images while the accessor is transporting data storage cartridges.. ... International Business Machines Corporation

06/07/18 / #20180158479

Mounting a smartphone to robotic accessor of automated data storage library

According to one embodiment, a computer-implemented method for remotely controlling a capture of images of a data storage library during operation thereof with a bracket on an accessor includes pairing a remote controller to a wireless image capture device that is coupled to a bracket mounted on an accessor, instructing the wireless image capture device to start recording images of the data storage library during operation thereof, including movement of the accessor, thereafter, instructing the wireless image capture device to stop recording images of the data storage library during operation thereof, and instructing the wireless image capture device to save the recorded images to a file.. . ... International Business Machines Corporation

06/07/18 / #20180158478

Methods for selecting wrap angle for inducing tape tenting above transducer

In one general embodiment, a method includes determining a distance from a transducer of a module to an edge of the module closest thereto, and selecting a wrap angle based on the determined distance for inducing tenting of a moving magnetic recording tape in a region above the transducer. In another general embodiment, a method includes running a magnetic recording tape over a tape bearing surface having at least one edge, and detecting signals from the tape at differing wrap angles for estimating a height of tenting of the tape above a transducer at each of the wrap angles. ... International Business Machines Corporation

06/07/18 / #20180158472

Head having wrap-controlled flexible media interface

An apparatus according to one embodiment includes a module having a tape bearing surface, a magnetic transducer in a thin film region, and an edge closest to the transducers. A guide is positioned relative to the edge for inducing tenting of a moving magnetic recording tape above a tape tenting region of the tape bearing surface. ... International Business Machines Corporation

06/07/18 / #20180158451

Prefix methods for diarization in streaming mode

A diarization embodiment may include a system that clusters data up to a current point in time and consolidates it with the past decisions, and then returns the result that minimizes the difference with past decisions. The consolidation may be achieved by performing a permutation of the different possible labels and comparing the distance. ... International Business Machines Corporation

06/07/18 / #20180158352

Conditional provisioning of auxiliary information with a media presentation

Techniques for conditional presentation of auxiliary information are provided. In one example, a computer-implemented method comprises determining, by a device operatively coupled to a processor, feedback information for a user in response to a media presentation, wherein the feedback information is indicative of a mental state of the user during presentation of the media presentation. ... International Business Machines Corporation

06/07/18 / #20180158188

Image orientation detection

Embodiments of the present disclosure relate to a new approach for image orientation detection. In the computer-implemented method, at least one character area in an image is sampled. ... International Business Machines Corporation

06/07/18 / #20180158127

System and method for segmenting items in a shopping cart by carbon footprint

A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable medium being operable to provide a shopping cart for a shopper, and segment items in the shopping cart based on the carbon footprint associated with each item. Additionally, the method may include displaying substitute or complementary items in the shopping cart for selection by the user to reduce total carbon values, and awarding carbon certificates.. ... International Business Machines Corporation

06/07/18 / #20180158121

Digital content generation based on environmental conditions

A method includes determining an environmental condition and determining that demand for a target data object is below a threshold value under the environmental condition. The method further includes identifying an offering whose demand is above the threshold value under the environmental condition and that includes the target data object. ... International Business Machines Corporation

06/07/18 / #20180158079

System and method for combining what-if and goal seeking analyses for prescriptive time series forecasting

A computer-implemented method for prescriptive time-series forecasting, which combines both what-if analysis and goal-seeking analysis. The method comprises building a model for a target metric with a set of predictors, based on historical time-series data, and computing, using the model, a set of forecast values. ... International Business Machines Corporation

06/07/18 / #20180158077

System and method for combining what-if and goal seeking analyses for prescriptive time series forecasting

A computer-implemented method for prescriptive time-series forecasting, which combines both what-if analysis and goal-seeking analysis. The method comprises building a model for a target metric with a set of predictors, based on historical time-series data, and computing, using the model, a set of forecast values. ... International Business Machines Corporation

06/07/18 / #20180158061

Transaction authentication based on metadata

In some examples, a system for authenticating transactions can include a processor to detect metadata corresponding to a user of a mobile device, wherein the metadata comprises a call history from the mobile device. The processor can also detect transaction information corresponding to the user of the mobile device from a remote server, wherein the transaction information corresponds to a transaction initiated at a remote service provider and wherein the transaction information indicates a transaction type and transaction initiator information. ... International Business Machines Corporation

06/07/18 / #20180158054

Concomitance of an asset and identity block of a blockchain

A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example operation may comprise one or more of creating an initial identifier representing an asset and an owner entity of the asset in a blockchain, identifying an identity block associated with the initial identifier, and identifying an asset transfer of the asset from the owner entity to a blockchain entity.. ... International Business Machines Corporation

06/07/18 / #20180158034

Dynamic reordering of blockchain transactions to optimize performance and scalability

A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. ... International Business Machines Corporation

06/07/18 / #20180158025

Exploration based cognitive career guidance system

An exploration-based career guidance system is disclosed. The career guidance system receives an assessment regarding a candidate and identifies a first set of roles for the candidate based on the assessment. ... International Business Machines Corporation

06/07/18 / #20180158010

User operation selection and/or modification based on determined user skills/skill limitations

Mechanisms are provided for selecting user operations and/or modifying user operations based on the determined user skills and/or skill limitations of a user. The mechanisms obtain user data associated with a user and determine one or more user skills of the user based on analysis of the user data. ... International Business Machines Corporation

06/07/18 / #20180158008

Order optimization in hybrid cloud networks

A method for enhancing on-premise order management systems (oms) designed for fulfillment transactions with analytic and optimization technologies and services hosted in a shared multi-tenant software-as-a-service (saas) environment, such as a hybrid cloud. The computer-implemented method improves an order management system by leveraging a “punch-out” approach based on user exits to integrate with and augment currently implemented order management processing and transaction flows. ... International Business Machines Corporation

06/07/18 / #20180158006

Asset data updating

A special use portable computing device and associated method and computer program product. The device includes: a global positioning system (gps) device to obtain a geographical location of a computer related asset from a gps; specialized hardware to manage asset data comprising an identification of a first gps locator which provides to the gps an incorrect identification of the geographical location of the computer related asset due to first gps locator not positioned on the computer related asset, and wherein a second, different gps locator is positioned on the computer related asset; and specialized hardware to manage display of a graphical user interface (gui) and to receive via the gui a directive to change the identification of the first gps locator in the asset data to an identification of the second gps locator which provides to the gps a correct identification of the geographical location of the computer related asset.. ... International Business Machines Corporation

06/07/18 / #20180157990

Automating table-based groundtruth generation

A method, system and computer-usable medium are disclosed for using table-based groundtruth to train a question-answer (qa) system, comprising: receiving a corpus of text comprising unstructured text and a table; performing qa pair generation operations on the unstructured text and the table to generate qa pairs, the qa pairs being based upon information obtained from the table; assigning a score to each qa pair, the score corresponding to an indicator of user interest.. . ... International Business Machines Corporation

06/07/18 / #20180157985

Identifying and analyzing impact of an event on relationships

The present invention provides a computer implemented method, a system, and a computer program product of identifying and analyzing the impact of an event associated with an entity on relationships of the entity. In an exemplary embodiment, the present invention includes storing data that identifies relationships with entities associated with the entity, based on data about the entity and data about the entities from at least one online website, storing data that identifies entity relationships, among the entity relationships identified in an entity relationship data structure, that are determined by the computer system to be affected by events associated with event categories, receiving data about events related to the entity, and outputting data related to a recommendation for a second entity among the entities associated with the entity, wherein the second entity corresponds to a most affected relationship, based on data associated with the second entity.. ... International Business Machines Corporation

06/07/18 / #20180157980

Cognitive dialog system for driving safety

The system gathers a set of biometric data for a first driver of a vehicle. The system classifies the set of biometric data as belonging in one of a plurality of biometric conditions. ... International Business Machines Corporation

06/07/18 / #20180157978

Predicting performance of database queries

A mechanism is provided for determining a predicted performance of a database com. A first model for a database is determined using machine learning and training data based on monitoring the database operating in a production environment. ... International Business Machines Corporation

06/07/18 / #20180157844

Consolidating static analysis tool warnings using dynamic programming

A static analysis tool is augmented to provide a mechanism by which a large set (and potentially all) security warnings output from the tool may be represented to the user in a manner that is manageable for consumption by the user. According to this disclosure, a static analysis is run on a program to generate a set of security warnings. ... International Business Machines Corporation

06/07/18 / #20180157843

Detection of compiler injected security flaws

A computer-implemented method is provided for detecting compiler-injected security flaws. The computer-implemented method includes receiving source code, compiling the source code, reverse engineering the compiled source code, comparing operations performed by the source code and the reverse engineered source code, identifying differences between the source code and the reverse engineered source code, and creating a list of differences. ... International Business Machines Corporation

06/07/18 / #20180157842

Amalgamating code vulnerabilities across projects

Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. ... International Business Machines Corporation

06/07/18 / #20180157824

Managing passwords using steganography

A computer system, method, and computer readable product are provided for managing passwords using steganography. In various embodiments, a computing system provides a password manager that a user provides a password to. ... International Business Machines Corporation

06/07/18 / #20180157823

Sequential object set passwords

Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include receiving, at a user device, a first object set; transmitting, to a processing device, a first rearranged object set that represents the first object set rearranged into a first sequential order by the user; and responsive to the first rearranged object set matching a first known sequential object set, receiving, at the user device, a second object set.. ... International Business Machines Corporation

06/07/18 / #20180157819

Sequential object set passwords

Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include presenting, by a processing device, an object set to a user, wherein the object set comprises a plurality of objects in a first order; receiving, by the processing device, a rearranged object set, wherein the rearranged object set comprises the plurality of objects in a second order; comparing the rearranged object set to a known sequential object set stored in a data store; and responsive to determining that the rearranged object set matches a known sequential object set, enabling the user to access a restricted resource.. ... International Business Machines Corporation

06/07/18 / #20180157809

Increased security using dynamic watermarking

As disclosed herein is a tool for enabling dynamic watermarking on a client, including a computer determining a negotiated watermarking algorithm that identifies at least one location on a web page for a placed watermark, and initiating a web communication by requesting a web page. The computer receives the web page, and verifies the authenticity of the web page using the negotiated watermarking algorithm prior to displaying of the web page. ... International Business Machines Corporation

06/07/18 / #20180157795

Multilevel object file storage

A message requesting a transfer of management responsibilities for a digital object, representing an asset, from a first digital object management system to a second digital object management system can be received from the first digital object management system. Responsive to receiving the message requesting the transfer of the management responsibilities for the digital object, the digital object can be received from the first digital object management system, at least one operation updating data contained within the digital object can be performed by executing at least a first application contained within the digital object, and the digital object can be communicated to the second digital object management system for storage in a digital object database.. ... International Business Machines Corporation

06/07/18 / #20180157768

Hidden cycle evidence booster

An approach is provided in which an information handing system converts source evidence extracted from a set of documents to a frequency-based representation of the source evidence. The frequency-based representation includes multiple signals that each corresponds to an evidence type in the source evidence. ... International Business Machines Corporation

06/07/18 / #20180157749

Building a data query engine that leverages expert data preparation operations

A method, system and computer program product for building a data query engine. Initial taxonomies that describe and categorize data are built by expert users (e.g., data scientists) employing machine learning algorithms. ... International Business Machines Corporation

06/07/18 / #20180157741

Automating table-based groundtruth generation

A method, system and computer-usable medium are disclosed for automating the generation of table-based groundtruth, comprising: receiving a document comprising unstructured text and a table; generating questions by applying a template the contents of the table; performing qa pair generation operations on the table to generate qa pairs, each qa pair comprising a question generated by applying the template; and, assigning a score to each qa pair, the score providing an indicator of user interest to each qa pair, the score being based on a score generation methodology using the unstructured text and the table.. . ... International Business Machines Corporation

06/07/18 / #20180157736

Full text indexing in a database system

A method for indexing with redundant information. The method may identify unknown code points for a document in response to an indexing request for the document. ... International Business Machines Corporation

06/07/18 / #20180157709

Cardinality estimation of a join predicate

In one embodiment, a method for improving cardinality estimation of a join predicate between a fact table and an overloaded dimension table is provided. The method includes receiving a dimension table and a fact table in a join predicate of one or more sql statements. ... International Business Machines Corporation

06/07/18 / #20180157707

Case statement optimization

A method, a computer program product and a system are provided. A case expression is analyzed for redundant expressions, patterns equivalent to a built-in function, and specific functions to form a simplified expression, wherein the case expression is written in a language supported by a database management system. ... International Business Machines Corporation

06/07/18 / #20180157700

Storing and verifying event logs in a blockchain

A blockchain related to transactions may be referenced for various purposes and may be accessed for ledger verification. One example method of operation may comprise one or more of receiving an event log with events which occurred during operation of the computer, generating a hash value for the event log, adding details of the event log and the hash value as a transaction to a distributed blockchain, and storing the event log in a file store.. ... International Business Machines Corporation

06/07/18 / #20180157697

Updating change information for current copy relationships when establishing a new copy relationship having overlapping data with the current copy relationships

Provided are a computer program product, system, and method for updating change information for current copy relationships when establishing a new copy relationship having overlapping data with the current copy relationships. A first copy relationship indicates changed first source data to copy to first target data. ... International Business Machines Corporation

06/07/18 / #20180157696

Optimized iterators for rcu-protected skiplists

An optimized skiplist iterator technique for rcu-protected skiplists. A skiplist iterator operation may attempt to validate a cached pointer hint that references a skiplist element of an rcu-protected skiplist, the skiplist element having an associated first key. ... International Business Machines Corporation

06/07/18 / #20180157694

Bulk data insertion in analytical databases

A present invention embodiment relates to inserting data to a data table, where the data table has multiple data records and involves at least one organizing attribute. The embodiment defines a set of data blocks having records of the data table and assigns to each data block of the set of data blocks a predefined maximum number of records of the data table or a predefined maximum amount of storage. ... International Business Machines Corporation

06/07/18 / #20180157689

Supporting repetitive operations within an operating system

A computer-implemented method and computer processing system are provided. The method includes intercepting, by a processor, a sequence of data elements related to an interaction between a user and a user interface of a computer system that includes the processor. ... International Business Machines Corporation

06/07/18 / #20180157671

Accessing objects in an erasure code supported object storage environment

Accessing objects in an erasure code supported object storage environment including receiving, from a requesting entity, a read request for an object stored in the object storage environment; identifying, using a placement data structure, an object fragment location of a first object fragment of the object; calculating, based on a filesystem root inode number and the object fragment location, a first inode address for the first object fragment of the object, wherein the first inode address identifies a location on a first storage node; reading, using the first inode address, the first object fragment and an inode structure, wherein the inode structure for the first inode address comprises a second inode address for a second object fragment of the object; reading the second object fragment using the second inode address, wherein the second inode address identifies a location on a second storage node; and providing, to the requesting entity, a reconstructed object comprising the first object fragment and the second object fragment.. . ... International Business Machines Corporation

06/07/18 / #20180157658

Streamlining citations and references

Embodiments are directed to a computer-implemented method, computer system, and computer program product for analyzing image data to create a reference. The method includes receiving a first image data. ... International Business Machines Corporation

06/07/18 / #20180157655

Data migration using a migration data placement tool between storage systems based on data access

Embodiments for a system using a migration data placement tool between storage systems based on data access by a processor. Data may be cataloged in a migration data placement tool by receiving events from a plurality of heterogeneous storage systems. ... International Business Machines Corporation

06/07/18 / #20180157654

Data migration using a migration data placement tool between storage systems based on data access

Embodiments for using a migration data placement tool between storage systems based on data access by a processor. Events from a plurality of heterogeneous storage systems may be indexed into a common repository. ... International Business Machines Corporation

06/07/18 / #20180157648

Automated translation of screen images for software documentation

An aspect includes receiving a description of a display screen generated by a software program executed in a first mode to interact with a user in first language. The description is in a serialized format that includes screen capture parameters and an offset location in a first dictionary corresponding to a screen element in the display screen. ... International Business Machines Corporation

06/07/18 / #20180157645

Dynamic candidate expectation prediction

A computer system may receive a first set of bundled information. The computer system may have a processor and a memory storing one or more natural language processing modules. ... International Business Machines Corporation

06/07/18 / #20180157641

Automatic detection of required tools for a task described in natural language content

Mechanisms are provided for automatically identifying required tools for performing actions specified in electronic documents. The mechanisms perform natural language processing of content of a training corpus of electronic documents to identify associations of action terms with required tools for performing actions corresponding to the action terms. ... International Business Machines Corporation

06/07/18 / #20180157637

Cognitive agent for capturing referential information during conversation muting

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement a cognitive system for capturing referential information. The cognitive system receives a first indication that a group text messaging conversation is in a muted state for a first user. ... International Business Machines Corporation

06/07/18 / #20180157602

Operation of a multi-slice processor implementing adaptive prefetch control

Operation of a multi-slice processor that includes a plurality of execution slices. Operation of such a multi-slice processor includes: determining, by a hypervisor, that consumption of memory controller resources, by a plurality of processing threads, is above a threshold quantity, wherein respective processing threads of the plurality of processing threads control respective prefetch settings; and responsive to determining that the consumption of the memory controller resources is above the threshold quantity, modifying individual memory controller usage of at least one of the plurality of processing threads such that the consumption of the memory controller resources is reduced below the threshold quantity.. ... International Business Machines Corporation

06/07/18 / #20180157594

Using cache lists for processors to determine tracks to demote from a cache

Provided are a computer program product, system, and method for using cache lists for processors to determine tracks in a storage to demote from a cache. Tracks in the storage stored in the cache are indicated in lists. ... International Business Machines Corporation

06/07/18 / #20180157583

Application testing on a blockchain

A blockchain test configuration may provide a simple and secure infrastructure for testing applications. One example method of operation may comprise one or more of transmitting a request to a network of nodes to test a test package associated with an application. ... International Business Machines Corporation

06/07/18 / #20180157582

Automated test runs in an integrated development environment system and method

A method, computer program product, and computer system for editing code, by a computing device, via an integrated development environment. The code is determined to be syntactically valid. ... International Business Machines Corporation

06/07/18 / #20180157581

Automated system testing in a complex software environment

Method and system are provided for automated system testing in a complex software environment. The method includes: collecting data during a test run of a product under test that involves multiple systems and resources where a test run introduces one or more product code change sets, the collected data including a product trace of the execution of the product under test at a product code level; and storing the last good collected data. ... International Business Machines Corporation

06/07/18 / #20180157580

Debug session analysis for related work item discovery

A method for automatic debug session analysis for related work item discovery, is provided. The method includes recording metadata describing a particular debug session associated with a user for a respective work item. ... International Business Machines Corporation

06/07/18 / #20180157578

Issuance of static analysis complaints

Embodiments include methods, systems, and computer program products for using static analysis to issue complaints. Aspects include generating, using a processing unit, a first complaint during static analysis of program code, wherein the first complaint corresponds to a program error. ... International Business Machines Corporation

06/07/18 / #20180157577

Objective evaluation of code based on usage

A method, associated system, and computer program product are disclosed for facilitating improved objectivity of feedback for evaluating software programs. The feedback is provided by a user. ... International Business Machines Corporation

06/07/18 / #20180157573

Response-time baselining and performance testing capability within a software product

A method of measuring performance of a computerized system is provided. A test component integrated in a client application module is configured to generate an application specific workflow to be delivered to a computing environment of one or more computing devices for measuring the performance of the computerized system. ... International Business Machines Corporation

06/07/18 / #20180157570

Integrating external services with a clustered file system

A computer-implemented method according to one embodiment includes receiving, via an interface of a clustered file system, callback registration information from an external service, identifying a plurality of parameters associated with the callback registration information, constructing a service registration within the clustered file system, based on the plurality of parameters, identifying the service registration in response to an occurrence of one or more events, and performing one or more callbacks, according to the service registration.. . ... International Business Machines Corporation

06/07/18 / #20180157569

Prevention of event flooding

Techniques for preventing event flooding in an event processing system, comprising: responsive to receiving, by an analysis component, monitored activity data, an analysis component for analysing the monitored activity data, to determine a potential event; responsive to determining a potential event, an analysis component identifying a set of threshold values and determining whether the potential event has met a threshold value of the set of threshold values; responsive to a positive determination, an analysis component for determining if the met threshold value is an identical threshold value met by a previous potential event; and responsive to a second positive determination, a disregard component for disregarding the potential event.. . ... International Business Machines Corporation

06/07/18 / #20180157567

Replicating test case data into a cache with non-naturally aligned data boundaries

Data is replicated into a memory cache with non-naturally aligned data boundaries to reduce the time needed to generate test cases for testing a processor. Placing data in the non-naturally aligned data boundaries as described herein allows replicated testing of the memory cache while preserving double word and quad word boundaries in segments of the replicated test data. ... International Business Machines Corporation

06/07/18 / #20180157563

Enabling a cloud controller to communicate with power systems

An approach is disclosed that receives power related data from one or more power systems. The approach then determines, based on an analysis of the power related data, an anticipated power outage, with the power outage includes a power outage time estimate. ... International Business Machines Corporation

06/07/18 / #20180157554

Resolving conflicts between multiple software and hardware processes

Embodiments include method, systems and computer program products for prioritizing delivery of messages across multiple communication systems. Aspects include that a conflict resolution system is configured to identify a plurality of processes. ... International Business Machines Corporation

06/07/18 / #20180157539

Tail latency-based job offloading in load-balanced groups

A type of a request that is currently being processed at a system is determined. A distribution is selected from a set of processing time distributions, the distribution forming a model that is applicable to the type. ... International Business Machines Corporation

06/07/18 / #20180157537

Migrating a logical partition with a native logical port

Migrating a logical partition with a native logical port including establishing in the target computing system a target vios that includes a virtual network interface controller (vnic) server, the vnic server of the target vios coupled for data communications to a first target virtual adapter; copying the logical partition including a vnic client to the target computing system; starting the logical partition; establishing, by the vnic client of the logical partition, data communications with the vnic server of the target vios, including performing i/o data communications between the logical partition and the first target virtual adapter; establishing a second logical port in the logical partition on the target computing system, including coupling for i/o data communications the second logical port to a second target virtual adapter; and performing i/o data communications from the logical partition to the second target virtual adapter through the second logical port.. . ... International Business Machines Corporation

06/07/18 / #20180157530

Data processing

Methods are provided for data processing in a multi-threaded processing arrangement. The methods include receiving a data processing task to be executed on data including a plurality of data records, the data having an associated record description including information relating to parameters or attributes of the plurality of data records. ... International Business Machines Corporation

06/07/18 / #20180157529

Data processing

Methods are provided for data processing in a multi-threaded processing arrangement. The methods include receiving a data processing task to be executed on data including a plurality of data records, the data having an associated record description including information relating to parameters or attributes of the plurality of data records. ... International Business Machines Corporation

06/07/18 / #20180157506

Apparatus and method for realizing runtime system for programming language

Apparatus, method, and a program for causing a computer to function as an apparatus, for realizing a runtime system for programming language. The apparatus includes a storage unit for storing a first class that is an existing class in the object-oriented programming language, a second class that is a class that includes a member accessible from outside of the first class and is a class which is specialized for specific use; and a processing unit for performing processing using the second class with a predetermined instruction in software that realizes the runtime system, and performing processing using the first class with an instruction to check an identity of the second class in a user program product that is executed by the runtime system.. ... International Business Machines Corporation

06/07/18 / #20180157505

Automated image layer blacklisting in the cloud

A computer-implemented method is provided. The method includes identifying, by one or more processors, faulty layers from among a plurality of layers of a container image stored in a container-based cloud system. ... International Business Machines Corporation

06/07/18 / #20180157498

Management of foreground and background processes in a storage controller

A background process is configured to periodically scrub a boot storage of a storage controller to ensure operational correctness of the boot storage. One or more foreground processes store a system configuration data of the storage controller in the boot storage of the storage controller. ... International Business Machines Corporation

06/07/18 / #20180157497

Identification of bootable devices

A method for managing an initiation of a computing system. In an embodiment, the method includes a computer processor detecting that a first computing system receives a request to initiate a second computing system. ... International Business Machines Corporation

06/07/18 / #20180157496

Concurrent maintenance of an input/output adapter backing a virtual network interface controller

Concurrent maintenance of an input/output (i/o) adapter backing a virtual network interface connection (vnic) including receiving, by a hardware management console (hmc), a request to disconnect the i/o adapter from a computing system, wherein the computing system comprises a logical partition and virtual i/o server; instructing, by the hmc over a communications link, the virtual i/o server to deconfigure and remove the server vnic driver; determining, by the hmc, that a replacement i/o adapter is installed on the computing system; and in response to determining that the replacement i/o adapter is installed on the computing system, instructing, by the hmc over the communications link, the virtual i/o server to add and configure a replacement server vnic driver.. . ... International Business Machines Corporation

06/07/18 / #20180157451

Generating a configuration page for rendering in a graphical user interface (gui) for managing provisioning of storage resources in a storage system

Provided are a computer program product, system, and method for generating a configuration page for rendering in a graphical user interface (gui) for managing provisioning of storage resources in a storage system. A determination is made of allocation commitment certainties for virtual storage ranges to allocate from the storage system based on physical capacity in the storage system and an estimated data reduction rate. ... International Business Machines Corporation

06/07/18 / #20180157432

Pdse extended generation grouping for tiered storage systems

A method for storing data includes establishing an extended generation group comprising a plurality of data sets. The plurality of data sets includes a first data set containing primary members and a first number of generations of each of the primary members, and a second data set containing a second number of generations of each of the primary members. ... International Business Machines Corporation

06/07/18 / #20180157430

Using a cascade flag to process a copy relationship having a backward cascade copy relationship

Provided are a computer program product, system, and method for using a cascade flag to process a copy relationship having a backward cascade copy relationship. Each of a plurality of copy relationships indicates to copy source data to target data and has a cascade flag. ... International Business Machines Corporation

06/07/18 / #20180157423

Releasing space allocated to a space efficient target storage in a copy relationship with a source storage

Provided are a computer program product, system, and method for releasing space allocated to a space efficient target storage in a copy relationship with a source storage. Source and target copy relationships indicate source data in the source storage to copy to target data in the target storage. ... International Business Machines Corporation

06/07/18 / #20180157422

Vertical replication of a guest operating system

Vertical replication of guest operating systems (os) relating to testing a host machine is provided. A parameter of the host os is assessed by performing a vertical replication of a guest os. ... International Business Machines Corporation

06/07/18 / #20180157421

Asynchronous local and remote generation of consistent point-in-time snap copies

In accordance with one embodiment, asynchronous local and remote generation of consistent first and second point-in-time snap copy volumes provides for generating in a primary system, a first point-in-time snap copy volume of a primary volume of the primary system, and generating in a secondary system, a second point-in-time snap copy volume utilizing a secondary volume in the secondary system. Synchronizing logic synchronizes the first and second point-in-time snap copy volumes to be consistent with each other as of a particular point-in-time notwithstanding an asynchronous mirror relationship between the primary volume of the primary system and the secondary volume of the secondary system. ... International Business Machines Corporation

06/07/18 / #20180157420

Writing file information for tape file systems

A computer-implemented method, according to one embodiment, includes: receiving a first portion of data to be written in a magnetic medium, dividing the first portion of data into a plurality of blocks, appending an identification segment having identification information therein to each of the blocks, wherein each block and the corresponding identification information appended thereto forms a record, writing each record in a data partition of the magnetic medium, and writing an index in the data partition of the magnetic medium in response to a predetermined condition being met, wherein the index is associated with all data on the magnetic medium. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation

06/07/18 / #20180157413

Minimizing seek times in a hierarchical storage management (hsm) system

A computer-implemented method, according to one embodiment, includes assigning one or more first-type tape cartridges to an upper tape layer of a hierarchical storage management system, assigning one or more second-type tape cartridges to a lower tape layer of the hierarchical storage management system, and moving, to the lower tape layer, data having lower access frequency and recorded in the first-type tape cartridge assigned to the upper tape layer. A length of a tape included in the second-type tape cartridge is longer than a length of a tape included in the first-type tape cartridge.. ... International Business Machines Corporation

06/07/18 / #20180157382

Interface for creating and comparing multiple object sets

An approach is provided in which in which an information handling system displays multiple objects on a primary display layer (first display layer) of a display. The information handling system receives a selection of a first one of the objects and displays the first object on a second display layer of the display accordingly that is different than the primary display layer. ... International Business Machines Corporation

06/07/18 / #20180157380

Dynamic web actions palette

Embodiments of the invention include a method, system and computer program product for a dynamic web actions palette. In an embodiment of the invention, a method of dynamically configuring a web actions palette includes loading text from a message received in a communications program executing in memory of a computer and identifying in the text, a suggestion to perform an action in connection with a web site remote from the computer. ... International Business Machines Corporation

06/07/18 / #20180157365

Web server that renders a web page based on a client pressure profile

A web server includes a pressure-sensitive page rendering mechanism that renders web pages that have one or more selectable inputs according to a client pressure profile corresponding to the requesting user. When the web server receives the request, the web server may dynamically generate and render a web page that satisfies the client pressure profile by placing one or more selectable inputs on the web page in one or more preferred regions of the touch screen display. ... International Business Machines Corporation

06/07/18 / #20180157304

Processor management via thread status

A process for processor management includes activating a delay thread running on a processor. A determination is made whether a wait event for a first thread running on the processor is in a queue. ... International Business Machines Corporation

06/07/18 / #20180157264

Control of driverless vehicles in construction zones

An apparatus for traffic control is disclosed. A method and a system also perform the functions of the apparatus. ... International Business Machines Corporation

06/07/18 / #20180156662

Identification of material composition

Identification of a material composition. The material composition is configured with a sequential pattern applied to one or more surfaces of the body. ... International Business Machines Corporation

06/07/18 / #20180156517

Refrigerated transport temperature regulation

In an approach, a processor predicts a thermal load caused by a door opening event in at least part of a cargo space of a refrigerated transport vehicle based on, at least, an external ambient condition, environmental factors within the cargo space, and a duration of the door opening event. A processor obtains pre-cooling profile information describing cargo space temperature performance with a pre-cooling operation under conditions corresponding to, at least, the predicted thermal load caused by the door opening event. ... International Business Machines Corporation

06/07/18 / #20180155530

Flame-retardant polyallyl and polyalkenyl isocyanurate compounds

Phosphate-based polyallyl isocyanurate cross-linker compounds, polyalkenyl isocyanurate cross-linker compounds, and a flame-retardant resin are disclosed. The phosphate-based polyallyl isocyanurate compound can have allyl phosphate substituents with variable functional groups. ... International Business Machines Corporation

06/07/18 / #20180155529

Flame-retardant polyallyl and polyalkenyl isocyanurate compounds

Phosphate-based polyallyl isocyanurate cross-linker compounds, polyalkenyl isocyanurate cross-linker compounds, and a flame-retardant resin are disclosed. The phosphate-based polyallyl isocyanurate compound can have allyl phosphate substituents with variable functional groups. ... International Business Machines Corporation

06/07/18 / #20180155495

Functionalized polyhydroxyalkanoate materials formed from an unsaturated polyhydroxyalkanoate material

A process of forming a functionalized polyhydroxyalkanoate (pha) material includes forming an unsaturated pha material having a carbon-carbon double bond in a polymer backbone. The process also includes utilizing the unsaturated pha material to form a functionalized pha material. ... International Business Machines Corporation

06/07/18 / #20180154360

Fluidic cell designs for interfacing microfluidic chips and nanofluidic chips

A technique relates to a fluidic cell configured to hold a nanofluidic chip. A first plate is configured to hold the nanofluidic chip. ... International Business Machines Corporation

06/07/18 / #20180154176

Translating different clinical protocols for particle therapy into a set of constraints

A method and system are provided for converting clinical criteria constraints for a target structure of radiation therapy into a second set of constraints. The method includes selecting, by a hardware processor, a plurality of clusters of voxels in the target structure based on pre-specified criteria. ... International Business Machines Corporation

06/07/18 / #20180154175

Radiation therapy treatment planning using regression

A method and system are provided. The method includes splitting, by a processor based on radiation beamlet contributions to neighboring voxels, at least one row in a voxel-beamlet matrix and corresponding elements of a target dose vector prior to, and in preparation for, a regression operation. ... International Business Machines Corporation

06/07/18 / #20180154174

Extracting protobeams for cancer radiation therapy

A method and system are provided. The method includes condensing, by a processor, an original voxel-beamlet matrix stored in a memory device into a reduced dataset for proton beam simulation and therapy. ... International Business Machines Corporation

06/07/18 / #20180153465

Alerting user to adjust clothing layers based on sensed temperature and humidity

A method, system and computer program product for assisting the user to wear an appropriate amount of clothing layers. A smart device (e.g., smartwatch) receives measurements of temperature and humidity sensed at various locations on a human body which are sources of sweat. ... International Business Machines Corporation

06/07/18 / #20180153464

Alerting user to adjust clothing layers based on sensed temperature and humidity

A method, system and computer program product for assisting the user to wear an appropriate amount of clothing layers. A smart device (e.g., smartwatch) receives measurements of temperature and humidity sensed at various locations on a human body which are sources of sweat. ... International Business Machines Corporation

05/31/18 / #20180153042

Glass fiber coatings for improved resistance to conductive anodic filament formation

. . A process of improving resistance to conductive anodic filament (caf) formation is disclosed. The process includes dissolving a base resin material, a lubricant material, and a coupling agent in a solvent to form a functionalized sizing agent solution. ... International Business Machines Corporation

05/31/18 / #20180153035

Multi-stacked electronic device with defect-free solder connection

A method includes forming a multi-stacked electronic device having two or more electronic components, each of the electronic components includes a leadframe, the leadframes of each electronic component are physically joined together using a non-solder metal joining process to form a joint, and the joint is located outside a solder connection region.. . ... International Business Machines Corporation

05/31/18 / #20180152873

Access point selection

Disclosed aspects relate to access point selection. A set of beacon frame transmission data for a set of access points may be collected by a computing device. ... International Business Machines Corporation

05/31/18 / #20180152812

Locating multiple handheld devices

An approach is disclosed that receives, from a number of mobile devices, time data with the timing data is based on an elapsed time from a timing signal and line-of-sight events directed to the mobile devices. A location of each of the mobile devices is determined based on the respective timing data received from each of the mobile devices. ... International Business Machines Corporation

05/31/18 / #20180152627

Determining optimal photograph capture timing based on data from wearable computer eyewear devices

A computer-implemented method includes: receiving, by a computing device, criteria for timing a capture of a photograph by an associated camera device; receiving, by the computing device, an instruction to capture the photograph at a time determined based on the criteria; obtaining, by the computing device, information regarding a status of one or more photograph participants from one or more wearable computing devices worn by the one or more photograph participants; determining, by the computing device, the time to capture the photograph based on the criteria and the status of the one or more photograph participants; and capturing, by the computing device, the photograph at the determined time.. . ... International Business Machines Corporation

05/31/18 / #20180152558

Intelligent call screening

A computer receives an incoming call by a cognitive computing service. The computer determines, by the cognitive computing service (ccs), caller details that the incoming call is not within intended recipient preferences, based on comparing the caller details to call log information database and call information database, wherein the call log information database and call information database comprises previous caller details. ... International Business Machines Corporation

05/31/18 / #20180152544

Emergency data cutoff for storage systems

A computer system includes a network switch coupled to a network, a remote cutoff device coupled to the network switch, and a security alert system connected to the network and coupled to the remote cutoff device. The security alert system receives input from the network indicating data that may be harmful to the system and communicates an alert to the remote cutoff device. ... International Business Machines Corporation

05/31/18 / #20180152543

Emergency data cutoff for storage systems

A computer system includes a network switch coupled to a network, a remote cutoff device coupled to the network switch, and a security alert system connected to the network and coupled to the remote cutoff device. The security alert system receives input from the network indicating data that may be harmful to the system and communicates an alert to the remote cutoff device. ... International Business Machines Corporation

05/31/18 / #20180152539

Proactive communication channel controller in a collaborative environment

A computer-implemented method controls communication channels in a communication network used for an electronic meeting. One or more processors collect a set of participant data related to a set of participants of an electronic meeting. ... International Business Machines Corporation

05/31/18 / #20180152538

Quality of experience for communication sessions

A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a participant focus metric for each of a plurality of participants of a communication session. ... International Business Machines Corporation

05/31/18 / #20180152531

Time and task based validation to enable or disable parental controls

Approaches are provided for to enabling or disabling parental controls based on time or task validation using a centralized computing environment. An approach includes receiving parental control rules for one or more computing devices. ... International Business Machines Corporation

05/31/18 / #20180152527

Method, computer program and computer for estimating location based on social media

A system and method to estimate a location relating to a user who has not filled in information about the location in a profile field in social media such as a microblog. The system and method estimates association between a user in social media and a location includes the steps of acquiring a first content posted to the social media by a first user associated with a first location, determines regional localization of the first content on the basis of the first location, acquires a second content posted to the social media by a second user not associated with a location, determine the degree of a relationship between the first content and the second content, and associating the first location with the second user on the basis of the localization and the degree of the relationship.. ... International Business Machines Corporation

05/31/18 / #20180152525

System and method for attribute based device and service discovery

A method, computer program product, and computer system for receiving, at a first node of a plurality of nodes in a distributed architecture, a request for at least one of a device and a service based upon, at least in part, an attribute of at least one of the device and the service. A query to resolve the request may be forwarded to a plurality of nodes in the distributed architecture. ... International Business Machines Corporation

05/31/18 / #20180152519

Integrating applications with endpoints using dynamic port negotiation

Systems, methods, and computer program products to perform an operation comprising obtaining a set of ports based on monitoring repeated attempts by a client application to establish a connection on ports signaled by a server application, establishing one or more secure connections between a client computer executing the client application to the server computer executing the server application based on the set of ports, opening each port of the set of ports to receive requests from the client application, listening on each of the set of ports for a first request from the client application to the server application, receiving, from the client application, the first request on a first port of the set of ports, and transmitting the first request to the server application.. . ... International Business Machines Corporation

05/31/18 / #20180152428

Single key authentication method

Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.. ... International Business Machines Corporation

05/31/18 / #20180152427

Protecting a web server against an unauthorized client application

An approach is provided for securing communication between a server computer and a client computer. A first string is sent to the client in response to a request to permit an application being executed by the client computer to access a first function. ... International Business Machines Corporation

05/31/18 / #20180152423

Multi-level security enforcement utilizing data typing

A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (mls) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. ... International Business Machines Corporation

05/31/18 / #20180152422

Symmetric multiprocessing management

Disclosed aspects relate to symmetric multiprocessing (smp) management. A first smp topology may be identified by a service processor firmware. ... International Business Machines Corporation

05/31/18 / #20180152412

Initiating social interaction based on e-mail content

Arrangements described herein relate to initiating social interaction based on e-mail content. Information associated with an e-mail being composed by a user can be analyzed to determine whether content of the e-mail is appropriate for incorporation into at least one social system. ... International Business Machines Corporation

05/31/18 / #20180152404

Email interaction analysis and propagation

A system, method and computer program product for managing electronic messages. Embodiments include receiving a conversation document associated with an electronic message. ... International Business Machines Corporation

05/31/18 / #20180152387

Storage area network workload balancing

Storage area network (san) load balancing process is disclosed. The load balancing process can include monitoring an input/output workload within the san. ... International Business Machines Corporation

05/31/18 / #20180152368

Packet flow tracing in a parallel processor complex

Examples of techniques for packet flow tracing in a parallel processor complex are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include receiving, at the parallel processor complex, a task to be executed by the parallel processor complex, wherein the parallel processor complex comprises a trace processor and a plurality of task execution processors; creating, by the trace processor, a trace entry by allocating an element from a shared queue; loading, by the trace processor, the trace entry into a common trace buffer; and loading, by the trace processor, the trace entry into a host interface/queue pair index trace buffer.. ... International Business Machines Corporation

05/31/18 / #20180152340

Managing a generation and delivery of digital identity documents

An approach is provided for managing requests by a cloud-based multipurpose messaging queue (mpmq) located in a first computer. For each given request in requests received by the mpmq, the mpmq receives a specification of whether the given request is a standard or a critical request based on whether the given request requires an action by a second computer of a third party to respond to the given request. ... International Business Machines Corporation

05/31/18 / #20180152339

Application resiliency using apis

An approach is provided for managing resiliency of an application provided by a first service provider (sp). A fail condition indicating an outage of a first service of the first sp is detected. ... International Business Machines Corporation

05/31/18 / #20180152298

Dispersed sub-key credentials

A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (dsn), the method begins by receiving from a requesting entity, at a first user device of at least a first and second user device, a request to authenticate item m, the request including at least a request for a key n. The method continues by obtaining a first password, retrieving a first portion x of the key n based on the first password, obtaining a factor my of a second portion y of the key n based on a factor request including m, generating a signature utilizing the first portion x of the key n and the factor my of the second portion y of the key n, generating an authentication response that includes the signature and sending the authentication response to the requesting entity.. ... International Business Machines Corporation

05/31/18 / #20180152292

Authenticated copying of encryption keys between secure zones

The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.. ... International Business Machines Corporation

05/31/18 / #20180152291

Managing security in a computing environment

In response to at least one message received by a processor of a gateway server from a user device wherein each message requests that an encryption key be downloaded to the user device, the processor generates at least one unique encryption key for each message and sends the at least one generated encryption key to the user device, but does not store any of the generated encryption keys in the cloud. For each encryption key having been sent to the user device, the processor receives each encryption key returned from the user device. ... International Business Machines Corporation

05/31/18 / #20180152289

Checkpoints for permissionless blockchains

A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. ... International Business Machines Corporation

05/31/18 / #20180152278

Multi-domain connection establishment in computer networking communications

A method, computer program product and computer system achieves full-mesh connectivity between any two domains in a multi-domain computing environment such as an infiniband or converged ethernet environment. A connection between two domains is established using a single connection management identifier, and private payloads in connection management datagrams, to drive full-duplex connectivity over a pair of half-duplex connections. ... International Business Machines Corporation

05/31/18 / #20180152277

Multi-domain connection establishment in computer networking communications

A method, computer program product and computer system achieves full-mesh connectivity between any two domains in a multi-domain computing environment such as an infiniband or converged ethernet environment. A connection between two domains is established using a single connection management identifier, and private payloads in connection management datagrams, to drive full-duplex connectivity over a pair of half-duplex connections. ... International Business Machines Corporation

05/31/18 / #20180152023

Dynamic photovoltaic adaption for managing grid volatility using a photovoltaic harvester

One embodiment provides a method, including: receiving information, from at least one energy subsystem, indicating a desired amount of photovoltaic output to be produced by at least one photovoltaic panel, wherein the at least one photovoltaic panel comprises at least one photovoltaic harvester; ascertaining the amount of photovoltaic output being produced by the at least one photovoltaic panel; determining the difference between the desired amount of photovoltaic output and the amount of photovoltaic output being produced; identifying the maximum possible amount of photovoltaic output that could be produced by the at least one photovoltaic panel; and optimizing, using an optimization technique, the amount of photovoltaic output produced by the at least one photovoltaic harvester by adjusting at least one characteristic of the at least one photovoltaic harvester, wherein the adjusting comprises: if the difference is less than the maximum possible amount, adjusting at least one characteristic of the at least one photovoltaic harvester to produce the desired amount of photovoltaic output; and if the difference is more than the maximum possible amount, adjusting at least one characteristic of the at least one photovoltaic harvester to produce the maximum possible amount of photovoltaic output.. . ... International Business Machines Corporation

05/31/18 / #20180151727

Spacer formation in vertical field effect transistors

Embodiments of the present invention provide systems and methods for generating oxide spacers in a vertical field transistor. The fin of the channel facilitates the electrical current flowing between the source terminal and the drain terminal. ... International Business Machines Corporation

05/31/18 / #20180151686

Finfet with reduced parasitic capacitance

A method of fabricating a finfet semiconductor device, the method including forming a self-aligned silicide contact above and in direct contact with exposed portions of semiconductor fins not covered by a gate electrode, wherein an upper surface of the self-aligned silicide contact is substantially flush with an upper surface of an adjacent isolation region, patterning a blanket metal layer to form a source-drain contact on the upper surface of the self-aligned silicide contact, the self-aligned silicide contact provides an electrical path from the semiconductor fins to the source-drain contact, and recessing a portion of the self-aligned silicide contact without recessing the isolation region, the self-aligned silicide contact is recessed selective to a mask used to pattern the source-drain contact.. . ... International Business Machines Corporation

05/31/18 / #20180151674

Iii-v transistor device with self-aligned doped bottom barrier

A semiconductor device comprises a first layer of a substrate arranged on a second layer of the substrate the second layer of the substrate including a doped 111-v semiconductor material barrier layer, a gate stack arranged on a channel region of the first layer of a substrate, a spacer arranged adjacent to the gate stack on the first layer of the substrate, an undoped epitaxially grown iii-v semiconductor material region arranged on the second layer of the substrate, and an epitaxially grown source/drain region arranged on the undoped epitaxially grown iii-v semiconductor material region, and a portion of the first layer of the substrate.. . ... International Business Machines Corporation

05/31/18 / #20180151668

Electric field assisted placement of nanomaterials through dielectric engineering

A method of positioning nanomaterials that includes forming a set of electrodes on a substrate, and covering the electrodes and substrate with a single layer of guiding dielectric material. The method may continue with patterning the guiding dielectric to provide dielectric guide features, wherein an exposed portion of the substrate between the dielectric guide features provides a deposition surface. ... International Business Machines Corporation

05/31/18 / #20180151491

Airgap protection layer for via alignment

A method for via alignment includes forming first airgaps between interconnect structures and depositing a pinch off layer to close off openings to the first airgaps. A protection layer is formed in divots in the pinch off layer. ... International Business Machines Corporation

05/31/18 / #20180151489

Metallic blocking layer for reliable interconnects and contacts

A semiconductor structure is provided that includes a first interconnect dielectric layer containing a first interconnect metal structure embedded therein. A second interconnect dielectric layer containing a second interconnect metal structure embedded therein is located atop the first interconnect dielectric layer. ... International Business Machines Corporation

05/31/18 / #20180151420

Interconnect structure

Semiconductor structures include a patterned interlayer dielectric overlaying a semiconductor substrate. The interlayer dielectric includes a first dielectric layer and at least one additional dielectric layer disposed on the first dielectric layer, wherein the patterned interlayer dielectric comprises at least one opening extending through the interlayer dielectric to the semiconductor substrate. ... International Business Machines Corporation

05/31/18 / #20180151330

Cross sectional depth composition generation utilizing scanning electron microscopy

A method for generating cross-sectional profiles using a scanning electron microscope (sem) includes scanning a sample with an electron beam to gather an energy-dispersive x-ray spectroscopy (eds) spectrum for an energy level to determine element composition across an area of interest. A mesh is generated to locate positions where a depth profile will be taken. ... International Business Machines Corporation

05/31/18 / #20180151248

Testing content addressable memory and random access memory

The present invention provides a system and method of testing cams and rams. In an exemplary embodiment, the system includes a multiple input signature register (misr) logically coupled to digital outputs of a cam, to digital inputs of a ram, and to digital outputs of an abist controller circuit, where the misr includes a plurality of l1 latch circuits logically coupled to a plurality of l2 latch circuits, a plurality of multiplexer circuits logically coupled to the plurality of l1 latch circuits, a plurality of exclusive or circuits (inner xor circuits) logically coupled to the plurality of mux circuits and to the plurality of l2 latch circuits, and at least two xor circuits (outer xor circuits), each of the outer xor circuits logically coupled to one of the inner xor circuits, to at least one of the mux circuits, and to at least one of the l2 latch circuits.. ... International Business Machines Corporation

05/31/18 / #20180151246

Built-in self-test for embedded spin-transfer torque magnetic random access memory

Examples of techniques for a built-in self-test (bist) for embedded spin-transfer torque magnetic random access memory (stt-mram) are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: initiating, by a processor, a bist for the stt-mram; performing, by the processor, an error-correcting code (ecc) test for a portion of the stt-mram; responsive to the ecc test not being passed, determining whether a maximum signal is reached; responsive to the maximum signal not being reached, increasing the signal and performing the ecc test again; and responsive to the maximum signal being reached, determining that the portion of the stt-mram is bad.. ... International Business Machines Corporation

05/31/18 / #20180151195

Wireless tape cartridge handling

The system includes a base frame and a controller attached to the base frame. An access point is attached to the controller. ... International Business Machines Corporation

05/31/18 / #20180151192

Conversational analytics

A computer-implemented method includes determining a meeting has initialized between a first user and a second user, wherein vocal and video recordings are produced for at least the first user. The method receives the vocal and video recordings for the first user. ... International Business Machines Corporation

05/31/18 / #20180151181

Cognitive security for voice phishing activity

An approach is provided in which a question answer system monitors a voice conversation between a first entity and a second entity. During the conversation, the question answer system parses the conversation into information phrases, and constructs the information phrases into a current conversation pattern. ... International Business Machines Corporation

05/31/18 / #20180151159

Key transposition

Embodiments of the present invention provide methods, computer program products, and systems to for automatic key transposition. Embodiments of the present invention can be used to determine compatibility between a known melody capable of being generated by a pitch generation system and a first performance profile associated with a first performer that performs in conjunction with the pitch generation system. ... International Business Machines Corporation

05/31/18 / #20180151158

Key transposition

Embodiments of the present invention provide methods, computer program products, and systems to for automatic key transposition. Embodiments of the present invention can be used to determine compatibility between a known melody capable of being generated by a pitch generation system and a first performance profile associated with a first performer that performs in conjunction with the pitch generation system. ... International Business Machines Corporation

05/31/18 / #20180150980

Mapping infrastructure layout between non-corresponding datasets

A method for mapping infrastructure layout between non-corresponding datasets including accessing from a memory a set of long links with points that trace the curvature of a set of linestrings, accessing from the memory a set of short links that are short enough for analytical purposes wherein each short link represents a straight line, and from the set of long links and the set of short links, using a processor to create a set of hybrid links for storage in the memory, each hybrid link corresponding to one short link for analytic purposes, a plurality of the hybrid links including at least one of the points for tracing the curvature of the set of linestrings.. . ... International Business Machines Corporation

05/31/18 / #20180150928

Cognitive recommendations for first responders

Providing recommendations for first responders can include receiving, using a processor, real time sensor data from a plurality of sensors, correlating, using the processor, the real time sensor data with historical data for a plurality of prior incidents to determine a selected prior incident matching the real time sensor data, and determining a recommended next action from an operating procedure based upon a next action taken for the selected prior incident.. . ... International Business Machines Corporation

05/31/18 / #20180150916

Distance-based social message pruning

Correspondences in a social networking system are analyzed to determine at least one topic. An activity stream with the at least one topic is analyzed. ... International Business Machines Corporation

05/31/18 / #20180150915

Distance-based social message pruning

Correspondences in a social networking system are analyzed to determine at least one topic. An activity stream with the at least one topic is analyzed. ... International Business Machines Corporation

05/31/18 / #20180150891

Touch and pressure-based apparel image searching

Methods, systems, and computer program products for pressure-based apparel image searching are provided herein. A computer-implemented method includes determining an object of interest within an image displayed on a screen by detecting physical contact imparted by a user at a particular position on the screen corresponding to where the first object is located; quantifying the amount of pressure applied by the user via the physical contact; determining additional objects of interest based on the amount of pressure applied by the user by identifying objects that are located within a specified distance from the first object, and wherein the specified distance corresponds to the amount of pressure applied by the user; retrieving, from at least one electronic commerce website, images of products corresponding to the first object of interest and images of products corresponding to each of the additional objects of interest; and displaying the retrieved images on the screen.. ... International Business Machines Corporation

05/31/18 / #20180150871

Continuing playback of advertisements across multiple devices based on monitoring user active viewing duration

A computer-implemented method comprising: presenting, by a computing device, an advertisement on a first device; monitoring, by the computing device, viewing activity by a user of the advertisement, wherein the monitoring comprises tracking an amount of time that the user actively views the advertisement on the first device; and continuing, by the computing device, playback of the advertisement on one or more second devices until the user has actively viewed the advertisement for a target impression time based on the monitoring.. . ... International Business Machines Corporation

05/31/18 / #20180150835

Auditing certified blockchain checkpoints

A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. ... International Business Machines Corporation

05/31/18 / #20180150799

Blockchain checkpoints and certified checkpoints

A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. ... International Business Machines Corporation

05/31/18 / #20180150780

Optimization of steady state cost for multi-site high availability application deployment of management and managed intrastructure

A method and system. The method includes receiving datacenter context input information, processing the datacenter context input information, and outputting the cost-versus-datacenter-quantity information. ... International Business Machines Corporation

05/31/18 / #20180150769

Method to determine columns that contain location data in a data set

A method of identifying location data in a data set comprises generating a data sample from the data set, training a plurality of models with the data sample to identify the location data in the data set, and applying the data set to the trained models to determine the location data within the data set. The plurality of models includes one or more first models to identify primary attributes of the location data indicating a geographical area and one or more second models to identify secondary attributes of the location data used to determine corresponding primary attributes.. ... International Business Machines Corporation

05/31/18 / #20180150765

Method to determine columns that contain location data in a data set

A method of identifying location data in a data set comprises generating a data sample from the data set, training a plurality of models with the data sample to identify the location data in the data set, and applying the data set to the trained models to determine the location data within the data set. The plurality of models includes one or more first models to identify primary attributes of the location data indicating a geographical area and one or more second models to identify secondary attributes of the location data used to determine corresponding primary attributes.. ... International Business Machines Corporation

05/31/18 / #20180150757

Accurate temporal event predictive modeling

Embodiments for accurate temporal event predictive modeling by a processor. An average reverse event delay may be determined from one or more event delays in a time-series window. ... International Business Machines Corporation

05/31/18 / #20180150753

Analyzing text documents

A computer-implemented method of analyzing text documents, includes identifying a relationship in a text document associated with an entity, building a predictive model from training data, in response to said identifying a relationship, wherein the predictive model includes a prediction error, and determining whether to store the identified relationship in memory, based on the prediction error.. . ... International Business Machines Corporation

05/31/18 / #20180150748

Enhanced ingestion of question-answer pairs into question answering systems by preprocessing online discussion sites

An approach is provided that ingests question-answer pairs from an online discussion site into a question answering (qa) system by preprocessing the online discussion site prior to ingesting the data. The preprocessing of the online discussion site is performed by identifying stale questions posted to the online discussion site, analyzing the stale question to determine an appropriate trigger post, with the trigger post is designed to instigate an answer to the stale question, with the system automatically generating and posting the trigger post to the online discussion site.. ... International Business Machines Corporation

05/31/18 / #20180150747

Enhancing time-to-answer for community questions in online discussion sites

An approach is provided that identifies stale questions in an online discussion site, such as a forum. A stale question is a question where an answer to the stale question is not detected as being posted to the online discussion site. ... International Business Machines Corporation

05/31/18 / #20180150626

Single key authentication method

Systems, methods, and computer-readable media are disclosed for authenticating access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. The service provider system may receive an authentication image from a user application executing on a user device. ... International Business Machines Corporation

05/31/18 / #20180150601

Reducing contagious disease spread utilizing travel information

In an approach, one or more computer processors receive a notification of one or more incidences of a contagious disease in at least one geographic region. The approach includes one or more computer processors retrieving a plurality of information associated with the contagious disease and a plurality of information associated to one or more travelers to at least one geographic region in a timeframe associated with the one or more incidences of the contagious disease. ... International Business Machines Corporation

05/31/18 / #20180150600

Reducing contagious disease spread utilizing travel information

In an approach, one or more computer processors receive a notification of one or more incidences of a contagious disease in at least one geographic region. The approach includes one or more computer processors retrieving a plurality of information associated with the contagious disease and a plurality of information associated to one or more travelers to at least one geographic region in a timeframe associated with the one or more incidences of the contagious disease. ... International Business Machines Corporation

05/31/18 / #20180150584

Placement clustering-based white space reservation

A system and method place unit-level components in a macro within a unit of an integrated circuit that includes two or more of the units that each include two or more of the macros. The method includes detecting white space in a congestion plot of the macro. ... International Business Machines Corporation

05/31/18 / #20180150573

Identifying relationships of interest of entities

A method, system and computer program product for identifying relationships of interest of entities in a data modeling environment, where the data modeling environment represents objects as entities with links representing relationships between the entities. A query is received, where the query includes entity(ies) and link(s) with at least one of the entities or links designated as an output item. ... International Business Machines Corporation

05/31/18 / #20180150570

Identifying relationships of interest of entities

A method, system and computer program product for identifying relationships of interest of entities in a data modeling environment, where the data modeling environment represents objects as entities with links representing relationships between the entities. A query is received, where the query includes entity(ies) and link(s) with at least one of the entities or links designated as an output item. ... International Business Machines Corporation

05/31/18 / #20180150558

Finding content on computer networks

Provided are techniques for finding content on computer networks. A search request having search terms is received. ... International Business Machines Corporation

05/31/18 / #20180150546

Real-time clustering using multiple representatives from a cluster

Embodiments include method, systems and computer program products for real-time data clustering using multiple representatives associated with the data cluster. In some embodiments, a data point may be received from a data source. ... International Business Machines Corporation

05/31/18 / #20180150519

Extreme value estimation for query optimization in analytical databases

A mechanism is provided for preparing a query execution plan in a database management system. A determination is made of set of the query predicates in a query comprising query predicates associated with respective attributes of a set of attributes to evaluate using attribute value information. ... International Business Machines Corporation

05/31/18 / #20180150511

Processing a data query

A computer-implemented method of processing a data query, includes in an edge device, processing a subquery of the data query, storing first statistical data on the subquery, and analyzing the first statistical data to optimize a parameter for processing subqueries.. . ... International Business Machines Corporation

05/31/18 / #20180150505

Dynamically optimizing flows in a distributed transaction processing environment

Methods and systems for distributed transaction processing include assigning portions of a logical unit of work to one or more transaction participants. Resource usage information relating to the portions of the logical unit of work is tracked from the respective one or more transaction participants. ... International Business Machines Corporation

05/31/18 / #20180150503

Query processing with bounded staleness for transactional mutations in nosql database

A computer-implemented method executed on one or more processors is provided for processing a query for a nosql (non-structured query language) database. The computer-implemented method includes periodically monitoring active transactions that started and are committing dirty versions before a specific time, sending a query to fetch a state of the active transactions, and receiving a query result. ... International Business Machines Corporation

05/31/18 / #20180150502

Self-maintaining effective value range synopsis in presence of deletes in analytical databases

A mechanism is provided for updating attribute value information for a data table. The data table involves a set of attributes. ... International Business Machines Corporation

05/31/18 / #20180150474

Identification of high deduplication data

A computer-implemented method includes dividing a data set into a plurality of regions and dividing the plurality of regions into a plurality of chunks of fixed size. The computer-implemented method further includes determining a sample size of the plurality of chunks to be sampled for each region, wherein the sample size is determined based, at least in part, on an acceptance of a likelihood of identifying at least one collision between two regions corresponding to logical entities of a first cluster of logical entities. ... International Business Machines Corporation

05/31/18 / #20180150473

Identification of high deduplication data

A computer-implemented method includes dividing a data set into a plurality of regions and dividing the plurality of regions into a plurality of chunks of fixed size. The computer-implemented method further includes determining a sample size of the plurality of chunks to be sampled for each region, wherein the sample size is determined based, at least in part, on an acceptance of a likelihood of identifying at least one collision between two regions corresponding to logical entities of a first cluster of logical entities. ... International Business Machines Corporation

05/31/18 / #20180150461

Media affinity management system

A method, system, and computer program product for managing media. The method comprises a computer system. ... International Business Machines Corporation

05/31/18 / #20180150456

Cognitive contextualization of emergency management system communications

Software that contextualizes communications during an emergency event by performing the following steps: (i) receiving an input communication written, spoken, or communicated via gestures by a first user, wherein the input communication includes natural language-based input information relating to an emergency event; (ii) determining an output communication to be sent to a second user, wherein the output communication is based, at least in part, on the input communication, and wherein the output communication includes natural language-based output information relating to the emergency event; (iii) determining a cognitive state of the first user and a cognitive state of the second user; and/or (iv) modifying the output communication based, at least in part, on the cognitive state of the first user, wherein modifying the output communication includes modifying natural language content of the output information.. . ... International Business Machines Corporation

05/31/18 / #20180150453

Contextual analogy resolution

Embodiments relate to an artificially intelligence platform to resolve an analogy. Representation. ... International Business Machines Corporation

05/31/18 / #20180150452

Contextual analogy representation

Embodiments relate to an intelligent computer platform to provide a contextual analogy response. The aspect of providing a contextual analogy response includes receiving a communication that includes an analogy. ... International Business Machines Corporation

05/31/18 / #20180150451

Contextual analogy response

Embodiments relate to an intelligent computer platform to provide a contextual analogy response. The aspect of providing a contextual analogy response includes receiving a communication that includes an analogy. ... International Business Machines Corporation

05/31/18 / #20180150445

Providing data quality feedback while end users enter data in electronic forms

An automated feedback may be provided while data is entered in an electronic form. Input entered into an input field of a form fillable window provided on a user interface display screen may be detected. ... International Business Machines Corporation

05/31/18 / #20180150442

Controlling access to documents by parties

Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. ... International Business Machines Corporation

05/31/18 / #20180150419

Uniform memory access architecture

Disclosed aspects relate to a computer system having a plurality of processor chips and a plurality of memory buffer chips and a methodology for operating the computer system. The memory buffer chips may be communicatively coupled to at least one memory module which can be configured for storing memory lines and assigned to the memory buffer chip. ... International Business Machines Corporation

05/31/18 / #20180150418

Uniform memory access architecture

Disclosed aspects relate to a computer system having a plurality of processor chips and a plurality of memory buffer chips and a methodology for operating the computer system. The memory buffer chips may be communicatively coupled to at least one memory module which can be configured for storing memory lines and assigned to the memory buffer chip. ... International Business Machines Corporation

05/31/18 / #20180150417

Deallocation of memory buffer in multiprocessor systems

Described herein are technical features for freeing a buffer used during execution of a work-item by a multiprocessor. An example method includes identifying a first processing unit that assigned the buffer to the work-item, in response to a request from a second processing unit to free the buffer. ... International Business Machines Corporation

05/31/18 / #20180150416

Pre-allocating memory buffers by physical processor and using a bitmap metadata in a control program

Aspects of the present invention include a method, system and computer program product that implements a memory management scheme for each processor in a multiprocessor system. The method includes pre-allocating, for each processor in a multiprocessor system, a set of memory buffers; and implementing a metadata bitmap for each pre-allocated set of memory buffers, wherein the metadata bitmap for each pre-allocated set of memory buffers comprises a plurality of bits, and wherein each of the plurality of bits is indicative of a usage state of a corresponding one of the memory buffers within each pre-allocated set of memory buffers.. ... International Business Machines Corporation

05/31/18 / #20180150409

Generating memory dumps

A method for generating a dump comprising data generated by a virtual system in a computing environment is depicted. The method comprises: initiating a dump process for dumping data generated by the virtual system and stored in guest memory; sending a dump request for the data from the virtual machine monitor to the trusted component; in response to receiving the dump request, generating a symmetric dump generating key; reading the data from the guest memory; encrypting the data with the symmetric dump generating key; encrypting the symmetric dump generating key with the public cryptographic key of the client system; providing the encrypted dump data and the encrypted symmetric dump generating key to the virtual machine monitor; generating a dump comprising the encrypted dump data and the encrypted symmetric dump generating key; and providing the dump to the client system.. ... International Business Machines Corporation

05/31/18 / #20180150402

Using cache lists for processors to determine tracks to demote from a cache

Provided are a computer program product, system, and method for using cache lists for processors to determine tracks in a storage to demote from a cache. Tracks in the storage stored in the cache are indicated in lists. ... International Business Machines Corporation

05/31/18 / #20180150396

Managing lowest point of coherency (lpc) memory using a service layer adapter

Managing lowest point of coherency (lpc) memory using a service layer adapter, the adapter coupled to a processor and an accelerator on a host computing system, the processor configured for symmetric multi-processing, including receiving, by the adapter, a memory access instruction from the accelerator; retrieving, by the adapter, a real address for the memory access instruction; determining, using base address registers on the adapter, that the real address targets the lpc memory, wherein the base address registers direct memory access requests between the lpc memory and other memory locations on the host computing system; and sending, by the adapter, the memory access instruction and the real address to a media controller for the lpc memory, wherein the media controller for the lpc memory is attached to the adapter via a memory interface.. . ... International Business Machines Corporation

05/31/18 / #20180150395

Extended store forwarding for store misses without cache allocate

A load store unit (lsu) in a processor core detects that new data produced by the processor core is ready to be drained to an l2 cache. In response to the lsu detecting that an earlier version of the new data is not stored in l1 cache, a memory controller sends the new data as l1 cache missed data to a store queue (stq), where the stq makes data available for deallocation from the stq to the l2 cache. ... International Business Machines Corporation

05/31/18 / #20180150388

Smart emulator for wearable devices

Input of a video file is received. The video file includes video of a representation of a wearable device. ... International Business Machines Corporation

05/31/18 / #20180150385

Enabling non-blocking runtime application debugging for a single threaded server environment

Systems, methods, and computer program products to perform an operation comprising non-blocking runtime debugging of an application executing in a single threaded server environment by obtaining a first request from a head of a request queue, processing the first request based on server application code under debugging, triggering, in response to the first request, a debugging procedure, pausing processing of the first request based on the debugging procedure, tagging the first request with an indication that the first request is in debugging, placing the first request back on the request queue in a position behind the head of the queue, storing debug information related to the first request, and executing at least a second request from the request queue while processing of the first request is paused.. . ... International Business Machines Corporation

05/31/18 / #20180150374

Packet flow tracing in a parallel processor complex

Examples of techniques for packet flow tracing in a parallel processor complex are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include receiving, at the parallel processor complex, a task to be executed by the parallel processor complex, wherein the parallel processor complex comprises a trace processor and a plurality of task execution processors; creating, by the trace processor, a trace entry by allocating an element from a shared queue; loading, by the trace processor, the trace entry into a common trace buffer; and loading, by the trace processor, the trace entry into a host interface/queue pair index trace buffer.. ... International Business Machines Corporation

05/31/18 / #20180150369

Data buffer spare architectures for dual channel serial interface memories

Examples of techniques for implementing a spare data buffer in a memory are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include detecting, by a processor, a failed data buffer in a memory. ... International Business Machines Corporation

05/31/18 / #20180150365

Disaster recover of managed systems

A mechanism is provided for disaster recovery of managed systems. Responsive to an identification of a virtual machine recovery condition occurring at a first node site, one or more virtual machines to be recovered to a second site node are identified. ... International Business Machines Corporation

05/31/18 / #20180150355

Reallocation in a dispersed storage network (dsn)

A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. When a is to dsn undergo a change from a first system configuration of a decentralized, or distributed, agreement protocol (dap) to a second system configuration of the dap (e.g., such as based on addition, and/or removal of storage unit(s) (su(s)) within the dsn or reallocation of data within the dsn, etc.), a computing device identifies a dap transition mapping between the first system configuration of the dap to the second system configuration of the dap. ... International Business Machines Corporation

05/31/18 / #20180150353

Pre-positioning pre-stored content in a content distribution system

A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (dsn), the method begins by selecting a plurality of network edge units for staging public pillar encoded data slices. The method continues by identifying target content for partial download to the plurality of network edge units. ... International Business Machines Corporation

05/31/18 / #20180150347

In-channel memory mirroring

Embodiments of the present invention provide methods, program products, and systems for improving dimm level memory mirroring. Embodiments of the present invention can be used to configure a first memory module device of a pair memory module devices to receive a set of read and write operations and configure a second memory module device of the pair of memory module devices to receive only write operations of the set of read and write operations. ... International Business Machines Corporation

05/31/18 / #20180150338

Maintaining data integrity over multiple applications

Systems and methods for maintaining data integrity across multiple applications are disclosed. A computer-implemented method comprises: monitoring, by a computing device, user data across multiple computer applications to detect trackable data, the trackable data including a first data set associated with a first application and a second data set associated with a second application; tracking, by the computing device, the trackable data; determining, by the computing device, that the first data set is similar to the second data set; identifying, by the computing device, a discrepancy between the first data set and the second data set; and implementing, by the computing device, a change to the first data set based on the second data set to automatically maintain integrity of the first and second data sets across the respective first and second applications.. ... International Business Machines Corporation

05/31/18 / #20180150333

Bandwidth aware resource optimization

An application workload is scheduled for execution by each of one or more processing cores operating in a first mode. Performance metrics for the each of the one or more processing cores and a memory component are monitored, wherein the memory component stores data necessary for the one or more processing cores to carry out instructions to complete the scheduled workload. ... International Business Machines Corporation

05/31/18 / #20180150332

Hyper-threaded processor allocation to nodes in multi-tenant distributed software systems

A mechanism is provided for allocating a hyper-threaded processor to nodes of multi-tenant distributed software systems. Responsive to receiving a request to provision a node of the multi-tenant distributed software system on the host data processing system, a cluster to which the node belongs is identified. ... International Business Machines Corporation

05/31/18 / #20180150331

Computing resource estimation in response to restarting a set of logical partitions

A method for determining and managing computing resources within a virtualized computing environment in response to restarting a set of partitions. The method includes at least one computer processor identifying a set of partitions affected by an event within a first computing system, the set of affected partitions is identified for restart. ... International Business Machines Corporation

05/31/18 / #20180150319

Template-based methodology for validating hardware features

In one embodiment of the present invention, a thread is scheduled for execution by a processor, and the thread includes instructions for testing functionality of a feature of the processor. A workload location on the thread is determined. ... International Business Machines Corporation

05/31/18 / #20180150310

Input/output component selection for virtual machine migration

An approach to optimizing virtual machine (vm) migration is provided, the approach involves receiving a request to migrate a first vm from a first server to a second server, selecting a first input/output (i/o) virtualization component associated with the first server and a second i/o virtualization component associated with the second server for migrating the first vm, creating a map of network adapters associated with the first and second i/o virtualization components, selecting first network adapters associated with the first i/o virtualization component and second network adapters associated with the second i/o virtualization based, at least in part, on the map of network adapters and sending an indication of the selected first and second i/o virtualization components and the selected first and second network adapters to be used for migrating the first vm.. . ... International Business Machines Corporation

05/31/18 / #20180150303

Efficient booting system

An approach for efficient booting. The approach loads a firmware into a memory from one or more integrated memories, wherein the one or more integrated memories are flash memories on a motherboard. ... International Business Machines Corporation

05/31/18 / #20180150300

Reconfigurable processor with load-store slices supporting reorder and controlling access to cache slices

A processor core having multiple parallel instruction execution slices and coupled to multiple dispatch queues by a dispatch routing network provides flexible and efficient use of internal resources. The configuration of the execution slices is selectable so that capabilities of the processor core can be adjusted according to execution requirements for the instruction streams. ... International Business Machines Corporation

05/31/18 / #20180150235

Configuration of a physical control unit to support multiple logical control units for different tape drive types in a mainframe native tape attachment storage system

Various embodiments of a tape storage system having a physical control unit configured to support multiple logical control units are provided. Each logical control unit supports communication with a single tape drive model type up to a maximum number of drives. ... International Business Machines Corporation

05/31/18 / #20180150229

Enabling point-in-time-copy target volumes to be primary volumes in cascaded data replication systems

A method for enabling point-in-time-copy target volumes to be primary volumes in pprc relationships is disclosed. In one embodiment, such a method includes reserving, on a first storage device, first resources needed to establish a first point-in-time-copy relationship between a first source volume and a first target volume. ... International Business Machines Corporation

05/31/18 / #20180150228

Target volume shadow copy

A method for preventing data loss in target volumes of copy service functions is disclosed. In one embodiment, such a method includes detecting a copy service function that copies data from a source volume to a target volume. ... International Business Machines Corporation

05/31/18 / #20180150227

Mapping of logical volumes to host clusters

A method for data storage includes defining a host cluster within a group of host computers, which access a storage system that includes multiple logical volumes. The host cluster includes two or more of the host computers. ... International Business Machines Corporation

05/31/18 / #20180150223

Pre-allocating memory buffers by physical processor and using a bitmap metadata in a control program

Aspects of the present invention include a method, system and computer program product that implements a memory management scheme for each processor in a multiprocessor system. The method includes pre-allocating, for each processor in a multiprocessor system, a set of memory buffers; and implementing a metadata bitmap for each pre-allocated set of memory buffers, wherein the metadata bitmap for each pre-allocated set of memory buffers comprises a plurality of bits, and wherein each of the plurality of bits is indicative of a usage state of a corresponding one of the memory buffers within each pre-allocated set of memory buffers.. ... International Business Machines Corporation

05/31/18 / #20180150200

Moving an object by drag operation on a touch panel

A contact state of a finger with respect to a first displayed object is detected. In response to detecting a double-click operation on the first displayed object at a first position in a depthwise direction, the first displayed object is moved onto a surface of a display screen of a three-dimensional (3-d) display. ... International Business Machines Corporation

05/31/18 / #20180150194

Three dimensional hierarchical data display

Embodiments provide receiving a hierarchical dataset comprising a plurality of tiers of data, wherein the plurality of tiers each comprise one or more nodes, creating a page corresponding to each of the plurality of tiers of data in a three-dimensional book model, drawing the one or more nodes for the corresponding tier of data on the created page for each created page; and enabling a user to view a selected page of the plurality of created pages via a graphical user interface.. . ... International Business Machines Corporation

05/31/18 / #20180150193

Three-dimensional hierarchical data display

Embodiments provide receiving a hierarchical dataset comprising a plurality of tiers of data, wherein the plurality of tiers each comprise one or more nodes, creating a page corresponding to each of the plurality of tiers of data in a three-dimensional book model, drawing the one or more nodes for the corresponding tier of data on the created page for each created page; and enabling a user to view a selected page of the plurality of created pages via a graphical user interface.. . ... International Business Machines Corporation

05/31/18 / #20180150097

Reference current circuit architecture

An apparatus includes a plurality of mirrored transistor pairs configured to provide a first output current, and a second output current that is substantially equal to the first output current. The apparatus also includes a load isolation transistor configured to pass the first output current along to a resistive load and a first and a second biasing transistor configured to bias the load isolation transistor with a load biasing voltage. ... International Business Machines Corporation

05/31/18 / #20180150072

Renewable uav energy via blade rotation

A computer-implemented method includes: monitoring, by a computer device, a charge level of a battery of an unmanned aerial vehicle (uav); determining, by the computer device and based on the monitoring, the charge level is less than a threshold level; docking the uav on a host vehicle; charging the battery using wind-induced rotation of a rotor of the uav while the uav is docked on the host vehicle; determining, by the computer device, the uav is moving away from a destination while the uav is docked on the host vehicle; and undocking the uav from the host vehicle based on the determining the uav is moving away from the destination.. . ... International Business Machines Corporation

05/31/18 / #20180149815

Off-axis micro-mirror arrays for optical coupling in polymer waveguides

A micro-mirror array for optical coupling in a waveguide array including, a transparent body having a slanted portion, a sidewall portion, and a bottom portion, the sidewall portion and the bottom portion each respectively facing the slanted portion, and wherein a complementary shape of a conventional form off-axis mirror is arranged on the slanted portion, and a reflective coating on at least a portion of the complementary shape.. . ... International Business Machines Corporation

05/31/18 / #20180149770

Dust emission forecasting

Techniques for generating dynamic dust emission risk index values via construction and use of a dynamic dust emission risk index model are provided. In one example, a computer-implemented method comprises generating, by a system operatively coupled to a processor, a dynamic dust emission risk index value based on a dynamic dust emission risk index model. ... International Business Machines Corporation

05/31/18 / #20180149696

Generating a unique die identifier for an electronic chip

Generating a unique die identifier for an electronic chip including placing the electronic chip in an identifier generation state, wherein the electronic chip comprises a set of test circuits, wherein each of the set of test circuits is attached to a corresponding component on the electronic chip; obtaining an ordered list of race pairs of the set of test circuits; for each race pair in the ordered list of race pairs of the set of test circuits: selecting the race pair of test circuits; executing a race between the selected race pair; and adding an element to the unique die identifier based on an outcome of the executed race; and returning the electronic chip to an operational state.. . ... International Business Machines Corporation

05/31/18 / #20180149624

Vibration powered environmental monitoring

A method for monitoring transportation of a package, as well as the apparatus for monitoring transportation, that uses an environmental monitoring device electrically connected to a vibration-to-electricity converter. The vibration-to-electricity converter is electrically attached to the environmental monitoring device.. ... International Business Machines Corporation

05/31/18 / #20180149623

Vibration powered environmental monitoring

A method for monitoring transportation of a package, as well as the apparatus for monitoring transportation, that uses an environmental monitoring device electrically connected to a vibration-to-electricity converter. The vibration-to-electricity converter is electrically attached to the environmental monitoring device.. ... International Business Machines Corporation

05/31/18 / #20180149577

Particulate matter monitoring

Techniques for monitoring particulate matter (pm) mass concentration using relatively low cost devices are described. A computer-implemented method comprises determining, by a device operatively coupled to a processor, relationships between: first pm mass data determined by a monitor station device for a first atmospheric area over a period of time; first pm count data determined by a reference pm count device for the first atmospheric area over the period of time; and first conditional information comprising first values for defined conditional parameters, wherein the first values are associated with the first atmospheric area over the period of time. ... International Business Machines Corporation

05/31/18 / #20180149294

Releasable, threadless conduit connector for liquid manifold

Conduit connectors for liquid manifolds and methods of fabrication are provided. In one embodiment, a conduit connector is recessed, at least in part, within a liquid manifold, and includes a conduit-receiving opening or socket and at least one releasable retention component. ... International Business Machines Corporation

05/31/18 / #20180148856

Separation of alpha emitting species from plating baths

A plating product fabrication method includes forming a first concentrate. The concentrate includes a tin (sn) species and a trace amount of polonium (po) species. ... International Business Machines Corporation

05/31/18 / #20180148296

Elevator management according to probabilistic destination determination

Embodiments of the present invention provide a method, system and computer program product for smart elevator car destination management according to probabilistic destination determination. In an embodiment of the invention, a method for smart elevator car destination management according to probabilistic destination determination includes predicting a set of passengers requesting use of an elevator car in a bank of elevator cars in a building and determining a probability for each of the passengers that each passenger will select as a destination a particular floor in the building. ... International Business Machines Corporation

05/31/18 / #20180147449

Scheduling exercise equipment based on medical data

A method for scheduling and reserving in real-time the use of exercise equipment at a fitness center. One or more processors receive a user profile including data, wherein the data includes medical data, schedule preferences, and fitness goal data of a user. ... International Business Machines Corporation

05/24/18 / #20180146272

System for continuous monitoring of body sounds

A wearable monitoring system includes a microelectromechanical (mems) microphone to receive acoustic signal data through skin of a user. An integrated circuit chip is bonded to and electrically connected to the mems microphone. ... International Business Machines Corporation

05/24/18 / #20180146248

Entertainment content ratings system based on physical expressions of a spectator to scenes of the content

A method for generating a rating of entertainment content is provided. The method includes receiving data from a monitoring device associated with a spectator, the monitoring device communicatively coupled to the computing system, wherein the data obtained by the monitoring device includes a physical expression of the spectator viewing the entertainment content, analyzing the physical expression of the spectator to obtain (i) an eyesight direction of the spectator, and (ii) a facial expression of the spectator, during a scene of the entertainment content, determining an emotional reaction of the spectator to the scene of the entertainment content based on the analyzing of the physical expression of the spectator, calculating an emotional ranking of the scene of the entertainment content based on the emotional reaction of the spectator to the scene, and providing the overall ranking of the entertainment content in view of an aggregate of emotional reactions of the spectator.. ... International Business Machines Corporation

05/24/18 / #20180146246

Video composition by dynamic linking

A computer receives one or more media content source locations. The computer determines two or more media content items associated with the one or more received media content source locations. ... International Business Machines Corporation

05/24/18 / #20180146097

Dynamic conference line allocation from conference line pool

A method, system, and computer program product for managing a pool of conference lines for telephone conferences. In embodiments of the invention, the method comprises receiving a request for a telephone conference at a given time and for a specified duration; reviewing conference lines in a pool of conference lines to determine if one of the conference lines is available for the telephone conference; when one of the conference lines in the pool is available, allocating the one conference line to the requested telephone conference; issuing one or more unique pass codes for access to the allocated conference line; and distributing the one or more unique pass codes to a group of persons. ... International Business Machines Corporation

05/24/18 / #20180146096

Context-driven teleconference session management

A method for managing a teleconference session includes initiating a teleconference session with a plurality of telecommunication devices, monitoring the teleconference session to identify at least one topic discussed by one or more of a plurality of attendees of the teleconference session, and identifying a unique identification of at least one attendee. The method may further include associating the at least one topic with the unique identification, determining when a first telecommunication device associated with the attendee has disconnected from the teleconference session, determining that the topic is discussed by a second attendee of the plurality of attendees after the first telecommunication device has disconnected from the teleconference session, and establishing a connection with the first telecommunication device responsive to determining that the topic is discussed by the second attendee.. ... International Business Machines Corporation

05/24/18 / #20180146051

Autonomic discovery and integration of complementary internet services

A method can include discovering a plurality of services that are complementary to an offered service and selecting a service from the plurality of services as a candidate for integration with the offered service. The method further can include automatically generating a new service, using a processor, by integrating the candidate service with the offered service. ... International Business Machines Corporation

05/24/18 / #20180146049

Capturing configuration items from hybrid-cloud provisioning data

A method and associated systems for capturing configuration items from hybrid-cloud provisioning data. A processor of a service-management system intercepts a service request requesting that the hybrid cloud's orchestration mechanism provision or deprovision a configuration item of the hybrid cloud. ... International Business Machines Corporation

05/24/18 / #20180146037

Serializing access to data objects in a logical entity group in a network storage

Provided are a computer program product, system, and method for serializing access to data objects in a logical entity group in a network storage. Data objects associated with a logical entity at a client storage are generated. ... International Business Machines Corporation

05/24/18 / #20180146025

Arbitration of data transfer requests

A method for arbitrating data transfer requests from a plurality of nodes includes specifying one or more nodes among the plurality of nodes, the one or more nodes satisfying a predetermined condition, and selecting, if two or more nodes are specified among the plurality of nodes, one node from the two or more nodes using priority information, the priority information indicating correspondence between the plurality of nodes and a plurality of priorities each assigned to one of the plurality of nodes, the correspondence changing so that the plurality of priorities are assigned equally to each of the plurality of nodes and high and low relations appear equally between pairs of priorities each assigned to a pair of nodes of the plurality of nodes.. . ... International Business Machines Corporation

05/24/18 / #20180146019

Light-weight resolution switching for online video streaming

A method of providing high resolution video content with reduced latency, including, determining available bandwidth of a communication path, and sending delta-value video content segments to a client device if the available bandwidth is above a first threshold value.. . ... International Business Machines Corporation

05/24/18 / #20180146006

Runtime protection of web services

Protecting a runtime web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. ... International Business Machines Corporation

05/24/18 / #20180146005

Runtime protection of web services

Protecting a runtime web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. ... International Business Machines Corporation

05/24/18 / #20180145976

Network authentication of a geo-fenced volume

Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a global positioning system (gps) including a range of latitudes, a range of longitudes and a range of altitudes. ... International Business Machines Corporation

05/24/18 / #20180145966

Protection of application passwords using a secure proxy

Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. ... International Business Machines Corporation

05/24/18 / #20180145965

Protection of application passwords using a secure proxy

Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. ... International Business Machines Corporation

05/24/18 / #20180145956

Touch-share credential management on multiple devices

Embodiments include method, systems and computer program products for credential management. Aspects include obtaining a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials. ... International Business Machines Corporation

05/24/18 / #20180145954

Risk-based encryption of communication on a computer system node

A streams manager assesses the security risk of streams communication and when possible turns off encryption of intranode communication between operators of a streaming application on a computer node to increase performance of the computer node. The streams manager includes a stream security module (ssm) with a monitor that monitors risk in the system and changes encryption between operators on a node depending on the risk. ... International Business Machines Corporation

05/24/18 / #20180145939

Real life to digital life event correlation

A method and system for correlating events with social media is provided. The method includes retrieving from a social network, social network data associated with users of the social network. ... International Business Machines Corporation

05/24/18 / #20180145926

Flexible and scalable enhanced transmission selection method for network fabrics

Ieee 802.1q and enhanced transmission selection provide only eight different traffic classes that may be used to control bandwidth in a particular physical connection (or link). Instead of relying only on these eight traffic classes to manage bandwidth, the embodiments discussed herein disclose using an enhanced transmission selection scheduler that permits a network device to set the bandwidth for an individual virtual lan. ... International Business Machines Corporation

05/24/18 / #20180145921

Data packet management in a memory constrained environment

Disclosed aspects relate to data packet management in a memory-constrained environment. A data packet having a command may be received by a first device. ... International Business Machines Corporation

05/24/18 / #20180145918

Adjustment of an information unit pacing credit to increase data transmission rate

A first device determines whether an indicator is configured to allow use of an increased value for an information unit pacing credit that is greater than a default value for the information unit pacing credit, where the information unit pacing credit indicates a number of information units that a second device is allowed to send to the first device without waiting for any additional response from the first device. In response to determining that the indicator is configured to allow use of the increased value for the information unit pacing credit that is greater than the default value for the information unit pacing credit, the first device adjusts the information unit pacing credit via a response sent from the first device to the second device, to the increased value that is greater than the default value.. ... International Business Machines Corporation

05/24/18 / #20180145894

Handling path issues for storage copy services

A method for determining path health to conduct a plurality of input-output (io) operations along a healthy path in a network is provided. The present invention may include receiving an io request from a user and sending the received io request on a first path. ... International Business Machines Corporation

05/24/18 / #20180145872

Cut-through bridge error isolation

A system includes a cut-through bridge including a plurality of stages within a controller for communication packet transmission to transfer data and one or more control signals successively between the stages. The system also includes a control signal interceptor within the controller operable to intercept control signals between a first stage and a second stage of the cut-through bridge. ... International Business Machines Corporation

05/24/18 / #20180145837

Establishing a secure connection across secured environments

Disclosed aspects relate to establishing a secure communication connection between a server and a client. The server and a gateway reside within a first network realm. ... International Business Machines Corporation

05/24/18 / #20180145828

Authenticated copying of encryption keys between secure zones

The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.. ... International Business Machines Corporation

05/24/18 / #20180145791

Encoding variable length symbols to enable parallel decoding

An approach is provided in which a source system partitions multiple symbol sets into multiple fixed width data chunks. During the partitioning, the source system creates symbol boundary information corresponding to symbols in the symbol sets relative to boundaries of the fixed width data chunks. ... International Business Machines Corporation

05/24/18 / #20180145755

Secure crypto module including optical glass security layer

A method of fabricating a printed circuit board (pcb) is presented. The pcb includes a glass security layer. ... International Business Machines Corporation

05/24/18 / #20180145754

Secure crypto module including optical glass security layer

An optical electromagnetic radiation (em) emitter and receiver are located upon a printed circuit board (pcb) glass security layer. A predetermined reference flux or interference pattern, respectively, is an expected flux or reflection pattern of em emitted from the em emitter, transmitted by the glass security layer, and received by the em receiver. ... International Business Machines Corporation

05/24/18 / #20180145270

Fringing field assisted dielectrophoresis assembly of carbon nanotubes

A method of arranging at least one carbon nanotube on a semiconductor substrate includes depositing the at least one carbon nanotube on a dielectric layer of the semiconductor device. The method further includes arranging the at least one carbon nanotube on the dielectric layer in response to applying a voltage potential to an electrically conductive electrode of the semiconductor device, and applying a ground potential to an electrically conductive semiconductor layer of the semiconductor device.. ... International Business Machines Corporation

05/24/18 / #20180145202

Type iv semiconductor based high voltage laterally stacked multijunction photovoltaic cell

A method of forming a photovoltaic device that includes ion implanting a first conductivity type dopant into first regions of a semiconductor layer of an soi substrate, wherein the first regions are separated by a first pitch; and ion implanting a second conductivity type dopant into second regions of the semiconductor layer of the soi substrate. The second regions are separated by a second pitch. ... International Business Machines Corporation

05/24/18 / #20180145178

Strained finfet source drain isolation

A semiconductor structure, such as a strained finfets, includes a strain relief buffer (srb) layer isolated and separated from a source and a drain by a spacer that may be simultaneously formed with a gate spacer upon the sidewalls of a gate structure. The spacer limits the source and drain from contacting the srb layer thereby limiting source drain junction leakage. ... International Business Machines Corporation

05/24/18 / #20180145155

Iii-v fin generation by lateral growth on silicon sidewall

A method comprises providing a structure defined by a silicon material on a buried oxide layer of a substrate; causing a nucleation of a iii-v material in a sidewall of the structure defined by the silicon material; adjusting a growth condition to facilitate a first growth rate of the iii-v material in directions along a surface of the sidewall and a second growth rate of the iii-v material in a direction laterally from the surface of the sidewall, wherein the second growth rate is less than the first growth rate; and processing the silicon material and the iii-v material to form a fin.. . ... International Business Machines Corporation

05/24/18 / #20180145154

Iii-v fin generation by lateral growth on silicon sidewall

A method comprises providing a structure defined by a silicon material on a buried oxide layer of a substrate; causing a nucleation of a iii-v material in a sidewall of the structure defined by the silicon material; adjusting a growth condition to facilitate a first growth rate of the iii-v material in directions along a surface of the sidewall and a second growth rate of the iii-v material in a direction laterally from the surface of the sidewall, wherein the second growth rate is less than the first growth rate; and processing the silicon material and the iii-v material to form a fin.. . ... International Business Machines Corporation

05/24/18 / #20180145150

High-k layer chamfering to prevent oxygen ingress in replacement metal gate (rmg) process

A semiconductor structure includes a semiconductor substrate having an outer surface; a plurality of oxide regions, located outward of the outer surface, and defining a plurality of metal-gate-stack-receiving cavities; and a liner interspersed between the plurality of oxide regions and the semiconductor substrate and between the plurality of oxide regions and the plurality of metal-gate-stack-receiving cavities. A layer of high-k material is deposited over the semiconductor structure, including on outer surfaces of the plurality of oxide regions, outer edges of the liner, on walls of the plurality of metal-gate-stack-receiving cavities, and on the outer surface of the semiconductor substrate within the plurality of metal-gate-stack-receiving cavities. ... International Business Machines Corporation

05/24/18 / #20180145141

Spatially decoupled floating gate semiconductor device

A method includes forming a tunneling dielectric layer on a semiconductor substrate, a first portion of the tunneling dielectric layer is directly above a channel region in the semiconductor substrate and a second portion of the tunneling dielectric layer is directly above source-drain regions located on opposing sides of the channel region, the second portion of the tunneling dielectric layer is thicker than the first portion of the tunneling dielectric layer, forming a floating gate directly above the first portion of the tunneling dielectric layer and the second portion of the tunneling dielectric layer, and forming a control dielectric layer directly above the floating gate.. . ... International Business Machines Corporation

05/24/18 / #20180145109

Three-dimensional integrated multispectral imaging sensor

A three-dimensional multispectral imaging sensor and method for forming a three-dimensional multispectral imaging sensor are provided. The three-dimensional multispectral imaging sensor includes a monolithic structure having a plurality of layers. ... International Business Machines Corporation

05/24/18 / #20180145092

Gate top spacer for finfet

The capacitance between gate structures and source/drain contacts of finfet devices is reduced by the incorporation of inner spacers in the top portions of the gate structures. A replacement metal gate process used in the fabrication of such devices includes formation of the inner spacers following partial removal of dummy gate material. ... International Business Machines Corporation

05/24/18 / #20180145024

Integrated shielding and decoupling capacitor structure

A shielding and decoupling capacitor structure can be fabricated within an integrated circuit (ic) by forming recesses in a top surface of a dielectric layer and forming a trench in a top surface of an intra-metal dielectric portion of a metal layer deposited on the top surface of the dielectric layer. A bottom of the trench exposes the recesses. ... International Business Machines Corporation

05/24/18 / #20180144926

Advanced interconnect with air gap

Ultra-low-k dielectric materials used as inter-layer dielectrics in high-performance integrated circuits are prone to be structurally unstable. The young's modulus of such materials is decreased, resulting in porosity, poor film strength, cracking, and voids. ... International Business Machines Corporation

05/24/18 / #20180144771

Moving cartridges within a shuttle complex

The present description is directed to moving a cartridge including a storage medium within a shuttle complex that includes numerous shuttle connections, and a plurality of library strings connected by at least one shuttle connection. Each shuttle connection has a car able to move within the shuttle connection and each library string has at least one cartridge including a storage medium. ... International Business Machines Corporation

05/24/18 / #20180144726

Method and system for compromise tuning of musical instruments

The disclosure provides an approach for tuning musical instruments. In one embodiment, a tuning application determines frequencies of a series of notes played on a brass instrument, either with open tuning or with a valve pressed. ... International Business Machines Corporation

05/24/18 / #20180144630

Vehicle location discrepancy detection and mitigation

A mechanism is provided for detecting and mitigating vehicle location discrepancies. A set of dynamic boundaries are generated around a prescribed pickup location agreed upon with a next renter of a vehicle for a prescribed pickup time. ... International Business Machines Corporation

05/24/18 / #20180144561

System, method and computer program product for detecting switch status of vehicle window(s)

A method, system, and computer program product, include obtaining window status decision information based on vehicle interior background noise and determining switch status of the vehicle window(s) based on the obtained window status decision information.. . ... International Business Machines Corporation

05/24/18 / #20180144548

Virtual trial of products and appearance guidance in display device

A method, computer program product, and a display device for enabling a user to virtually interact with an object includes a processor in the display device utilizing an image capture in the display device, to identify a subject in a three dimensional space proximate to the display device. The processor virtualizes the subject to generate a computer model of the subject and generating mappings between the computer model of the subject and the passive reflection of the subject. ... International Business Machines Corporation

05/24/18 / #20180144529

Rebuilding images based on historical image data

A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. ... International Business Machines Corporation

05/24/18 / #20180144528

Rebuilding images based on historical image data

A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. ... International Business Machines Corporation

05/24/18 / #20180144471

Ovarian image processing for diagnosis of a subject

Embodiments relate to digital image processing for diagnosis of a subject. More specifically, the embodiments relate to automation of diagnoses through data interpretation. ... International Business Machines Corporation

05/24/18 / #20180144470

Digital data processing for diagnosis of a subject

Embodiments relate to digital image processing for diagnosis of a subject. More specifically, the embodiments relate to automation of diagnoses through data interpretation. ... International Business Machines Corporation

05/24/18 / #20180144463

Slice selection for interpolation-based 3d manual segmentation

Slice selection for interpolation-based 3d manual segmentation is provided such that propagation error is minimized during 3d reconstruction. In various embodiments, a plurality of 2d images is read. ... International Business Machines Corporation

05/24/18 / #20180144340

Triggering actions responsive to blockchain transactions

A blockchain may store transactions for various purposes which may be later accessed by interested parties for ledger verification. One example method of operation may comprise one or more of receiving a blockchain transaction, identifying a proof-of-work is generated for the blockchain transaction via a network entity, transmitting the proof-of-work and a select portion of ledger data to a registered third party via an encrypted message based on a third party key, validating the proof-of-work via the third party, and providing a reward to the network entity.. ... International Business Machines Corporation

05/24/18 / #20180144302

System and method of securely sending and receiving packages via drones

An autonomous vehicle comprising a transport body configured to travel to an identified location, a package retention device for securing one or more packages to the transport body; one or more processors integral to the transport body, wherein the processors are configured by code executing therein to: access shipper and recipient profile data; wherein the shipper and recipient profile data includes location data for shipper and recipient; navigate the autonomous vehicle to a shipping destination and a delivery destination; provide access to the package retention device upon authentication of a shipper presenting a package at a shipping destination, and provide access to the package retention device upon authentication of a recipient retrieving a package at the delivery destination.. . ... International Business Machines Corporation

05/24/18 / #20180144281

System and method to measure optimal productivity of a person engaged in a task

A method and system analyzes the productivity of a person engaged in a task. A computing device receives configuration data from sensors including environmental parameters related to a corresponding productivity score of the person engaged in the task. ... International Business Machines Corporation

05/24/18 / #20180144280

System and method for analyzing the focus of a person engaged in a task

A method and system analyzes the focus of a person engaged in a task. A computing device receives configuration data from sensors including focus parameters and environmental parameters related to a corresponding attention score of the person engaged in the task. ... International Business Machines Corporation

05/24/18 / #20180144266

Learning apparatus and method for learning a model corresponding to real number time-series input data

An apparatus, a computer readable medium, and a learning method for learning a model corresponding to time-series input data, including acquiring the time-series input data, which is a time series of input data including a plurality of input values, propagating, to a plurality of nodes in a model, each of a plurality of propagation values obtained by weighting each input value at a plurality of time points before one time point according to passage of time points, in association with the plurality of input values at the one time point, calculating a node value of a first node among the plurality of nodes by using each propagated value propagated to the first node, and updating a weight parameter used to calculate each propagation value propagated to the first node, by using a corresponding input value and a calculated error of the node value at the one time point.. . ... International Business Machines Corporation

05/24/18 / #20180144260

High-risk road location prediction

Embodiments of the invention provide a method, system and computer program product for high risk road location prediction. In an embodiment of the invention, a method for high risk road location prediction includes characterizing different portions of different roadways and computing a risk probability for each of the different portions based upon observed accident rates occurring at the different portions. ... International Business Machines Corporation

05/24/18 / #20180144235

Cognitive online meeting assistant facility

A cognitive meeting assistant facility is provided for assisting a moderator in an online meeting. The cognitive meeting assistant facility automatically categorizes chat questions of participants of the online meeting based on content into multiple categories of chat questions. ... International Business Machines Corporation

05/24/18 / #20180144151

Controlling privacy in a face recognition application

Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. ... International Business Machines Corporation

05/24/18 / #20180144127

Applying machine learning techniques to discover security impacts of application programming interfaces

A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (sast). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. ... International Business Machines Corporation

05/24/18 / #20180144120

System and method for the display of restricted information on private displays

The present invention is directed to a system and method for restricting data, or portions thereof, to specific display devices when accessed by a user. Furthermore, the system and method of the invention are directed, in part, to evaluating in real time, the access level of a device and restricting the availability of sensitive information on the device according to the access level as determined by device location and hardware configuration.. ... International Business Machines Corporation

05/24/18 / #20180144110

Multi-input user interaction and behavioral based authentication system for context aware applications

A mobile device which can identify a change in possession of the device and based on a change in possession of the device implement different types of security protocols to follow based on a scoring system regarding threat of the user to the data on the mobile device.. . ... International Business Machines Corporation

05/24/18 / #20180144100

Triggered sensor data capture in a mobile device environment

Triggered sensor data capture in a mobile device environment. A method monitors primary sensor data obtained from first wearable sensor device(s) to determine whether trigger condition(s) are met for triggering supplemental sensor data capture. ... International Business Machines Corporation

05/24/18 / #20180144095

Resolving conflicting data among data objects associated with a common entity

Resolving conflicting data among data objects associated with a common entity includes assigning an ordered sequence of data analysis processes to a corresponding data field of a plurality of data objects associated with a common entity. At least two of the data objects include different values for the corresponding data field, and each data analysis process performs a different technique to resolve conflicts between different values of data. ... International Business Machines Corporation

05/24/18 / #20180144090

Ranking combinations of mutants, test cases and random seeds in mutation testing

A method and apparatus for ranking combinations of mutants, test cases and random seeds in mutation testing, comprising obtaining, based on a signal of a test case target, logic gates related to the signal of the test case target and mutants on the related logic gates, for a compiled integrated circuit under test; calculating distances between the mutants and the signal of the test case target; performing a circuit simulation on the compiled integrated circuit under test to obtain activation cycle numbers corresponding to combinations of the mutants, test cases and random seeds; obtaining activation cycle number variances corresponding to combinations of the mutants and the test cases; and ranking the combinations of the mutants, the test cases and the random seeds based on the distances, the activation cycle numbers and the activation cycle number variances. The invention can reduce the probability that the mutation simulation selects equivalent mutants.. ... International Business Machines Corporation

05/24/18 / #20180144089

Triple and quad coloring of shape layouts

Techniques related to triple and quad coloring of shape layouts are provided. A computer-implemented method comprises coloring, by a system operatively coupled to a processor, a shape layout with a plurality of colors in accordance with a defined design rule based on a determination that a first defined shape within the shape layout satisfies a layout specification and a second defined shape within the shape layout satisfies a defined rule.. ... International Business Machines Corporation

05/24/18 / #20180144088

Triple and quad coloring of shape layouts

Techniques related to triple and quad coloring of shape layouts are provided. A computer-implemented method comprises coloring, by a system operatively coupled to a processor, a shape layout with a plurality of colors in accordance with a defined design rule based on a determination that a first defined shape within the shape layout satisfies a layout specification and a second defined shape within the shape layout satisfies a defined rule.. ... International Business Machines Corporation

05/24/18 / #20180144085

System design based on unified chip specification

Disclosed aspects relate to facilitating system design based on unified chip specification. It can be determined based on the system design that a first interface of a first chip is to be connected to a second interface of a second chip. ... International Business Machines Corporation

05/24/18 / #20180144066

Providing answers to questions including assembling answers from multiple document segments

A method, system and computer program product for generating answers to questions. In one embodiment, the method comprises receiving an input query, identifying a plurality of candidate answers to the query; and for at least one of these candidate answers, identifying at least one proof of the answer. ... International Business Machines Corporation

05/24/18 / #20180144047

System and method for generating improved search queries from natural language questions

Embodiments can provide a computer implemented method, in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor to cause the processor to implement an improved search query generation system, the method comprising inputting a natural language question; parsing the natural language question into a parse tree; identifying argument positions comprising one or more argument position terms; for each argument position: comparing a head term's discriminator score against a threshold discriminator score; and if the head term surpasses the threshold discriminator score, adding the head term as a required term to an improved search query; and outputting the improved search query.. . ... International Business Machines Corporation

05/24/18 / #20180144041

Transaction discovery in a log sequence

Techniques that facilitate identification and/or analysis of sequences associated with computing devices are provided. In one example, a system includes a transaction component, a clustering component and a model component. ... International Business Machines Corporation