Customizable audio and video formats for digital content consumption
A method for customizing a purchase of a digital content is provided. The method includes receiving a request from a user device to purchase the digital content retrievable by the computing system, the digital content being encoded such that the purchase of the digital content is customizable based on an audio quality and a video quality of the digital content, presenting a plurality of selectable audio formats and video formats associated with the digital content, wherein the audio quality and the video quality of the digital content is affected by a user selection of the plurality of audio formats and video formats, providing a downloadable package comprising the customized digital content with the user selected audio formats and video formats to the user device for consuming the customized digital content, and processing a payment for the customized digital content delivered to the user device.. ... International Business Machines Corporation
A channel programming associated with a channel can be selected. The channel can be associated with a programming broadcasting system. ... International Business Machines Corporation
User tracking based communication
A computer system may be used to project a communication to a user. The system may analyze camera data to detect the facial direction and location of a user. ... International Business Machines Corporation
Managing sensitive information transfer between parties in a telephone conversation
A communication device associated with a first party monitors a call between the first party and a second party. The communication device identifies a request for sensitive information from the second party during the call. ... International Business Machines Corporation
System and method for dynamic cloud formations for stream computing
A method, computer program product, and computer system for identifying, in a dynamically formed cloud, a plurality of voluntary compute nodes, wherein the plurality of voluntary compute nodes may include personal computing devices of a plurality of users, and wherein at least a portion of the plurality of voluntary compute nodes may be configured to communicate with each other to receive and send streaming data. A first compute node of at least the portion of the plurality of voluntary compute nodes may be identified to receive and distribute a streams operator of a streams graph requested by a client computing device. ... International Business Machines Corporation
Cyber security event detection
A system for detecting cyber security events can include a processor to generate a first set of a plurality of time series and aggregate statistics based on a plurality of properties corresponding to user actions for each user in a set of users. The processor can also separate the set of users into a plurality of clusters based on the first set of the plurality of time series or aggregate statistics for each user and assign an identifier to each of the plurality of clusters. ... International Business Machines Corporation
Unauthorized data access detection based on cyber security images
In some examples, a system for detecting unauthorized data access can include a processor to detect a suspicious operation to be executed by the system and review a plurality of highlights corresponding to the suspicious operation. The processor can also determine that a predefined cyber security image corresponding to the highlights and the suspicious operation does not exist and generate the predefined cyber security image based on a plurality of sub-cyber security images. ... International Business Machines Corporation
Access control of administrative operations within an application
A technique to implement access control from within an application begins by dynamically-generating a “management scope” for a transaction associated with a set of managed resources. The management scope is a collection of permissions defined by at least one of: a set of roles, and a set of resource administration rights, that are assigned to a first operator that issues the transaction. ... International Business Machines Corporation
Privacy controls for sensitive discussions
Privacy controls may be implemented using a configurable system of risk categorization for resources, physical security, sensitivity of discussion topics, prioritization of content, and identification of intended participants, by receiving participant profiles including biometric data from a plurality of participants and meeting criteria including an attendance requirement from an initiator of a meeting, scheduling a meeting based on the participant profiles and meeting criteria, generating biometric data by a biometric sensor located at meeting spaces for any participants that attend the meeting, comparing the generated biometric data to the biometric data of the participant profiles of participants identified by the attendance requirement, determining whether the generated biometric data matches the biometric data of the participant profiles of the participants identified by the attendance requirement, and transmitting a message to a computing device of the initiator indicating an outcome of the determination and ensuring enforcement of privacy controls.. . ... International Business Machines Corporation
Digital media content distribution blocking
A method and system for improving a digital media content transfer blocking process is provided. The method includes detecting a request for access to digital media content from a digital media provider system. ... International Business Machines Corporation
Aspects provide message queue management as a function of processing time estimation, wherein a processor stores a message directed to a user from a messaging server in a distraction queue, and predicts a processing time required by the user to process the received message as a function of sender identity or of an identified message topic or type. The processor increments a processing time counter value for the distraction queue with the predicted processing time of the message, and notifies the user of the received message and all other messages currently saved to the distraction queue in response to determining that the incremented processing time counter value meets a threshold value.. ... International Business Machines Corporation
Photo stimulus based on projected gaps/interest
A method, system, and computer product for expanding diversity of images uploaded to a network site includes identifying a location of a user device, analyzing social media data corresponding to an area within a threshold distance of the location of the user device, identifying at least one location of interest (loi) of the area based on an analyzed result of the social media data, determining whether there are one or more image gaps corresponding to the at least one loi based on the analyzed result of the social media data, and suggesting the user device to take one or more images of the at least one loi, responsive to a determining that there are the one or more image gaps exist for the at least one loi.. . ... International Business Machines Corporation
A method and system for processing a text message to be sent by electronic mail to a receiving address. A text message addressed to the receiving address is generated. ... International Business Machines Corporation
Enabling a traditional language platform to participate in a java enterprise computing environment
A method, system and computer program is provided for enabling varying computer applications that are running in enterprise information system to send request to a cluster of java enterprise server (j2ee server) cluster. One or more computers provide an application server environment including one or more servers operating within the application server environment to run an application. ... International Business Machines Corporation
A computer-implemented method may include identifying a sending computer system and a receiving computer system. The method may also include receiving a request from the sending computer system for a receptiveness value of the receiving computer system, where the receptiveness value indicates openness of the receiving computer system to interruption. ... International Business Machines Corporation
A computer-implemented method may include identifying a sending computer system and a receiving computer system. The method may also include receiving a request from the sending computer system for a receptiveness value of the receiving computer system, where the receptiveness value indicates openness of the receiving computer system to interruption. ... International Business Machines Corporation
A client device (e.g., smart phone) submits scroll log data to a server. The scroll log data comprises time stamps of load start events, load end events and lag events. ... International Business Machines Corporation
A computer-implemented method, according to one embodiment, includes: transferring data over a network using a first mode; randomly, periodically and/or continuously determining network performance characteristics during the transferring, and applying a policy to the network performance characteristics determined during the transferring. The first mode of data transfer is continued to be used in response to a result of applying the policy mandating continued use of the first mode. ... International Business Machines Corporation
A method and system. A health and compliance check report for a network including two or more devices is received. ... International Business Machines Corporation
A user-device configured server code trace request that specifies an element identifier of a specified user-device interface element served by a server device and a server code tracing depth specified by a user of a user device is received at the server device from the user device served by the server device. Using the specified element identifier, a granular server code trace of server code scoped to the specified server code tracing depth and scoped to a portion of the server code utilized in association with the specified user-device interface element is performed.. ... International Business Machines Corporation
A generic connector module of an integration-platform system reconciles the system's application-independent canonical api with each application-specific api used by an endpoint application. The system generates a software library of application-specific configuration files each capable of enabling the connector to translate commands between one application-specific api format and the canonical-api format. ... International Business Machines Corporation
A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines Corporation
Audio information of audio content being listened to by a user is received. An aspect of a listening environment of the user is identified. ... International Business Machines Corporation
A battery controller and method for controlling a battery include generating a battery capacity prediction model that characterizes a battery capacity decay rate. Future battery capacity for a battery under control is predicted based on the battery capacity prediction model and a present value of the battery capacity. ... International Business Machines Corporation
A laterally grown edge emitting laser is provided. A semiconductor structure is disposed on a substrate. ... International Business Machines Corporation
A josephson parametric converter is provided. The josephson parametric converter includes a multi-josephson junction ring modulator having arrays of josephson junctions arranged in a ring configuration with nodes inter-dispersed between the arrays. ... International Business Machines Corporation
Methods and systems for reducing dark current in a photodiode include heating a photodiode and applying an increasing reverse bias voltage to the heated photodiode to reduce a dark current generated by the photodiode.. . ... International Business Machines Corporation
An electrical device that includes a material stack present on a supporting substrate. An led is present in a first end of the material stack having a first set of bandgap materials. ... International Business Machines Corporation
An electrical device that includes a material stack present on a supporting substrate. An led is present in a first end of the material stack having a first set of bandgap materials. ... International Business Machines Corporation
An electrical device that includes a material stack present on a supporting substrate. An led is present in a first end of the material stack having a first set of bandgap materials. ... International Business Machines Corporation
An electrical device that includes a material stack present on a supporting substrate. An led is present in a first end of the material stack having a first set of bandgap materials. ... International Business Machines Corporation
A method of fabricating a symmetric element of a resistive processing unit (rpu) includes forming a substrate with a channel region connecting two doped regions, and forming a source above one of the two doped regions and a drain above the other of the two doped regions. A gate is formed above the channel region, and a bar ferroelectric is disposed above the channel region and below the gate.. ... International Business Machines Corporation
A transistor includes a vertical channel fin on a bottom source/drain region. The vertical channel fin includes a base portion and an upper portion. ... International Business Machines Corporation
Provided is a method for forming a semiconductor structure. In embodiments of the invention, the method includes forming a semiconductor fin on a source/drain region, forming a liner including a first dielectric material along sidewalls of the semiconductor fin and along sidewalls of the source/drain region, forming a second dielectric material along sidewalls of the liner including the first dielectric material, and removing the liner including the first dielectric material from sidewalls of the semiconductor fin. ... International Business Machines Corporation
Provided is a method for forming a semiconductor structure. In embodiments of the invention, the method includes forming a semiconductor fin on a source/drain region, forming a liner including a first dielectric material along sidewalls of the semiconductor fin and along sidewalls of the source/drain region, forming a second dielectric material along sidewalls of the liner including the first dielectric material, and removing the liner including the first dielectric material from sidewalls of the semiconductor fin. ... International Business Machines Corporation
Semiconductor devices include a thin channel region formed on a buried insulator. A source and drain region is formed on the buried insulator, separated from the channel region by notches. ... International Business Machines Corporation
A semiconductor device includes a single electron transistor (set) having an island region, a bottom source/drain region under the island region, and a top source/drain region over the island region, a first gap between the bottom source/drain region and the island region, a second gap between the top source/drain region and the island region, and a gate structure on a side of the island region.. . ... International Business Machines Corporation
A first layer of a first material is deposited on a first structure and a second structure, a surface of the first structure being disposed substantially parallelly to a surface of the second structure in at least one direction. A selectively removable material is deposited over the first layer and removed up to a height of a first step. ... International Business Machines Corporation
Embodiments are directed to a method of forming a stacked nanosheet and resulting structures having uniform low-k inner spacers. A nanosheet stack is formed opposite a major surface of a substrate. ... International Business Machines Corporation
Methods of forming integrated chips include forming a respective stack of sheets in two regions, each stack having first layers and second layers. The second layers are etched away in the first region. ... International Business Machines Corporation
Integrated chips and methods of forming the same include forming a respective stack of sheets in two regions, each stack having first layers and second layers. The second layers are etched away in the first region. ... International Business Machines Corporation
Nanosheet semiconductor devices and methods of forming the same include forming a first stack having layers of a first material and layers of a second material. A second stack is formed having layers of a third material, layers of the second material, and a liner formed around the layers of the third material. ... International Business Machines Corporation
A method for forming a metal-insulator-metal (mim) capacitor on a semiconductor substrate is presented. The method includes forming a first electrode defining columnar grains, forming a dielectric layer over the first electrode, and forming a second electrode over the dielectric layer. ... International Business Machines Corporation
A method for forming a metal-insulator-metal (mim) capacitor on a semiconductor substrate is presented. The method includes forming a first electrode defining columnar grains, forming a dielectric layer over the first electrode, and forming a second electrode over the dielectric layer. ... International Business Machines Corporation
A metal-insulator-metal capacitor (mim cap) includes a dielectric layer disposed over a substrate three contacts. A stacked structure of first and second metal layers separated by high-k dielectrics is disposed over the substrate and contacts. ... International Business Machines Corporation
A technique relates to fabricating a pfet device and nfet device. A contact trench is formed through an inter-level dielectric layer (ild) and a spacer layer. ... International Business Machines Corporation
A method of fabricating a semiconductor structure having multiple defined threshold voltages includes: forming multiple field-effect transistor (fet) devices in the semiconductor structure, each of the fet devices including a channel and a gate stack formed of one of at least two different work function metals, the gate stack being formed proximate the channel; and varying a bang-gap of the channel in each of at least a subset of the fet devices by controlling a percentage of one or more compositions of a material forming the channel; wherein a threshold voltage of each of the fet devices is configured as a function of a type of work function metal forming the gate stack and the percentage of one or more compositions of the material forming the channel.. . ... International Business Machines Corporation
A process of forming a thermal interface material structure includes selectively masking a putty pad that includes ultraviolet (uv) curable cross-linkers to form a masked putty pad. The masked putty pad has a first area that is exposed and a second area that is masked. ... International Business Machines Corporation
Methods for depositing material on a chip include forming a mold layer. The mold layer includes one or more openings over respective contact areas, each of the one or more openings having an upper volume and a lower volume. ... International Business Machines Corporation
A technique relates to fabricating a semiconductor device. A contact trench is formed in an inter-level dielectric layer. ... International Business Machines Corporation
Methods are provided for fabricating metallic interconnect structures having reduced electrical resistivity that is obtained by applying mechanical strain to the metallic interconnect structures, as well as semiconductor structures having metallic interconnect structures formed with permanent mechanical strain to provide reduced electrical resistivity. For example, a method includes forming a metallic interconnect structure in an interlevel dielectric (ild) layer of a back-end-of-line (beol) structure of a semiconductor structure, and forming a stress layer in contact with the metallic interconnect structure. ... International Business Machines Corporation
A vertical fuse element, including, a conductive silicide base on a surface of a substrate, and a conductive silicide pillar extending in a direction perpendicular to the surface of the substrate, where the conductive silicide pillar is on the conductive silicide base, and wherein the conductive silicide pillar includes an upper portion having a width, w5, a base having a width, w6, and a neck region having a width, w7, where w7<w5, and w7≤w6.. . ... International Business Machines Corporation
An nfet vertical transistor is provided in which a p-doped top source/drain structure is formed in contact with an n-doped semiconductor region that is present on a topmost surface of a vertical nfet channel. The p-doped top source/drain structure is formed utilizing a low temperature (550° c. ... International Business Machines Corporation
An nfet vertical transistor is provided in which a p-doped top source/drain structure is formed in contact with an n-doped semiconductor region that is present on a topmost surface of a vertical nfet channel. The p-doped top source/drain structure is formed utilizing a low temperature (550° c. ... International Business Machines Corporation
The method includes prior to depositing a gate on a first vertical fet on a semiconductor substrate, depositing a first layer on the first vertical fet on the semiconductor substrate. The method further includes prior to depositing a gate on a second vertical fet on the semiconductor substrate, depositing a second layer on the second vertical fet on the semiconductor substrate. ... International Business Machines Corporation
Vertical field effect transistors (fets) with minimum pitch and methods of manufacture are disclosed. The structure includes at least one vertical fin structure and gate material contacting with the at least one vertical fin structure. ... International Business Machines Corporation
A semiconductor structure containing a plurality of stacked vertical field effect transistor (fets) is provided. After forming a first vertical fet of a first conductivity type at a lower portion of a semiconductor fin, a second vertical fet of a second conductivity type is formed on top of the first vertical fet. ... International Business Machines Corporation
A method for forming conductive structures for a semiconductor device includes depositing a reflow liner on walls of trenches formed in a dielectric layer and depositing a reflow material on the reflow liner. The reflow material is reflowed to collect in a lower portion of the trenches. ... International Business Machines Corporation
A method for forming conductive structures for a semiconductor device includes depositing a reflow liner on walls of trenches formed in a dielectric layer and depositing a reflow material on the reflow liner. The reflow material is reflowed to collect in a lower portion of the trenches. ... International Business Machines Corporation
A metal-oxide-semiconductor field-effect transistor (mosfet) with integrated passive structures and methods of manufacturing the same is disclosed. The method includes forming a stacked structure in an active region and at least one shallow trench isolation (sti) structure adjacent to the stacked structure. ... International Business Machines Corporation
An integrated circuit (ic) chip module includes a carrier, a stiffening frame, an ic chip, and a first directional heat spreader. A second directional heat spreader may further be arranged orthogonal to the first directional heat spreader. ... International Business Machines Corporation
A method for reworking a semiconductor device includes, in a pattern stack formed on an interlevel dielectric (ild) layer, polishing the pattern stack to remove a top hardmask layer of the pattern stack. Each hardmask layer of the pattern stack is selectively wet etched to remaining layers of the pattern stack and the ild layer. ... International Business Machines Corporation
A method for reducing crystalline defects in a semiconductor structure is presented. The method includes epitaxially growing a first crystalline material over a crystalline substrate, epitaxially growing a second crystalline material over the first crystalline material, and patterning and removing portions of the second crystalline material to form openings. ... International Business Machines Corporation
A method for reducing crystalline defects in a semiconductor structure is presented. The method includes epitaxially growing a first crystalline material over a crystalline substrate, epitaxially growing a second crystalline material over the first crystalline material, and patterning and removing portions of the second crystalline material to form openings. ... International Business Machines Corporation
Structures and methods for a multi-bit phase change memory are disclosed herein. A method includes establishing a write-reference voltage that incrementally ramps over a write period. ... International Business Machines Corporation
Structures and methods for a multi-bit phase change memory are disclosed herein. A method includes establishing a write-reference voltage that incrementally ramps over a write period. ... International Business Machines Corporation
Embodiments of the invention are directed to a magnetic tunnel junction (mtj) storage element having a reference layer formed from a reference layer material having a fixed magnetization direction, along with a free layer formed from a free layer material having a switchable magnetization direction. The mtj is configured to receive a write pulse having a write-pulse and spin-transfer-torque (wp-stt) start time, a wp-stt start segment duration and a write pulse duration. ... International Business Machines Corporation
Segmenting serial data by processing multiple candidate segmentation point sets associated with a serial data set, each candidate set including a different number of candidate segmentation points representing the serial data set as segments in accordance with segmentation criteria, where the processing includes determining, for each of the candidate points, a count of the candidate sets that include the candidate point, and creating, for each of the candidate sets, a corresponding alternative segmentation point set associated with the serial data set, where the alternative set includes n alternative segmentation points representing the serial data set as n+1 segments, where n equals the number of candidate points in the candidate set to which the alternative set corresponds, and where the n alternative points in the alternative set correspond to n of the candidate points having the greatest counts, and arranging the alternative sets in order of their numbers of segmentation points.. . ... International Business Machines Corporation
A drive-implemented method according to one embodiment includes determining that unthreading of a tape is to be performed, and in response to the determination that the unthreading of the tape is to be performed, determining whether to write an index on the tape prior to unthreading the tape. In response to a determination to write the index on the tape, the index is written on the tape prior to unthreading the tape. ... International Business Machines Corporation
A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a processing circuit to cause the processing circuit to perform a method that includes reading data from a magnetic data storage medium. The processing circuit uses a tracking threshold module to detect and track positive peak amplitudes and negative peak amplitudes of a readback waveform during the data reading. ... International Business Machines Corporation
An apparatus according to one embodiment includes a module having a tape bearing surface, an array of magnetic transducers, and a channel in the tape bearing surface. The channel has a longitudinal axis oriented about parallel to a longitudinal axis of the array of magnetic transducers for inducing tenting of a moving magnetic recording tape above the array of magnetic transducers. ... International Business Machines Corporation
An apparatus, according to one embodiment, includes: a module; and a plurality of tunnel valve read transducers arranged in an array extending along the module. Each of the tunnel valve read transducers includes: a sensor structure having a tunnel barrier layer and a free layer. ... International Business Machines Corporation
In one embodiment, an apparatus includes a transducer structure. The transducer structure has a lower shield and an upper shield above the lower shield, the upper and lower shields providing magnetic shielding. ... International Business Machines Corporation
A computer-implemented method is provided. The computer-implemented method is performed by a speech recognition system having at least a processor. ... International Business Machines Corporation
A computer-implemented method includes determining, by a first device, a current emotional state of a user of the first device. The current emotional state is based, at least in part, on real-time information corresponding to the user and relates to a textual message from the user. ... International Business Machines Corporation
A computer-implemented method includes determining, by a first device, a current emotional state of a user of the first device. The current emotional state is based, at least in part, on real-time information corresponding to the user and relates to a textual message from the user. ... International Business Machines Corporation
Data may be handled based on compressibility (i.e., whether the data may be further compressed or is not further compressible). A supervised learning model may be trained using a set of known further compressible data and a set of known non-compressible data. ... International Business Machines Corporation
Embodiments for managing drones by one or more processors are described. A first aerial drone having a payload coupled thereto is controlled such that the first aerial drone travels from a first location to a second location. ... International Business Machines Corporation
In an approach to three dimensional component visualization, one or more computer processors receive a request associated with one or more reference tags received from one or more requesting devices. The one or more computer processors identify component data associated with one or more requested reference tags. ... International Business Machines Corporation
Augmented reality glasses include: a wearable frame; a lens attached to the wearable frame; a positioning device for determining a physical location and a field of view of a low-vision user of the augmented reality glasses; a receiver for receiving an input from the low-vision user of the augmented reality glasses, where the input describes a level of vision of the low-vision user; and a display coupled to the wearable frame magnifies images on the display according to the physical location, the field of view, and the level of vision of the low-vision user.. . ... International Business Machines Corporation
In many medical image classification problems, distinctive image features are often localized in certain anatomical regions. The key to efficient and accurate classification in such problems is the localization of the region of interest (roi). ... International Business Machines Corporation
One embodiment provides a method comprising receiving image data with a first image resolution, and determining an optimal image resolution for sampling the image data based on a learned model. The optimal image resolution is lower than the first image resolution. ... International Business Machines Corporation
A system and method implemented in a computer infrastructure having computer executable code, includes receiving one or more bids for at least one of an enhanced rendering quality and an enhanced rendering order of an object in a virtual universe (vu) and performing a bid resolution for the received one or more bids. Additionally, the method includes rendering one or more objects in the vu with the at least one of the enhanced rendering quality and the enhanced rendering order based on the bid resolution.. ... International Business Machines Corporation
A processor-implemented method, system, and/or computer program product sorts and displays product reviews of ecommerce products. One or more processor(s) receive product reviews for different types of ecommerce products from product reviewers. ... International Business Machines Corporation
A real-time advertisement placement method, system, and computer program product include determining focus portions for one or more advertisements, each focus portion comprising a portion of an advertisement, determining a working portion of a display area comprising a region of the display area with which a user is interacting, and displaying one or more of the focus portions for the one or more advertisements in a region of the display area outside of the working portion of the display area without redirecting user interactions to the one or more advertisements.. . ... International Business Machines Corporation
Methods and apparatus are provided to determine entities and attributes dependencies for creating recommendations of items or entities using a highly scalable architecture. For example, a user may be recommended an item if a probability model of the method determines that the user relates to the item although the user has no contact to the item before the method is performed. ... International Business Machines Corporation
The present invention is directed to a system and method for providing paid sponsorships that are configured to relocate an avatar within the virtual environment. The system is configured to ascertain one or more advertisements for display based on at least one of: an inventory analysis of an avatar, a historical teleportation analysis of the avatar, a motion analysis of the avatar, a social network analysis of the avatar, and a ratings analysis of the one or more advertisements within a virtual universe. ... International Business Machines Corporation
Aspects include obtaining a pattern that describes an event in a natural language format. The pattern that describes the event is converted into at least one identified pattern key value pair. ... International Business Machines Corporation
Aspects include obtaining a pattern that describes an event in a natural language format. The pattern that describes the event is converted into at least one identified pattern key value pair. ... International Business Machines Corporation
A unique id using optically visible carbon nanotubes with nanocrystal decoration is provided. In one aspect, a method for creating a unique id includes: providing a substrate having an array of trenches; randomly placing carbon nanotubes throughout the array such that each trench either contains a carbon nanotube or does not, wherein the random placement of the carbon nanotubes throughout the array of trenches includes code information that forms the unique id; and coating the carbon nanotubes with optically visible nanocrystals. ... International Business Machines Corporation
A method for determining the authenticity of a trackable item is provided. The method includes maintaining a database including first scan history data associated with a given integrated circuit associated with a given item. ... International Business Machines Corporation
Embodiments include method, systems and computer program products for credit card authorization. Aspects include receiving, by a processor, credit card information for a consumer. ... International Business Machines Corporation
Methods and systems for visualizing data include forming hierarchically related graphs having a common time-series axis. The hierarchically related graphs are displayed in a linear arrangement, such that shared values on the common time-series axis align for each graph. ... International Business Machines Corporation
The present invention discloses a method and computer program product for estimating a candidate commitment to an accepted job offer of a company, the method including identifying candidate information associated with the candidate, wherein the candidate information is selected from a group including: monitored social media activity associated with the candidate, a candidate survey result, candidate referral information, an employment history of the candidate, and candidate learning progress, assigning a score between a minimum value and a maximum value for each item within the identified candidate information, calculating an estimated commitment of the candidate based on the assigned score for each item, determining the calculated estimated commitment is lower than a threshold, and confirming the candidate is committed to the accepted job offer.. . ... International Business Machines Corporation
The present invention discloses a method and computer program product for estimating a candidate commitment to an accepted job offer of a company, the method including identifying candidate information associated with the candidate, wherein the candidate information is selected from a group including: monitored social media activity associated with the candidate, a candidate survey result, candidate referral information, an employment history of the candidate, and candidate learning progress, assigning a score between a minimum value and a maximum value for each item within the identified candidate information, calculating an estimated commitment of the candidate based on the assigned score for each item, determining the calculated estimated commitment is lower than a threshold, and confirming the candidate is committed to the accepted job offer.. . ... International Business Machines Corporation
Scheduling events with multiple invitees includes: identifying a plurality of invitees for an event in a calendar system having at least one processor; searching an availability associated with each of the invitees to determine a number of periods of availability in the calendar system, at least some of the invitees being available during each period of availability; creating a separate instance of the event in the calendar system for each identified period of availability; and for each invitee available during at least one of the periods of availability, assigning the invitee to one said instance of the event for which that invitee is available with the calendar system.. . ... International Business Machines Corporation
Techniques facilitating blockchain ledgers of material spectral signatures for supply chain integrity management are provided. In one example, a computer-implemented method comprises validating, by a device operatively coupled to a processor, spectral signature data associated with a material, resulting in validated spectral signature data; and generating, by the device, a set of information corresponding to a transaction of the material in a blockchain associated with the material, wherein the set of information is related to the validated spectral signature data. ... International Business Machines Corporation
Techniques facilitating blockchain ledgers of material spectral signatures for supply chain integrity management are provided. In one example, a computer-implemented method comprises validating, by a device operatively coupled to a processor, spectral signature data associated with a material, resulting in validated spectral signature data; and generating, by the device, a set of information corresponding to a transaction of the material in a blockchain associated with the material, wherein the set of information is related to the validated spectral signature data. ... International Business Machines Corporation
A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.. . ... International Business Machines Corporation
A method for classifying content includes receiving the content; identifying a ratings jurisdiction and regime for the content; accessing a knowledge base for a trained model according to the ratings jurisdiction and regime; classifying the content by testing the content against the trained model; and providing to a user the classification of the content. Optionally, the method includes receiving, from the user, a classification feedback of the content; and updating the trained model responsive to the content and the classification feedback.. ... International Business Machines Corporation
A machine learning process is performed using one or more sources of information for enhanced oil recovery (eor) materials to be used for an eor process on a defined oil reservoir. Performance of the machine learning process produces an output comprising an indication of one or more eor materials and their corresponding concentrations to be used in the eor process. ... International Business Machines Corporation
A method for classifying content includes receiving the content; identifying a ratings jurisdiction and regime for the content; accessing a knowledge base for a trained model according to the ratings jurisdiction and regime; classifying the content by testing the content against the trained model; and providing to a user the classification of the content. Optionally, the method includes receiving, from the user, a classification feedback of the content; and updating the trained model responsive to the content and the classification feedback.. ... International Business Machines Corporation
A method includes training a prediction model to forecast a likelihood of curtailment for at least one wind turbine. The prediction model is trained, by a processor system, using historical information and historical instances of curtailment. ... International Business Machines Corporation
A method for reviewing digital publications includes receiving a digital publication while it is being composed. Potential audiences are identified for the digital publication. ... International Business Machines Corporation
In an approach for protecting recoding logic in a computing environment, a processor obtains an operand of an instruction in a first data format. A processor converts the operand from the first data format to a second data format. ... International Business Machines Corporation
In an approach for protecting recoding logic in a computing environment, a processor obtains an operand of an instruction in a first data format. A processor converts the operand from the first data format to a second data format. ... International Business Machines Corporation
In an approach for protecting recoding logic in a computing environment, a processor obtains an operand of an instruction in a first data format. A processor converts the operand from the first data format to a second data format. ... International Business Machines Corporation
Embodiments of the invention provide a method for scene understanding based on a sequence of image frames. The method comprises converting each pixel of each image frame to neural spikes, and extracting features from the sequence of image frames by processing neural spikes corresponding to pixels of the sequence of image frames. ... International Business Machines Corporation
Methods and systems for testing base text direction (btd) include comparing one or more images from an end-user system to a respective reference image associated with a respective text test case. Each of the one or more images includes respective text test case information. ... International Business Machines Corporation
In determining a representative still image of a video, a first set of parameters for each frame in a video is derived, and a second set of parameters for a specific user is derived. A frame with first set of parameters that best matches the second set of parameters is identified and selected as the representative still image of the video for the specific user. ... International Business Machines Corporation
A computer-implemented method for authenticating a composite fingerprint includes executing on a computer processor the step of receiving the composite fingerprint, wherein the composite fingerprint is a thermal image of a reference finger with a thermal impression of another finger from a thermal scanner. The composite fingerprint is authenticated according to a known fingerprint of the reference finger and a known fingerprint of the other finger. ... International Business Machines Corporation
Disclosed embodiments provide techniques for managing luggage within a premises such as an airport. A group identifier is established that includes multiple travelers. ... International Business Machines Corporation
In some embodiments, a tamper-respondent system includes a pcb having a coating on a surface thereof, wherein the coating includes spinel-based, non-conductive metal oxide mixed into a non-conductive supporting material. The tamper-respondent system also includes a conductive track writing unit, a sensor, and an enclosure substantially enclosing the pcb, conductive track writing unit, and sensor. ... International Business Machines Corporation
The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis.. . ... International Business Machines Corporation
A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. ... International Business Machines Corporation
A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. ... International Business Machines Corporation
Managing access to confidential content is provided. An indication of an identity of a teleconference participant is received via a voice communication headset that includes a skull conduction speaker and microphone. ... International Business Machines Corporation
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. ... International Business Machines Corporation
A method is provided for controlling access to a protected resource in a computing system, which includes storing an indication of a selection of an access image type, receiving an access request for accessing the protected resource, and determining one or more access locations of an access grid of images, the access locations (and possibly the corresponding images) changing along a sequence of access requests. The method also includes generating the access grid to include corresponding access images of the access image type for the access locations and one or more other image types different from the access image type, displaying the access grid, and controlling the access to the protected resource according to a selection of one or more selected images in the access grid.. ... International Business Machines Corporation
A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a pervasive repository for storing biometric data, the pervasive repository including at least one of a biometric layer, a genomic layer, a health layer, a privacy layer, and a processing layer. ... International Business Machines Corporation
A method and/or computer system generates a three-dimensional image of a fingerprint. One or more sensors detect a first user's finger being pressed against a first fingerprint scanner, where the first user's finger has a first user's fingerprint that comprises fingerprint ridges that form fingerprint grooves. ... International Business Machines Corporation
A method including: receiving physiological and external data of a user; predicting that the user is gravitating towards an undesirable mental state based on the physiological and external data; and providing the user with an ameliorative action in response to the prediction that the user is gravitating towards the undesirable mental state.. . ... International Business Machines Corporation
A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement a healthcare analytics management system. A healthcare analytics development sub-system of the healthcare analytics management system develops an analytics pipeline of a set of analytics assets for a selected healthcare based on a set of business needs for a healthcare analytics client and a healthcare analytics model based on the set of analytics assets and the set of business needs. ... International Business Machines Corporation
A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement a healthcare analytics management system. A healthcare analytics development sub-system of the healthcare analytics management system develops an analytics pipeline of a set of analytics assets for a selected healthcare based on a set of business needs for a healthcare analytics client and a healthcare analytics model based on the set of analytics assets and the set of business needs. ... International Business Machines Corporation
Aspects of the present invention include methods, systems and computer program products. The method includes a processor providing a netlist indicative of connectivity and functional states of components of an integrated circuit design; iteratively searching through the netlist at a selected depth to locate errors within the netlist by a plurality of trials, each of the plurality of trials having a plurality of iterations; adaptively adjusting the selected depth depending on any errors within the netlist being located, the selected depth increasing over time from an initial value as between the plurality of iterations; and adaptively adjusting an amount of coverage of the netlist depending on any errors within the netlist being located, the amount of coverage of the netlist decreasing over time from an initial amount as between the plurality of iterations.. ... International Business Machines Corporation
Aspects of the present invention include methods, systems and computer program products. The method includes a processor providing a netlist indicative of connectivity and functional states of components of an integrated circuit design; iteratively searching through the netlist at a selected depth to locate errors within the netlist by a plurality of trials, each of the plurality of trials having a plurality of iterations; adaptively adjusting the selected depth depending on any errors within the netlist being located, the selected depth increasing over time from an initial value as between the plurality of iterations; and adaptively adjusting an amount of coverage of the netlist depending on any errors within the netlist being located, the amount of coverage of the netlist decreasing over time from an initial amount as between the plurality of iterations.. ... International Business Machines Corporation
A computer-implemented method includes: generating a first list of uniform resource locators (urls) available on a page when accessed using privileged credentials; storing one or more first url outputs associated with the first list of urls including the content of webpages accessed using the privileged credentials; generating a second list of urls when accessed using non-privileged credentials; generating a third list of urls, wherein the third list of urls includes urls included in the first list of urls and not included in the second list of urls; storing a second url output including content of a webpage mapped to a particular url in the third list of urls when the particular url is accessed using the non-privileged credentials; determining that the second url output matches a particular first url output associated with the particular url; and outputting an alert identifying that the webpage is accessible by an unauthorized user.. . ... International Business Machines Corporation
Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor to cause the processor to implement a type-specific answer filtration system, the method comprising parsing, by the processor, one or more input questions; for each input question: attempting, by a number-subtype finder module, to identify one or more number-subtype head-nouns; attempting, by a number-subtype finder module, to identify one or more number-subtype verbs; attempting, by a number-subtype finder module, to identify one or more number-subtype adjectives; based on the presence of at least one number-subtype head-noun, number-subtype verb, or number-subtype adjective, determining, by a question classifier module, the number-subtype of the input questions; labelling the input question with the determined number-subtype; iterating through one or more answer candidates associated with the input question; for each answer candidate, determining, by an answer candidate classifier module, the number-subtype of the answer candidate; and if the answer candidate number-subtype does not match the input question number-subtype, removing, by an answer candidate removal module, the answer candidate.. . ... International Business Machines Corporation
In presenting search results, a server collects a history of electronic texts related to the user from electronic text sources and analyzes the electronic texts to determine a detail level score of the user. The detail level score indicates a preferred level of details in the communication style of a specific user. ... International Business Machines Corporation
A method for providing information to a user in response to a received user query. A natural language analysis generates substrings relevant to an input user query pertaining to a problem a user experiences with a product or service. ... International Business Machines Corporation
Provided herein are techniques for processing a database query aggregating data. Data tuples of a database object each including a grouping element and a data element are analyzed to determine a length of the data element for each data tuple. ... International Business Machines Corporation
A mashup system and method for providing contextual insights and notifications regarding a plurality of deployed applications deployed across a plurality of devices is provided. The method includes the steps of retrieving application data of the plurality of deployed applications generated by the plurality of devices, which is stored on a central cloud storage repository, identifying an application data associated with the first deployed application using a pre-defined data mining template corresponding to the first deployed application, and an application data associated with the second deployed application using a pre-defined data mining template corresponding to the second deployed application, and analyzing, the application data associated with the first deployed application and the application data associated with the second deployed application along with a user specific information to provide one or more contextual insights or notifications to the user on a single display associated with the computing system.. ... International Business Machines Corporation
Embodiments are directed to an entity extraction and filtering method that enables a close search of documents to build filters necessary for near real-time monitoring of streaming sources of information. According to an embodiment, the entity extraction and filtering method operates based on the following parameters. ... International Business Machines Corporation
Embodiments are directed to an entity extraction and filtering system that enables a close search of documents to build filters necessary for near real-time monitoring of streaming sources of information. According to an embodiment, the entity extraction and filtering system operates based on the following parameters. ... International Business Machines Corporation
A method, computing system and computer program product are provided. A nested loop join access plan for a query is executed and processed records of a most outer table of a nested loop join that satisfy local predicates are counted. ... International Business Machines Corporation
Methods, systems, and computer program products for carrying out interactive dialog in natural language using an ontology are provided herein. A computer-implemented method includes generating one or more domain-driven interpretations of a natural language dialogue query provided by a user via utilization of a web ontology language; determining multiple structured base queries, from among a stored collection of structured queries, that correspond to the natural language dialogue query, in view of the one or more generated domain-driven interpretations; selecting one of the multiple determined structured base queries, based on one or more items of context information pertaining to the dialogue; automatically generating a response to the selected structured base query; and outputting the generated response to the user.. ... International Business Machines Corporation
Methods and systems for database optimization include compacting columns in an unoptimized database that co-appear in queries to the database into a single hyper-column using a processor to form an optimized database. Queries are received according to a schema for the unoptimized database. ... International Business Machines Corporation
A method for extending a tag of an information resource in an information network may be provided. The method may include providing a group of tags, stored in a database, in a user interface, and selecting at least one tag out of the group of tags and linking the tag to an information resource using the user interface. ... International Business Machines Corporation
A method, computer program product, and system includes a processor(s) monitoring, via an image capture device communicatively coupled to the one or more processors, visual focus of a user to identify a focal point of a user on an area of an image of at least one object displayed in a graphical user interface communicatively coupled to the one or more processors. The processor(s) derives shape geometry of the object, creating a three-dimensional model. ... International Business Machines Corporation
An approach for parallel deduplication using automatic chunk sizing. A dynamic chunk deduplicator receives a request to perform data deduplication where the request includes an identification of a dataset. ... International Business Machines Corporation
An approach for parallel deduplication using automatic chunk sizing. A dynamic chunk deduplicator receives a request to perform data deduplication where the request includes an identification of a dataset. ... International Business Machines Corporation
Provided are techniques for a high performance compliance mechanism for structured and unstructured data in an enterprise. A record to represent a collection of structured objects is generated. ... International Business Machines Corporation
A computer-implemented method is provided for container sharing and scheduling in an environment having a plurality of nodes. The method includes deploying a container management service system that manages a list of layered images. ... International Business Machines Corporation
A computer-implemented method is provided for container sharing and scheduling in an environment having a plurality of nodes. The method includes deploying a container management service system that manages a list of layered images. ... International Business Machines Corporation
Probable origination date may be derived by using a stream of data captured, for example, from the internet and from other documentation sources such as historical information about a target object, its author, related environmental data, social media data, blogs, microblogs, posts, historical information, and/or other data sources. Techniques such as textual analysis, statistical analytics, and/or artificial intelligence may combine and correlate the information from data sources to extract clues that may indicate the original author and date of authorship. ... International Business Machines Corporation
Probable origination date may be derived by using a stream of data captured, for example, from the internet and from other documentation sources such as historical information about a target object, its author, related environmental data, social media data, blogs, microblogs, posts, historical information, and/or other data sources. Techniques such as textual analysis, statistical analytics, and/or artificial intelligence may combine and correlate the information from data sources to extract clues that may indicate the original author and date of authorship. ... International Business Machines Corporation
Embodiments can provide a computer implemented method, in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor to cause the processor to implement a media artifact annotation system, the method comprising inputting one or more relationships; for each of the one or more relationships, extracting, through an entity argument extraction module, one or more entity arguments; constructing, through a media query construction module, a media query using the one or more entity arguments; submitting the media query to a media search corpus; receiving search results comprising one or more media artifacts from the media search corpus; passing, through an annotation module, the search results to an annotator; receiving, through a response input module, one or more responses regarding each of the one or more media artifacts from the annotator; if the response for the media artifact is confirmatory, applying an annotation to the media artifact; and if the response for the media artifact is rejection, applying no annotation to the media artifact.. . ... International Business Machines Corporation
A method and system for improving location specific (l) functions is provided. The method includes generating and maintaining an online l-word dictionary. ... International Business Machines Corporation
A terminology extraction method, system, and computer program product include extracting terminology specific to a domain from a corpus of domain-specific text, where no external general domain reference corpus is required. The method assumes that terms which share common noun token(s) in a domain corpus are likely to be very related, that terms which are very related in a domain are likely to be equally or similarly important even though there might be large differences among their term frequencies, and that an abbreviation and its corresponding expansion have equal importance as terms.. ... International Business Machines Corporation
Historical form input field usage information of a group of input fields associated with a graphical user interface (gui) form is used to automatically partition a subset of the group of input fields into a new form within a new tabbed portion of the displayed gui form. The new form includes a set of selectable options that allow a user to select between reorganizing the subset of the input fields according to historical input field usage analysis of the user and reorganizing the subset of the plurality of input fields according to historical input field usage analysis of a group of form users within which the user is a member. ... International Business Machines Corporation
A meeting summarization method, system, and computer program product, include capturing notes of a user including a time stamp from the user associated with a meeting, synchronizing an agenda of the meeting and the notes of the user based on a correlation between a time stamp of a topic on the agenda and a time stamp of the notes of the user, and analyzing the synchronized topic and the notes to determine highlights of the meeting based on a co-occurrence of the time stamp of the notes of the user and the time stamp of the topic on the agenda.. . ... International Business Machines Corporation
A computer-implemented method includes detecting, using a processor, an arrangement of a plurality of blocks that are interconnected, where each block of the plurality of blocks is a physical block representing a corresponding atomic service. It is determined, using the processor, whether each atomic service represented by a block in the plurality of blocks is configured to communicate with each other atomic service represented by an other block with which the block is interconnected in the plurality of blocks. ... International Business Machines Corporation
A method is provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. ... International Business Machines Corporation
A system and computer program product are provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. ... International Business Machines Corporation
Provided are a computer program product, system, and method for determining cores to assign to cache hostile tasks. A computer system has a plurality of cores. ... International Business Machines Corporation
A translation engine for a processor system to translate virtual memory addresses to physical addresses of a main memory of a computer system is provided, where a sequence of accesses to multiple address translation tables is performed to support a computer system virtualization level. The translation engine includes: a first pipeline having at least, a first pipeline stage to receive a value for an original address or an address translation table entry requested in a previous pass through the first pipeline; a second pipeline stage using the value as an operand in a translation operation eventually yielding the address translation result or yielding a table index to an entry in a next address translation table; and a third pipeline stage issuing a read request for the entry in the next address translation table.. ... International Business Machines Corporation
A computer-implemented method is provided for managing digital datasets stored on a multi-tiered storage system that includes several tiers of storage, the datasets likely to be accessed by one or more applications interacting with the storage system. The method includes monitoring an access history of datasets accessed by the one or more applications; and while monitoring the access history: computing probabilities of access, by the one or more applications, of the datasets stored on the storage system according to metadata associated to given datasets as identified in the monitored access history; and based on the computed probabilities of access, selecting one or more of the datasets to be moved across the tiers. ... International Business Machines Corporation
Provided are a computer program product, system, and method for locking a cache line for a burst write operations on a bus. A cache line is allocated in a cache for a target address. ... International Business Machines Corporation
Operation of a multi-slice processor that includes a plurality of execution slices, a plurality of load/store slices, and one or more instruction sequencing units, where operation includes: receiving, at a load/store slice from an instruction sequencing unit, a instruction to be issued; determining, at the load/store slice, a rejection condition for the instruction; and responsive to determining the rejection condition for the instruction, maintaining state information for the instruction in the load/store slice instead of notifying the instruction sequencing unit of a rejection of the instruction.. . ... International Business Machines Corporation
A facility and cache machine instruction of a computer architecture for specifying a target cache cache-level and a target cache attribute of interest for obtaining a cache attribute of one or more target caches. The requested cache attribute of the target cache(s) is saved in a register.. ... International Business Machines Corporation
A computer-implemented method is provided for distributed garbage collection (gc). The method includes increasing an amount of heap collection in an origin java virtual machine (jvm) by collecting unnecessary remote references to objects that belong to the origin jvm. ... International Business Machines Corporation
A computer-implemented method is provided for distributed garbage collection (gc). The method includes increasing, an amount of heap collection in an origin java virtual machine (jvm) by collecting unnecessary remote references to objects that belong to the origin jvm. ... International Business Machines Corporation
A memory balancing method, system, and computer program product include determining page fault rate metrics for guest operating systems. Embodiments can use these metrics to determine total guest page allocations among a set of virtual machines, virtual machine placement, and/or candidates for host-to-host migration of virtual machines to explain a means of determining page fault rates using a paravirtual memory manager component for each guest.. ... International Business Machines Corporation
Aspects capture test coverage in a distributed system, wherein a processor instigates execution of a unique hypertext transfer request protocol test case within a distributed system of different, networked servers. The header of the unique test case includes a unique name for the unique test case, and the distributed system servers are each configured to, in response to processing a test case, generate a time-stamped log entry that includes header data for the processed test case and a uniform resource locator address of the processing server. ... International Business Machines Corporation
Systems, methods and tools for identifying potential errors or inconsistencies occurring during the runtime of multi-threaded applications and reporting the errors to a user, administrator or developer for correction and adjustments to the program code or thread timings. Embodiments of the disclosure capture thread sequences during a runtime or simulation environment and store the thread sequences as a matrix or tabular representation in a file. ... International Business Machines Corporation
Methods for providing the capability to resample computer system metrics, while providing improved accuracy over conventional techniques. One method may comprise monitoring and measuring metrics of system resource consumption of a plurality of entities to generate resource consumption data, generating a report of the resource consumption data for the plurality of entities for each of a plurality of time periods, identifying a number, k, of the plurality of entities as top-k consumers of resources for each of the plurality of time periods, identifying at least one residual entity of the plurality of entities whose resource consumption is not included in the top-k entities based on residual resource consumption data of the entity, and resampling the reports of the resource consumption data corresponding to the top-k entities and to the at least one residual entity to form at least one report covering a time period.. ... International Business Machines Corporation
System and method for providing the capability to resample computer system metrics, while providing improved accuracy over conventional techniques. One method may comprise monitoring and measuring metrics of system resource consumption of a plurality of entities to generate resource consumption data, generating a report of the resource consumption data for the plurality of entities for each of a plurality of time periods, identifying a number, k, of the plurality of entities as top-k consumers of resources for each of the plurality of time periods, identifying at least one residual entity of the plurality of entities whose resource consumption is not included in the top-k entities based on residual resource consumption data of the entity, and resampling the reports of the resource consumption data corresponding to the top-k entities and to the at least one residual entity to form at least one report covering a time period.. ... International Business Machines Corporation
A monitoring mechanism is used to detect, via client side monitoring, malfunctions of services within a cloud environment. Additional monitors are activated against the problem-related services in the system. ... International Business Machines Corporation
Provided are a computer program product, system, and method for after swapping from a first storage to a second storage, mirroring data from the second storage to the first storage for data in the first storage that experienced data errors. A swap operation redirects host input/output (i/o) requests to data from the first server to the second server in response to a health condition at the first server. ... International Business Machines Corporation
Methods, computing systems and computer program products implement embodiments of the present invention that include detecting a loss of communication with a given storage node among multiple storage nodes in a distributed computing system. Upon detecting the loss of communication, a log including updates to the data stored in the given storage node is recorded and, the recorded updates can be applied to the given storage node upon communication with the given storage node being reestablished. ... International Business Machines Corporation
An approach for virtual machine (vm) random access memory (ram) disk preservation during vm failure. A ram disk manager receives a vm identifier and attributes for connecting a ram disk to the vm, where the ram disk includes a memory region separate from memory region(s) associated with the vm. ... International Business Machines Corporation
A secondary volume of a remote computational device stores an asynchronous copy of a primary volume of a local computational device. The remote computational device generates a target volume that stores consistent data from the secondary volume, and also generates a plurality of point in time copies at a plurality of instants of time from the target volume. ... International Business Machines Corporation
An approach for virtual machine (vm) random access memory (ram) disk preservation during vm failure. A ram disk manager receives a vm identifier and attributes for connecting a ram disk to the vm, where the ram disk includes a memory region separate from memory region(s) associated with the vm. ... International Business Machines Corporation
Provided are an apparatus and method for managing data storage. A first log structured array stores data in a storage device. ... International Business Machines Corporation
A method begins by processing modules of a dispersed storage network (dsn) allocating a plurality of dsn address ranges to dsn memories of the dsn and assigning dsn address ranges of the plurality of dsn address ranges to a first and second tenant of the dsn. The method continues by the processing modules receiving a write request for a data object segmented into first data segments from a first tenant of the dsn, and encoding the first data segments in accordance with first error encoding parameters. ... International Business Machines Corporation
A method and technique for data lifecycle management includes identifying a fault from a monitored system. A time period window associated with the fault is defined based on when the fault occurred. ... International Business Machines Corporation
An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. ... International Business Machines Corporation
A method executed by a mobile apparatus for verifying event information to be shared is disclosed. The method includes communicating with a nearby mobile or immobile apparatus to generate a verification in response to encountering the nearby mobile or immobile apparatus. ... International Business Machines Corporation
A method executed by a mobile apparatus for verifying event information to be shared is disclosed. The method includes communicating with a nearby mobile or immobile apparatus to generate a verification in response to encountering the nearby mobile or immobile apparatus. ... International Business Machines Corporation
A visual tool may be provided to display information associated with computer job allocation and to allow a user to explore different job configurations. Jobs executing on a computing environment comprising a shared pool of configurable computing resources may be monitored. ... International Business Machines Corporation
A workload scheduling method, system, and computer program product include analyzing a resource scheduling requirement for processes of a workload including the communication patterns among cpus and accelerators, creating feasible resources based on static resource information of the resources for the processes of the workload, and selecting an available resource of the feasible resources to assign the workload based on the resource scheduling requirement, such that the cpu and gpu connection topology of the selection matches the communication patterns of the workload.. . ... International Business Machines Corporation
Systems, methods and tools for managing the job queues of virtual machines, maintaining a low energy profile and a quality of service within the contractual service agreement. The systems migrate jobs to a new vm queue when a assigned vm has failed. ... International Business Machines Corporation
A distributed data processing method, system, and computer program product include distribution of production software automatically without being designed for such distribution by the developers of the software and consideration of breakdown, automatic or otherwise, of a production software application into its components such that execution of the components can be distributed across nodes.. . ... International Business Machines Corporation
A coordinator transaction processing monitor determines a transaction coordinator identifier associated with a transaction that spans transaction processing monitors distributed between transaction processing systems. The coordinator transaction processing monitor attaches the transaction coordinator identifier as part of a transaction request of an application flow of the transaction. ... International Business Machines Corporation
One embodiment includes obtaining virtual machine (vm) information for at least one vm. The vm information includes a vsi type identification (id) associated with each vm. ... International Business Machines Corporation
A method for off-board data migration. Responsive to receiving a request to migrate a virtual machine image, a memory location of the source virtual machine is identified. ... International Business Machines Corporation
A device includes a memory that is configured to store instructions. The device includes a processor configured to execute the instructions to: validate a message including virtual machine (vm) information using a value of a virtual station interface (vsi) type identification (id) to perform a lookup of a fetched vsi database. ... International Business Machines Corporation
A computer processor includes a branch prediction unit that includes a local branch predictor and a global branch predictor. Managing power consumption in such a computer processor includes, for each of a plurality of branch instructions: performing, by the local branch predictor, a local branch prediction; performing, by each of the global branch predictors, a global branch prediction; determining to utilize the local branch prediction over the global branch predictions as a branch prediction for the branch instruction; incrementing a value of a counter; determining whether the value of the counter exceeds a predetermined threshold; and if the value of the counter exceeds the predetermined threshold, powering down at least one of the global branch predictors and configuring the branch prediction unit to bypass the powered down global branch predictor for branch predictions of subsequent branch instructions.. ... International Business Machines Corporation
A machine instruction is provided that includes an opcode field to provide an opcode, the opcode to identify a perform pseudorandom number operation, and a register field to be used to identify a register, the register to specify a location in memory of a first operand to be used. The machine instruction is executed, and execution includes for each block of memory of one or more blocks of memory of the first operand, generating a hash value using a 512 bit secure hash technique and at least one seed value of a parameter block of the machine instruction; and storing at least a portion of the generated hash value in a corresponding block of memory of the first operand, the generated hash value being at least a portion of a pseudorandom number.. ... International Business Machines Corporation
The present invention relates to an apparatus and a method for validating application deployment topology in a cloud environment. There is provided an apparatus for validating application deployment topology in a cloud environment comprising: a topology skeleton generator configured to generate, based on multiple vms and script packages running on the vms created by a user and required to deploy an application as well as running order of script packages and data dependency between script packages set by the user, a topology skeleton that comprises at least scripts of script packages of respective vms and running order of the script packages; and a simulator configured to simulate a runtime environment in the cloud environment at the apparatus, thereby validating the running order and data dependency with respect to the topology skeleton, wherein the simulator is installed in the apparatus by using a simulator installation package retrieved from the cloud environment.. ... International Business Machines Corporation
A method, computer system, and computer program product for determining a candidate patch for computer software is provided. According to a method, fingerprint(s) of patch(es) for a computer software is obtained first, wherein a fingerprint of a patch comprises function(s) being revised in the computer software if the patch is installed into the computer software. ... International Business Machines Corporation
A method begins by a dispersed storage (ds) processing module detecting a boot operation by a device in a dsn. The method continues with the ds processing module retrieving initialization information, accessing a first dsn memory and generating access request for encoded data slices. ... International Business Machines Corporation
A tape drive system as a network attached storage (nas) device and a method for operating the tape drive system. A tape drive is connected to a native connector disposed in a wall of a housing. ... International Business Machines Corporation
A data migration management apparatus includes a data migration module, a decompression module, and a consolidation module. The data migration module determines a plurality of compressed extents on a source controller are subject to a data migration process to a target controller. ... International Business Machines Corporation
A computer-implemented method, according to one embodiment, includes: designating a first set of drives as higher availability drives, and designating a second set of drives as lower availability drives. Each of the drives is configured to receive cartridges via one or more accessors. ... International Business Machines Corporation
A method for utilizing parallel paths of differing performance to improve efficiency is disclosed. In one embodiment, such a method includes transmitting, over a faster path, a first command to perform first actions intended to improve efficiency of second actions associated with a second command. ... International Business Machines Corporation
In one embodiment, a computer-implemented method includes producing one or more clean frames by clearing a batch of one or more frames for use in backing virtual memory pages. The producing the one or more clean frames may be performed asynchronously from a unit of work being performed by a processor. ... International Business Machines Corporation
A computer-implemented method according to one embodiment includes identifying a plurality of segment files within an object storage system, determining all data blocks associated with the plurality of segment files within the object storage system, and mapping all the data blocks associated with the plurality of segment files to a single new file within the object storage system.. . ... International Business Machines Corporation
A method for minimizing head seek movement and improving i/o performance of a hard disk drive is disclosed. In one embodiment, such a method includes logically dividing storage space of a hard disk drive into storage areas of substantially equal size. ... International Business Machines Corporation
A method, computer program product, and system for contextual determination of emotion icons. The method includes, for a particular user, determining an emotion icon to automatically input into a message, based on a class of the user, a current mood of the user, and the recipient of the message. ... International Business Machines Corporation
A mechanism is provided for use with dashboards that show computer operations and/or status. The mechanism receives first user dashboard preference data indicative of a first user's historical preferences for dashboard content, layout and/or customizability. ... International Business Machines Corporation
A computer determines a cognitive overload of a user interacting with a visual display based on eye tracking data. The visual display includes content of the dashboard and graphical elements of the content of the dashboard. ... International Business Machines Corporation
In an approach for displaying applications associated with content in a clipboard, a computer receives a selection of content to transfer to a clipboard, wherein the content is selected from a first application on a computing device. The computer identifies one or more applications on one or more computing devices capable of processing the received selection. ... International Business Machines Corporation
In an approach for displaying applications associated with content in a clipboard, a computer receives a selection of content to transfer to a clipboard, wherein the content is selected from a first application on a computing device. The computer identifies one or more applications on one or more computing devices capable of processing the received selection. ... International Business Machines Corporation
Embodiments of the present invention provide a method, system and computer program product for teaming in swarm intelligent robot sets. The method includes programming a multiplicity of robots in a multi-robot set with a particular locomotive model and assigning each of the robots to different individual tasks corresponding to different individual objectives of a problem based upon the particular locomotive model of the corresponding robots. ... International Business Machines Corporation
Vehicle positioning in a parking area is provided by obtaining vehicle information of vehicles for positioning in the parking area, identifying unutilized parking space in the parking area, then based on recognizing a vehicle movement event, determining an optimized layout for the vehicles, the optimized layout including position for each vehicle of the vehicles, the vehicle movement event including (i) actual or anticipated arrival of an arriving vehicle to be positioned in the parking area or (ii) actual or anticipated departure of a departing vehicle departing from the parking area, and positioning one or more vehicles of the vehicles to conform to the determined optimized layout, the positioning including automatically controlling movement of at least one autonomous vehicle of the one or more vehicles and repositioning a vehicle, of the one or more vehicles, that is a different vehicle than the arriving vehicle or departing vehicle.. . ... International Business Machines Corporation
Embodiments are directed to a method of forming an optical coupler system. The method includes forming at least one waveguide over a substrate, and forming a sacrificial optical coupler in a first region over the substrate. ... International Business Machines Corporation
Embodiments of the invention are directed to a sensor that includes a sensing circuit and a probe communicatively coupled to the sensing circuit. The probe includes a three-dimensional (3d) sensing surface coated with a recognition element and configured to, based at least in part on the 3d sensing surface interacting with a predetermined material, generate a first measurement. ... International Business Machines Corporation
Embodiments of the invention are directed to a sensor that includes a sensing circuit and a probe communicatively coupled to the sensing circuit. The probe includes a three-dimensional (3d) sensing surface coated with a recognition element and configured to, based at least in part on the 3d sensing surface interacting with a predetermined material, generate a first measurement. ... International Business Machines Corporation
A portable optical measurement system is provided for performing metal trace analysis on a liquid sample. The system includes a sample holder for holding an analysis substrate that includes the liquid sample during the metal trace analysis. ... International Business Machines Corporation
Methods, systems, and computer program products for driving anomaly detection based on spatio-temporal landscape-specific driving models are provided herein. A method includes generating, for each of multiple users, a temporally-related driving skill model pertaining to one or more landscapes, wherein the model is based on temporally-related driving data associated with the users and landscape-related information of trips driven by the users; monitoring the users participating in a ride-sharing trip in a vehicle by analyzing ride-sharing trip data; detecting driving-related anomalies attributed to the monitored users by comparing the ride-sharing trip data and the respective temporally-related driving skill model for each monitored user; updating a schedule for the trip based on the detected anomalies and estimated conditions attributed to remaining portions of the trip by modifying an assignment of selected users to drive the vehicle during the remaining portions of the trip; and outputting the updated schedule to the selected users.. ... International Business Machines Corporation
A method, system, and computer program product, include receiving a plurality of requests for dynamic context information from a plurality of road segments, determining whether the plurality of road segments are included in a same cluster of road segments in a road network generated by clustering road segments in the road network based on connectivity of the road network, and consolidating the plurality of requests to generate a consolidated request in response to determining that the plurality of road segments are included in the same cluster.. . ... International Business Machines Corporation
An approach is provided by a mobile information handling system that includes a processor, and a gyroscope, a gravity sensor, and a memory each accessible by the processor. The approach identifies, at the mobile device that is moving with a vehicle, when a rotation of the gyroscope is at a near-zero moment, and an acceleration, wherein the acceleration is detected as being on a plane that is near-perpendicular with a gravity sensed by the gravity sensor. ... International Business Machines Corporation
A process includes forming a bio-derived crosslinking material from biorenewable aconitic acid. The process includes initiating a chemical reaction to form a bio-derived crosslinking material that includes multiple functional groups. ... International Business Machines Corporation
A process includes forming a bio-derived crosslinking material from biorenewable aconitic acid. The process includes initiating a chemical reaction to form a bio-derived crosslinking material that includes multiple functional groups. ... International Business Machines Corporation
A process of forming a functionalized polyhydroxyalkanoate (pha) material includes forming an unsaturated pha material having a carbon-carbon double bond in a polymer backbone. The process also includes utilizing the unsaturated pha material to form a functionalized pha material. ... International Business Machines Corporation
An immersion weaving system includes a first drum immersed in a first bath of a liquid. The first drum is configured to form a glass strand from individual glass filaments. ... International Business Machines Corporation
Embodiments of the invention are directed to computer-implemented methods, computer systems, and computer program products for operating an elevator car. The method includes receiving first inputs from one or more sensors. ... International Business Machines Corporation
Adjusting the intensity of the rear fog lights of a vehicle to optimize intensity based on the precipitation rate and the speed of the vehicle in order to increase the visibility of drivers of the following vehicles. The speed of the vehicle is detected with a speed sensor, a rain value is determined using a rain sensor, and the optimal light intensity is calculated taking into account vehicle specific turbulence characteristics. ... International Business Machines Corporation
Techniques for drone device control are provided. In one example, the technique includes monitoring, by a drone device operatively coupled to a processor and allocated to a vehicle in operation, one or more conditions associated with the vehicle. ... International Business Machines Corporation
Techniques for drone device control are provided. In one example, the technique includes monitoring, by a drone device operatively coupled to a processor and allocated to a vehicle in operation, one or more conditions associated with the vehicle. ... International Business Machines Corporation
Techniques for drone device control are provided. In one example, the technique includes monitoring, by a drone device operatively coupled to a processor and allocated to a vehicle in operation, one or more conditions associated with the vehicle. ... International Business Machines Corporation
A method and apparatus are provided for printing multicolored three-dimensional objects. The method includes: selectively exposing a photosensitive thermoplastic feedstock to light within an extrusion nozzle, the feedstock comprising a thermoplastic base mixed with a photosensitive material; extruding the exposed feedstock into a deposit to print an object; and photo-chemically developing the deposit to provide color to the deposit. ... International Business Machines Corporation
Circuit feature casting for manufacture observation is disclosed herein. According to an aspect, a method includes applying a molding material to a feature of a circuit to substantially cover the feature with the molding material. ... International Business Machines Corporation
In an approach to creating assembly plan for disaster mitigation, one or more computer processors identify one or more triggering events. The one or more computer processors receive one or more configuration parameters for one or more assembly plans pertaining to the one or more triggering events. ... International Business Machines Corporation
Method, apparatus, and computer program product for a microfluidic channel having a cover opposite its bottom, such that the cover allows visual inspection inside the channel, and having electrodes with patterned planar conducting materials, integrated onto its bottom. Using the planar conducting materials, once a fluid sample with suspended microparticles is applied into the channel, highly localized modulated electric field distributions are generated inside the channel and the fluid sample. ... International Business Machines Corporation
Embodiments of the invention include a microfluidic device, which comprises a substrate with a channel defined therein, on an upper surface of the substrate, wherein a bottom wall of the channel comprises several contiguous steps having an asymmetric profile along a main direction of the channel, so as to form a ratchet topography. The device further comprises a lid, opposite to and at a distance from the upper surface of the substrate, so as to face the bottom wall of the channel. ... International Business Machines Corporation
Embodiments of the invention include a microfluidic device, which comprises a substrate with a channel defined therein, on an upper surface of the substrate, wherein a bottom wall of the channel comprises several contiguous steps having an asymmetric profile along a main direction of the channel, so as to form a ratchet topography. The device further comprises a lid, opposite to and at a distance from the upper surface of the substrate, so as to face the bottom wall of the channel. ... International Business Machines Corporation
Aspects include high resolution brain-electronic interfaces and related methods. Aspects include forming a semiconductor circuit on a substrate, depositing a tensile stress layer on the circuit, and separating the semiconductor circuit from a portion of the silicon substrate. ... International Business Machines Corporation
Aspects include methods of fabricating antibacterial surfaces for medical implant devices including patterning a photoresist layer on a silicon substrate and etching the silicon to generate a plurality of nanopillars. Aspects also include removing the photoresist layer from the structure and coating the plurality of nanopillars with a biocompatible film. ... International Business Machines Corporation
Aspects include methods of fabricating antibacterial surfaces for medical implant devices including patterning a photoresist layer on a silicon substrate and etching the silicon to generate a plurality of nanopillars. Aspects also include removing the photoresist layer from the structure and coating the plurality of nanopillars with a biocompatible film. ... International Business Machines Corporation
Aspects include methods of fabricating antibacterial surfaces for medical implant devices including patterning a photoresist layer on a silicon substrate and etching the silicon to generate a plurality of nanopillars. Aspects also include removing the photoresist layer from the structure and coating the plurality of nanopillars with a biocompatible film. ... International Business Machines Corporation
Aspects include methods of fabricating antibacterial surfaces for medical implant devices including patterning a photoresist layer on a silicon substrate and etching the silicon to generate a plurality of nanopillars. Aspects also include removing the photoresist layer from the structure and coating the plurality of nanopillars with a biocompatible film. ... International Business Machines Corporation
Materials and methods for preparing a payload-containing microcapsule with walls that have hexahydrotriazine (ht) and/or hemiaminal (ha) structures are disclosed. To an ht small molecule or a ha small molecule, or a combination thereof, in a solvent is added a cross-linking agent, nh4cl, and a copolymer. ... International Business Machines Corporation
Techniques that facilitate two-phase liquid cooling electronics are provided. In one example, a server system comprises a two-phase cooling system and an air moving system. ... International Business Machines Corporation
Techniques that facilitate two-phase liquid cooling electronics are provided. In one example, a server system comprises a two-phase cooling system and an air moving system. ... International Business Machines Corporation
A slam latch includes a retaining screw that is held in position by a distal upper support that constrains a distal portion of the retaining screw from moving upward, a middle lower support that constrains a middle portion of the retaining screw from moving downward, and a proximal upper support that constrains a proximal portion of the retaining screw from moving upward. The slam latch further comprises one or more l-shaped retaining members on the side that allow sliding the one or more l-shaped retaining members into a corresponding slot(s) of a device being secured, thereby preventing the slam latch from torqueing and bending with respect to the device.. ... International Business Machines Corporation
A slam latch includes a retaining screw that is held in position by a distal upper support that constrains a distal portion of the retaining screw from moving upward, a middle lower support that constrains a middle portion of the retaining screw from moving downward, and a proximal upper support that constrains a proximal portion of the retaining screw from moving upward. The slam latch further comprises one or more l-shaped retaining members on the side that allow sliding the one or more l-shaped retaining members into a corresponding slot(s) of a device being secured, thereby preventing the slam latch from torqueing and bending with respect to the device.. ... International Business Machines Corporation
A barrier system configured to at least partially surround at least one access opening that permits access to an interior of a data storage library. The barrier system includes at least one side surface configured to be coupled to at least one door along a first side surface location and to the data storage library along a second side surface location. ... International Business Machines Corporation
A method is provided for controlling wireless connection of a device having a wireless communication interface to a wireless access point. The method includes: determining, by the device, if a known wireless access point is available by comparing a determined location of the device with geographical information associated with a set of known wireless access points; if the known wireless access point is available, determining, by the device, a time elapsed since a most recent data communication activity of the device; and disabling the wireless communication interface of the device if the time elapsed is less than an idle time threshold value so as to prevent wireless connection of the device to the known wireless access point.. ... International Business Machines Corporation
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. ... International Business Machines Corporation
A location of a target associated with a first system is determined at the first system at a first time. A signal is constructed at the first system where the data of the signal includes an identifier indicative of a collision avoidance nature of the signal. ... International Business Machines Corporation
A computer-implemented method includes identifying a context associated with a mobile device, wherein the mobile device is capable of listening for a beacon signal. The computer-implemented method further includes determining whether the mobile device is qualified to listen for the beacon signal based on the context associated with the mobile device. ... International Business Machines Corporation
Multi-layer display of content on a flexible display is provided. A roll profile of a rolled transparent flexible display is detected, the rolled transparent flexible display forming a plurality of overlapping display layers of the transparent flexible display. ... International Business Machines Corporation
A computer-implemented method includes: receiving, by a computing device, an incoming telephone call from a caller; identifying, by the computing device, a telephone number associated with the telephone call; obtaining, by the computing device, contextual data based on the telephone number, predicting, by the computing device, one or more reasons for the telephone call based on the contextual data; and displaying, by the computing device, the one or more reasons for the telephone call.. . ... International Business Machines Corporation
Systems, methods, and computer program products are disclosed for dynamically determining an optimal node of an overlay network for client attachment. An optimal node can be selected from a group of potential attachment nodes in the overlay network through which a client can establish a connection to the overlay network. ... International Business Machines Corporation
Disclosed embodiments provide techniques for automatic interdependency resolution for micro-service deployments. A micro-service deployment broker executing on a computing device obtains current environment and feature support of a deployed distributed computing environment. ... International Business Machines Corporation
A method is provided for deleting a content element of a chat history lacking long-term relevance. The method includes receiving a content element, conditionally assigning the content element to the topic, determining a relationship index value for the content element to the topic using a validity value, which is a function of an access rate and a credibility index value. ... International Business Machines Corporation
Embodiments include method, systems and computer program products for enhanced storage clients. In some embodiments, an interface for using a storage service may be provided. ... International Business Machines Corporation
Aspects of the present invention provide an approach for processing a notification on a mobile device. In an embodiment, a set of classifications is assigned to a notification received by a user on a mobile device. ... International Business Machines Corporation
An embodiment of the invention includes a method for executing commands in a distributed computing environment. The method receives a plurality of distributed commands from one or more devices. ... International Business Machines Corporation
A resource utilization mechanism (rum) preemptively extracts data from long latency storage in a cloud computing environment to economically and quickly provide data that is infrequently accessed by customers. The rum identifies periods of low resource utilization where capacity can be efficiently utilized, identifies data to be retrieved, and retrieves the data from long latency storage to make it available to the customer. ... International Business Machines Corporation
Aspects control data transfers within group of networked devices. The devices are assigned a power values indicative of a relative quality of power supply, connection values indicative of a relative quality of network connections available, and master state values as a function of a comparing historical usage data. ... International Business Machines Corporation
Focus data of a remote user is analyzed to determine a focus shift from a first area to a second area at an event arena. A beacon density is computed at the second area, where the beacon density includes a number of physical beacons corresponding to a number of local users at the second area, a number of virtual beacons corresponding to a number of remote users focused on the second area, or a combination of thereof. ... International Business Machines Corporation
Systems and methods for personalizing video playback are disclosed. In embodiments, a computer-implemented method, comprises: initiating, by a computing device, a video playing session of a video; recording, by the computing device, user initiated playback actions during the video playing session as playback event data; determining, by the computing device, context data based on content of the video, and saving the context data; determining, by the computing device, insights regarding the user playback event data utilizing the context data; and generating, by the computing device, one or more recommendations based on the insights.. ... International Business Machines Corporation
Disclosed embodiments provide an approach for sharing media items between mobile devices that are in proximity to one another. A device id is generated and shared with nearby devices. ... International Business Machines Corporation
A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The events corresponding to the collections are classified, using an ltsm network, into a class of cyber-attack. ... International Business Machines Corporation
Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. ... International Business Machines Corporation
Controlling access to a secure resource. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. ... International Business Machines Corporation
A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed network of computing nodes, and wherein each of the set of computing nodes maintains the secure chain of data blocks. The secure chain of data blocks maintained at each computing node comprises one or more data blocks that respectively represent one or more transactions associated with an unmanned aerial vehicle (uav). ... International Business Machines Corporation
Embodiments of the invention include a method for determining that a change has occurred to a first account. The first account is a linked account that is linked with at least one second account in a single sign-on environment. ... International Business Machines Corporation
A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. ... International Business Machines Corporation
Embodiments of the invention is directed to a method for connecting a device to a network. An example method comprises providing a device assigned with a device identifier and an asymmetric cryptographic key pair that includes a public key and a private key. ... International Business Machines Corporation
Embodiments of the invention is directed to a method for connecting a device to a network. An example method comprises providing a device assigned with a device identifier and an asymmetric cryptographic key pair that includes a public key and a private key. ... International Business Machines Corporation
Usb traffic is intercepted between a usb device and a computer system. It is determined whether the usb device has previously had a policy associated with it as to whether usb traffic from the device should be blocked, allowed, or sanitized. ... International Business Machines Corporation
Approaches presented herein enable tailoring messages to enhance sharing and resonance based on a community fingerprint and a key influencer. More specifically, a message to be directed to members of an online social community is received. ... International Business Machines Corporation
In at least one embodiment of stream processing in a data processing system cluster, a driver requests, from a cluster manager, execution of a first task within a job including a plurality of tasks, as well as a first quantity of resources of the cluster to support execution of the task. At completion of execution of the first task by the cluster, the driver retains for a second task among the plurality of tasks at least a portion of the resources allocated to the first task by the cluster manager. ... International Business Machines Corporation
A method for predicting a failure of a complex storage environment is provided. The method includes monitoring a current utilization of one or more resources over a data path of interest, calculating a maximum utilization threshold for each resource of the one or more resources, such that exceeding the maximum utilization threshold adversely impacts one or more performance measures, creating an expected performance threshold associated with an expected performance for each performance measure of the one or more performance measures over the data path of interest, ascertaining an actual performance for each performance measure based on the monitoring of the current utilization, analyzing maximum values of resource usage over time to predict when the expected performance will fall outside of an acceptable overall performance threshold for the data path of interest, and determining an earliest expected incident of resource exhaustion.. ... International Business Machines Corporation
System resource usage by a streaming application processing workloads can be monitored. Based on the monitoring, at least one performance metric for the streaming application in processing the workloads can be determined. ... International Business Machines Corporation
Embodiments for fault detection in an end-to-end communication flow between microservices within a cloud computing environment by one or more processors. A communication pattern may be established between an invoking microservice and one or more microservices to enable fault detection of a failure of an end-to-end communication flow between the invoking microservice and the one or more microservices, wherein the communication pattern includes a request to self-monitor for the fault detection by the one or more microservices, and an acknowledgement response provided by the invoking microservice to the one or more microservices indicating success or failure of the end-to-end communication flow between the invoking microservice and the one or more microservices.. ... International Business Machines Corporation
Systems and methods for encrypting and decrypting data in a dispersed storage network are disclosed. A data object may be encrypted using a data object specific encryption key, a container specific encryption key, a tenant account specific encryption key, or a time based encryption key. ... International Business Machines Corporation
A technique for non-binary context mixing in a compressor includes generating, by a plurality of context models, model predictions regarding a value of a next symbol to be encoded. A mixer generates a set of final predictions from the model predictions. ... International Business Machines Corporation
Embodiments of the present disclosure generally relate to cables having routing features integrated with a jacket of the cable, and methods of using and forming the same. The routing features include one or more of hook-and-loop fasteners or clips for securing adjacent cables to one another and/or to a mounting structure, such as a server rack. ... International Business Machines Corporation
A flexible electronic circuit includes a shape memory material disposed within a flexible dielectric material.. . ... International Business Machines Corporation
In one aspect, a method for placing carbon nanotubes on a dielectric includes: using dsa of a block copolymer to create a pattern in the placement guide layer on the dielectric which includes multiple trenches in the placement guide layer, wherein there is a first charge on sidewall and top surfaces of the trenches and a second charge on bottom surfaces of the trenches, and wherein the first charge is different from the second charge; and depositing a carbon nanotube solution onto the dielectric, wherein self-assembly of the deposited carbon nanotubes within the trenches occurs based on i) attractive forces between the first charge on the surfaces of the carbon nanotubes and the second charge on the bottom surfaces of the trenches and ii) repulsive forces between the first charge on the surfaces of the carbon nanotubes and the first charge on sidewall and top surfaces of the trenches.. . ... International Business Machines Corporation
Techniques for preventing switching of spins in a magnetic tunnel junction by stray magnetic fields using a thin film magnetic shield are provided. In one aspect, a method of forming a magnetic tunnel junction includes: forming a stack on a substrate, having a first magnetic layer, a tunnel barrier, and a second magnetic layer; etching the stack to partially pattern the magnetic tunnel junction in the stack, wherein the etching includes patterning the magnetic tunnel junction through the second magnetic layer, the tunnel barrier, and partway through the first magnetic layer; depositing a first spacer and a magnetic shield film onto the partially patterned magnetic tunnel junction; etching back the magnetic shield film and first spacer; complete etching of the magnetic tunnel junction through the first magnetic layer to form a fully patterned magnetic tunnel junction; and depositing a second spacer onto the fully patterned magnetic tunnel junction.. ... International Business Machines Corporation
Photodiode structures and methods of manufacture are disclosed. The method includes forming a waveguide structure in a dielectric layer. ... International Business Machines Corporation
Approaches for silicon photonics integration are provided. A method includes: forming at least one encapsulating layer over and around a photodetector; thermally crystallizing the photodetector material after the forming the at least one encapsulating layer; and after the thermally crystallizing the photodetector material, forming a conformal sealing layer on the at least one encapsulating layer and over at least one device. ... International Business Machines Corporation
A memory device including a first conductivity type vertically orientated semiconductor device in a first region of a substrate and a second conductivity type vertically orientated semiconductor device in a second region of the substrate. A common floating gate structure in simultaneous electrical communication with a first fin structure of the first conductivity type vertically orientated semiconductor device and a second fin structure of the second conductivity type vertically orientated semiconductor device.. ... International Business Machines Corporation
Replacement metal gate structures with improved chamfered workfunction metal and self-aligned contact and methods of manufacture are provided. The method includes forming a replacement metal gate structure in a dielectric material. ... International Business Machines Corporation
Methods of forming semiconductor devices include forming a first dielectric layer over a semiconductor fin. A second dielectric layer is formed around the first dielectric layer. ... International Business Machines Corporation
Semiconductor device and methods of forming the same, include forming a first dielectric layer over a semiconductor fin. A second dielectric layer is formed around the first dielectric layer. ... International Business Machines Corporation
A method of forming a vertical transport fin field effect transistor and a long-channel field effect transistor on the same substrate, including, forming a recessed region in a substrate and a fin region adjacent to the recessed region, forming one or more vertical fins on the fin region, forming a long-channel pillar from the substrate in the recessed region, where the long-channel pillar is at a different elevation than the one or more vertical fins, forming two or more long-channel source/drain plugs on the long-channel pillar, forming a bottom source/drain plug in the fin region, where the bottom source/drain plug is below the one or more vertical fins, forming a gate structure on the long-channel pillar and a gate structure on the one or more vertical fins, and forming a top source/drain on the top surface of the one or more vertical fins.. . ... International Business Machines Corporation
During a fabrication of a semiconductor device, a recess is created in a substrate material disposed along a direction of a plane of fabrication. A layer of a removable material is formed in the recess. ... International Business Machines Corporation
Replacement metal gate structures with improved chamfered workfunction metal and self-aligned contact and methods of manufacture are provided. The method includes forming a replacement metal gate structure in a dielectric material. ... International Business Machines Corporation
An additive core subtractive liner method is described for forming electrically conductive contacts. The method can include forming a first trench in an first dielectric layer to expose a first portion of a metal liner, and filling said first trench with a second dielectric layer. ... International Business Machines Corporation
An additive core subtractive liner method is described for forming electrically conductive contacts. The method can include forming a first trench in an first dielectric layer to expose a first portion of a metal liner, and filling said first trench with a second dielectric layer. ... International Business Machines Corporation
Provided herewith are embodiments related to a semiconductor structure and a method for forming the semiconductor structure. A first spacer layer and a second spacer layer are formed opposite a major surface of a substrate. ... International Business Machines Corporation
A tunable breakdown voltage rf mesfet and/or mosfet and methods of manufacture are disclosed. The method includes forming a first line and a second line on an underlying gate dielectric material. ... International Business Machines Corporation
A semiconductor device including a base region present within a fin semiconductor structure that is present atop a dielectric substrate. An epitaxial emitter region and epitaxial collector region are present on opposing sides and in direct contact with the fin semiconductor structure. ... International Business Machines Corporation
Methods of forming capacitors include forming a self-assembled pattern of periodic first and second domains using first and second block copolymer materials over a substrate. The second block copolymer material is etched away. ... International Business Machines Corporation
Capacitors and methods of forming the same include forming a self-assembled pattern of periodic first and second domains using first and second block copolymer materials over a substrate. The second block copolymer material is etched away. ... International Business Machines Corporation
A plurality of fin structures containing, from bottom to top, a non-doped semiconductor portion and a second doped semiconductor portion of a first conductivity type, extend upwards from a surface of a first doped semiconductor portion of the first conductivity type. A trapping material (e.g., an electron-trapping material) is present along a bottom portion of sidewall surfaces of each non-doped semiconductor portion and on exposed portions of each first doped semiconductor portion. ... International Business Machines Corporation
An electrical device including a vertical transistor device connected to a vertical diode. The vertical diode connected transistor device including a vertically orientated channel. ... International Business Machines Corporation
An electrical device including a vertical transistor device connected to a vertical diode. The vertical diode connected transistor device including a vertically orientated channel. ... International Business Machines Corporation
An electric static discharge (esd) diode pair is disclosed. The first diode of the device includes a first diode junction portion having vertically orientated and horizontally oriented portions of a first conductivity and a second diode junction portion of a second conductivity in direct contact with both of the vertically orientated and horizontally orientated portions of the first diode junction portion. ... International Business Machines Corporation
Optoelectronic devices and method of forming the same include an optoelectronic component in a substrate layer. An integrated circuit chip is positioned on the substrate layer. ... International Business Machines Corporation
Methods and semiconductor devices for bonding a first semiconductor device to a second semiconductor device include forming metal pads including a textured microstructure having a columnar grain structure at substantially the same angular direction from the top surface to the bottom surface. The textured crystalline microstructures enables the use of low temperatures and low pressures to effect bonding of the metal pads. ... International Business Machines Corporation
Wafers include multiple bulk redistribution layers. A contact pad is formed on a surface of one of the bulk redistribution layers. ... International Business Machines Corporation
A multi-level semiconductor device and a method of fabricating a multi-level semiconductor device involve a first interlayer dielectric (ild) layer with one or more metal lines formed therein. A silicide is formed on a surface of the first ild layer and is directly adjacent to each of the one or more metal lines on both sides of each of the one or more metal lines. ... International Business Machines Corporation
A semiconductor device that includes a first plurality of fin structures in a first device region and a second plurality of fin structures in a second device region. The first plurality of fin structures includes adjacent fin structures separated by a lesser pitch than the adjacent fin structures in the second plurality of fin structures. ... International Business Machines Corporation
Methods of forming fins include forming mask fins on a protection layer over a seed layer. Seed layer fins are etched out of the seed layer. ... International Business Machines Corporation
A deposition tool includes a vacuum chamber and a physical vapor deposition module including a target source in the vacuum chamber. The target source includes a target material for depositing on a workpiece. ... International Business Machines Corporation
A deposition tool includes a vacuum chamber and a physical vapor deposition module including a target source in the vacuum chamber. The target source includes a target material for depositing on a workpiece. ... International Business Machines Corporation
A calibration controller tests an electronic circuit to identify an initial read check with a read delay, an initial write check with a write delay, and an initial command, address, control (cac) check with a cac delay indicated as passing. Responsive to the initial read check, the initial write check, and the initial cac check indicated as passing, for each setting of the read delay, the write delay, and the cac delay, the calibration controller iteratively performs concurrently, a write test with the write delay, a read test with the read delay, and a cac test with the cac delay on the electronic circuit over the range of conditions while simultaneously adjusting the write delay, the read delay, and the cac delay for each iteration until one or more of a read edge, a write edge, and a cac edge are detected.. ... International Business Machines Corporation
A data storage library includes at least a first library portion and at least a second library portion, with the second library portion including an environmental conditioning unit configured to control environmental conditions within the second library portion. The data storage library also includes at least one acclimation chamber formed within the first library portion, which permits transition of environmental condition(s) within the at least one acclimation chamber toward at least one of the corresponding environmental condition(s) external and internal to the second library portion. ... International Business Machines Corporation
A method of controlling at least one environmental condition within a data storage library, including providing at least one enclosure configured to surround at least one ventilation opening of the data storage library and to form a chamber around at least the at least one ventilation opening, and providing at least one enclosure environmental conditioning unit fluidly connected to the at least one enclosure to provide conditioned air into the chamber. The method may also include providing air from the at least one enclosure environmental conditioning unit into the chamber such that air provided into the chamber enters the data storage library through the at least one ventilation opening.. ... International Business Machines Corporation
A data storage library system includes at least one data storage library, the at least one data storage library comprising at least one library frame, wherein the at least one library frame has at least one environmental conditioning unit configured to control one or more environmental conditions within the at least one library frame. The system also includes at least one access door for providing access to an interior portion of the at least one library frame, a library controller, and at least one louver, where the louver may be selectively moveable to control a communication pathway for external air to enter the at least one library frame. ... International Business Machines Corporation
A method of servicing a data storage library having at least one access opening and at least one access door to permit access to an interior of the data storage library, the method including providing at least one barrier configured to at least partially surround the at least one library access opening when the at least one access door is opened, wherein the at least one barrier is configured to resist environmental conditions from exterior the barrier and data storage library from intruding into the interior of data storage library when the barrier is deployed. The method also includes deploying the at least one barrier when the at least one access door is opened to form an interior working space, accessing the interior space formed by the at least one barrier, and accessing the interior of the data storage library via the at least one library access opening.. ... International Business Machines Corporation
An approach is provided for auto-adjusting instructional video playback based on cognitive user activity detection analysis. The approach includes, for instance, providing for playback an instructional video, including a series a steps to accomplish one or more tasks, and monitoring, during playback of the instructional video, progress of a user through the series of steps. ... International Business Machines Corporation
A data storage library system includes a data storage library having at least one library frame, at least one environmental conditioning unit associated with the data storage library and configured to control one or more interior environmental conditions within the at least one library frame, and at least one access door for providing access to an interior portion of the at least one library frame. The system also includes a library controller configured to initiate a service mode prior to and/or during a service procedure performed within the at least one library frame, wherein the service mode comprises configuring the at least one environmental conditioning unit to adjust the one or more environmental conditions within the at least one library frame toward one or more exterior environmental conditions outside of the data storage library. ... International Business Machines Corporation
A data storage library system includes at least one data storage library comprising at least one library frame and at least one environmental conditioning unit, the at least one environmental conditioning unit configured to control one or more environmental conditions within the at least one library frame. The system further includes at least one access door for providing access to an interior portion of the data storage library, a library controller, and at least one warning indicator associated with the data storage library and in electronic communication with the library controller. ... International Business Machines Corporation
A method of servicing a data storage library includes providing an enclosure configured to surround at least one library access opening to form a chamber. The at least one enclosure has an access opening of sufficient size to permit an adult human access to the interior chamber, and the enclosure is configured to resist environmental conditions from the exterior of the enclosure from intruding into the chamber and to permit environmental conditions from the interior of the library to intrude into the chamber. ... International Business Machines Corporation
An enclosure configured to at least partially surround a data storage library, and a system including a data storage library and enclosure(s). The enclosure includes at least one surface configured to surround the at least one library access opening and form a chamber and to permit movement of the movable panel to permit access to the interior of the data storage library, and at least one enclosure access opening in the at least one of the surface to permit access to the interior of the chamber. ... International Business Machines Corporation
An enclosure configured to at least partially surround at least one access opening that permits access to an interior of a data storage library, wherein the enclosure includes at least one side surface configured to surround the at least one access opening to form a chamber and to permit access to the interior of the data storage library. The enclosure also includes at least one access opening in the at least one side surface to permit access to an interior of the chamber, wherein the enclosure is configured to selectively acclimate the chamber between environmental conditions exterior of the enclosure and environmental conditions of the interior of the data storage library.. ... International Business Machines Corporation
A tape drive-implemented method, according to one embodiment, includes: causing a servo reader to move in a first direction over a high-density servo pattern which includes a plurality of high-density servo tracks. Each of the servo tracks includes at least two patterns written at different frequencies to produce different periodic waveforms during readback. ... International Business Machines Corporation
An apparatus according to one embodiment includes an array of transducers, where the array of transducers includes at least one contiguous group of transducers in a number specified in a format and at least two servo readers, where the servo readers are symmetrically positioned about the contiguous group of transducers and the servo readers are asymmetrically positioned relative to a centerline of the array of transducers. Moreover, a number of transducers in the contiguous group of transducers is less than a number of transducers in the array of transducers.. ... International Business Machines Corporation
An apparatus according to one embodiment includes an array of 2n+1 transducers on a pitch, where at least one of the transducers within the array is configured as a servo reader. In addition, one of the transducers configured as the servo reader is flanked by transducers on each side.. ... International Business Machines Corporation
A method according to one embodiment includes forming at least two write transducers for writing to a magnetic medium, the at least two write transducers being positioned adjacent each other and aligned along a line; and forming a shield structure having shields adjacent at least three sides of each of the at least two write transducers, the shields being formed of a magnetically permeable material.. . ... International Business Machines Corporation
A learning sub-system models search patterns of multiple experts in analyzing an image using a recurrent neural network (rnn) architecture, creates a knowledge base that models expert knowledge. A teaching sub-system teaches the search pattern captured by the rnn model and presents to a learning user the information for analyzing an image. ... International Business Machines Corporation
An approach is provided that provides a communication tone coach. The approach may obtain communication information regarding a communication between a first entity and a second entity while the communication may be ongoing. ... International Business Machines Corporation
An approach is provided that provides a communication tone coach. The approach may obtain communication information regarding a communication between a first entity and a second entity while the communication may be ongoing. ... International Business Machines Corporation
A learning sub-system models search patterns of multiple experts in analyzing an image using a recurrent neural network (rnn) architecture, creates a knowledge base that models expert knowledge. A teaching sub-system teaches the search pattern captured by the rnn model and presents to a learning user the information for analyzing an image. ... International Business Machines Corporation
Systems and methods for establishing an ad-hoc collaboration between unmanned aerial vehicles (uavs) are provided. A method includes: configuring intent data of a first uav using a controller of the first uav; configuring a collaboration plan for the first uav and a second uav based on a determination of a shared intent between the first uav and the second uav; executing the collaboration plan by flying the first uav and gathering data using the first uav based on the collaboration plan; and sharing the gathered data with an operator of the second uav.. ... International Business Machines Corporation
At least one parameter indicating the smart garment presently is being worn by a user can be received from a transmitter integrated into a smart garment. Based on the at least one parameter indicating the smart garment presently is being worn by the user, the smart garment can be identified. ... International Business Machines Corporation
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining user information of a vehicle driver user, the vehicle driver user being a user of a computer based system for managing a parking area; processing information of the user information; and outputting a communication to control an indicator system based on the processing, wherein the indicator system is provided as a fixture of the parking area and wherein the indicator system is configured to provide indications viewable by vehicle drivers driving within the parking area.. ... International Business Machines Corporation
A method, system and computer program product for allowing a user to view network contacts of other users when visiting an environment of a different organization. A visitor requests to view a profile of a user while the visitor is visiting the environment or tenant space of a different organization. ... International Business Machines Corporation
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information retrieval. One example method of operation may include extracting obligation data from one or more of documents and rules, identifying transaction data from one or more blockchain transactions, creating one or more transaction contexts based on the transaction data, comparing the obligation data to the transaction data to identify whether the one or more transaction contexts are subject to the obligation data, and creating a notification including a current compliance status between the transaction contexts and the obligation data.. ... International Business Machines Corporation
Dynamically generating and delivering multimedia presentations targeted to an individual and to a group of users at public rendering devices such as displays in a point in time based on customers' static and dynamic context. Customers' emotional state(s) are assessed while and/or after watching personalized multimedia presentations and used to dynamically change presentations and to drive the allocation of resources for other services within the premise.. ... International Business Machines Corporation
Dynamically generating and delivering multimedia presentations targeted to an individual and to a group of users at public rendering devices such as displays in a point in time based on customers' static and dynamic context. Customers' emotional state(s) are assessed while and/or after watching personalized multimedia presentations and used to dynamically change presentations and to drive the allocation of resources for other services within the premise.. ... International Business Machines Corporation
Embodiments of the invention provide for reduced network footprint customer behavior analytics. In an embodiment of the invention, a method for reduced network footprint customer behavior analytics includes executing an analytics server in memory of a host computing system and loading into the memory a table. ... International Business Machines Corporation
A method, system and computer program product for determining key professional skills and personality traits for a job is disclosed. A computer-implemented method is provided that comprises analyzing organization and industry data to identify one or more job-specific attributes associated with a job. ... International Business Machines Corporation
A computer implemented method and system for processing a service request of a service catalog. A service request is received. ... International Business Machines Corporation
A computer detects and identifies a consumer contacting a virtual dialogue host. The computer receives a query from the consumer and determines an estimated wait time to be connected to a representative. ... International Business Machines Corporation
A computer detects and identifies a consumer contacting a virtual dialogue host. The computer receives a query from the consumer and determines an estimated wait time to be connected to a representative. ... International Business Machines Corporation
Mechanisms are provided for modifying response of cognitive systems to user requests based on a determined knowledge level of the user and knowledge level of the concepts referenced in the cognitive system responses. The mechanisms receive a response to a user submitted request received from a client computing system and determine a first knowledge level of the user for a domain of the user submitted request. ... International Business Machines Corporation
The factual accuracy of an event is verified. Event data is received by a computer, whereby the event data includes actor data related to at least one actor involved in the event and location data related to a location of the event. ... International Business Machines Corporation
A set of profile parameters to characterize an unknown group of servers is computed. A set of known groups of servers is selected from a historical repository of known group of servers. ... International Business Machines Corporation
A computerized method comprising receiving, from a question answering system, a minimal answer value to a query submitted by a user. Also received are electronic documents based on the minimal answer value, and a document score value, associated with the query, for each of the electronic documents. ... International Business Machines Corporation
The present invention relates to unsupervised, supervised and reinforced learning via spiking computation. The neural network comprises a plurality of neural modules. ... International Business Machines Corporation
Embodiments of the present invention include a system, computer-implemented method, and a computer program product. A non-limiting example of the method includes a processor utilizing a model having a plurality of parameters. ... International Business Machines Corporation
Cooperative neural networks may be implemented by providing an input to a first neural network including a plurality of first parameters, and updating at least one first parameter based on an output from a recurrent neural network provided with the input, the recurrent neural network including a plurality of second parameters.. . ... International Business Machines Corporation
Cooperative neural networks may be implemented by providing an input to a first neural network including a plurality of first parameters, and updating at least one first parameter based on an output from a recurrent neural network provided with the input, the recurrent neural network including a plurality of second parameters.. . ... International Business Machines Corporation
Systems and methods for overlaying video segments of actions of audience members with video segments of an event performer are described. A computer implemented method includes: identifying, by a computer device, an event performer in video content; identifying, by the computer device, an audience member in the video content that has a social network relationship to the event performer; correlating, by the computer device, an action of the event performer in the video content to an action of the audience member in the video content; and generating, by the computer device, a composite image comprising an image of the action of the event performer and an image of the action of the audience member.. ... International Business Machines Corporation
Systems and methods to safeguard data and hardware may include a memory configured to store a first image and sensitive data, and an optical sensor configured to capture a second image. A sensor signal comprising the captured second image may be generated. ... International Business Machines Corporation
A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a request is received at a computing node. ... International Business Machines Corporation
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information retrieval. One example method of operation may include identifying one or more analytic processes to process blockchain data, determining a primary type of data analytic to be performed by the one or more analytic processes, selecting a type of data store to use for performing the one or more data analytic processes based on the primary type of data analytic, accessing the blockchain data, applying the one or more analytic processes, and storing results of the applied analytic processes in a database, file or dashboard. ... International Business Machines Corporation
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information retrieval. One example method of operation may include identifying a number of data parameters to extract from a blockchain based on a request for analytic data, creating one or more queries based on the data parameters, executing the one or more queries and retrieving the data parameters from the blockchain, identifying one or more permissions of a user account associated with the request for analytic data, and populating an interface with analytic figures based on the data parameters retrieved from the blockchain.. ... International Business Machines Corporation
Approaches presented herein enable dynamic security policies through a plurality of application profiles. More specifically, a mobile device can open a profile of a plurality of profiles, each associated with an unlock credential and a security scope, in response to an unlock credential associated with that profile. ... International Business Machines Corporation
Techniques for autonomously modeling a two-phase cooling architecture are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a reduced physics model based on a profile of a heat source and a parameter of a cooling structure. ... International Business Machines Corporation
Techniques for autonomously modeling a two-phase cooling architecture are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a reduced physics model based on a profile of a heat source and a parameter of a cooling structure. ... International Business Machines Corporation
A system and method of sensing and responding to service discoveries on a consumer's machine and, more particularly, to a system and method of sensing (discovering) service needs on a consumer's machine using a resident daemon, and responding to the service discoveries using an extension of uddi. The method comprises receiving a keyword from a local machine, locating a service associated with the keyword, and notifying the local machine about the service that matches the keyword.. ... International Business Machines Corporation
Systems and methods for recalling digital content utilizing contextual data are disclosed. In embodiments, a method includes: determining, by a computing device, that a user has accessed a content item from a content resource; associating, by the computing device, the content item with session data, the session data including a route between a first location and a second location; receiving, by the computing device, a first search query; determining, by the computing device, one or more potential user sessions of interest based on the first search query; receiving, by the computing device, a second search query directed to the content item; and filtering, by the computing device, search results of the second search query based on the one or more potential user sessions of interest to produce filtered search results including one or more content items associated with the session data.. ... International Business Machines Corporation
A method for identifying client states, receives a set of paths representative of a document object model (dom) associated with a web page of a rich internet application and for each path in the set of paths received, extracts a subtree, as subtree x, for a current path. The method traverses all known sub-paths under the current path and delete corresponding subtrees from subtree x and reads contents of and determines states of subtree x to form a state x. ... International Business Machines Corporation
A method includes generating, by a processor system, a graph. The graph is based at least in part on a plurality of instances in which operational taxonomic units are identified as being represented within an environment. ... International Business Machines Corporation
One embodiment provides for monotonic transactions in a multi-master database with loosely coupled nodes including performing, by a processor, a write transaction protocol including: a client device issuing write transactions at any of the nodes, recording a write transaction locally at a node that issues a write transaction and asynchronously replicating the write transaction to at least one other node, and waiting for reception of an acknowledgment from at least a quorum of the nodes before returning a response to the client device. The quorum is any set of the nodes that includes a special node and at least one other node.. ... International Business Machines Corporation
A method includes encoding, via the processing system, data using first level dispersal parameters to produce a set of first level encoded data slices, wherein the first level dispersal parameters includes a first level write threshold; outputting the set of first level encoded data slices to a set of distributed storage and task (dst) processing units, wherein each dst processing unit of the set of dst processing units encodes a corresponding one of the set of first level encoded data slices using second level dispersal parameters to produce a set of second level encoded data slices; determining, via the processing system, when a first level write threshold number of favorable storage responses is received from a subset of the set of dst processing units; and generating and outputting, via the processing system, a cancellation message to other dst processing units of the set of dst processing units.. . ... International Business Machines Corporation
Disclosed aspects relate to managing a stream computing environment using a projected database object. A set of realized data of a realized database object of a database management system (dbms) may be compared with a set of projected data of a projected database object of the dbms. ... International Business Machines Corporation
A computer-implemented method, cognitive intelligence server and computer program product adapt a relational database containing numeric data types. At least one numeric token in the relational database is converted to a textual form. ... International Business Machines Corporation
A computer-implemented method, a cognitive intelligence system and computer program product adapt a relational database containing image data types. At least one image token in the relational database is converted to a textual form. ... International Business Machines Corporation
A computer program product for taking a corrective action upon determination of an existence of a corrupted text segment within a set of web pages. Determination includes: determining a language affinity indicator corresponding to text segments within the set of web pages; generating an indexing repository based on a set of text artefacts within the text segments; creating an occurrence table for the set of text artefacts; and determining compliance of the text artefacts and text segments based on the single language grouping on which the set of text segments are based.. ... International Business Machines Corporation
A process compares respectively corresponding data blocks in redundant data storage systems having ongoing i/o activity, to detect discrepancies between blocks that are supposed to be identical. Storage systems have replica copies of the data. ... International Business Machines Corporation
A method for creating a standby database with read/write access capability while also maintaining a data consistency with a primary database, is provided. The method includes syncing the primary database with a physical standby mirror existing on the standby database, creating a first data compartment and a second data compartment on the standby database, separate from the physical standby mirror, applying a change made to the first data object on the primary database to the corresponding first data object on the physical standby mirror; and determining whether the change should be applied to the corresponding first data object stored on the first data compartment in accordance with data merge rules associated with the first data compartment and the second data compartment.. ... International Business Machines Corporation
A process compares respectively corresponding data blocks in redundant data storage systems having ongoing i/o activity, to detect discrepancies between blocks that are supposed to be identical. Storage systems have replica copies of the data. ... International Business Machines Corporation
A method for capturing evolving data, comprising observing a data graph, identifying a first entity within the graph, defining a first property of the first entity, and identifying a first data value corresponding to the property and the entity. The method further comprises associating a second entity with the first entity at first data value, and forming a dimension of the first entity with associations to other entities within the graph for different data values of the first property. ... International Business Machines Corporation
A method, computer program product and/or computer system assigns access to a quorum disk in a split-storage cluster environment when a communication link between storage systems fails. Access to the quorum disk is based on storage system i/o performance. ... International Business Machines Corporation
A method, computer program product and/or computer system assigns access to a quorum disk in a split-storage cluster environment when a communication link between storage systems fails. Access to the quorum disk is based on storage system i/o performance. ... International Business Machines Corporation
Processing a database query for sets of data includes assigning a unique identifier from an integer space to each entity within data and creating one or more sets of entities each pertaining to a corresponding entity within the data. A representation is then generated on disk for each set of entities, wherein each representation encompasses and is suited for a range of the unique identifiers of entities within a corresponding set and indicates a presence of an entity within that corresponding set. ... International Business Machines Corporation
Disclosed aspects relate to managing a database management system (dbms) using a set of stream computing data derived from a stream computing environment. The set of stream computing data which indicates a set of stream computing environment statistics may be collected with respect to the stream computing environment. ... International Business Machines Corporation
Disclosed aspects relate to managing a database management system (dbms) using a set of stream computing data derived from a stream computing environment. The set of stream computing data which indicates a set of stream computing environment statistics may be collected with respect to the stream computing environment. ... International Business Machines Corporation
Disclosed aspects relate to managing a database management system (dbms) using a set of stream computing data derived from a stream computing environment. The set of stream computing data which indicates a set of stream computing environment statistics may be collected with respect to the stream computing environment. ... International Business Machines Corporation
A method of determining contextual and cognitive metadata for shared photographs in which a sender's device takes a photographic image, and stores the image in a file along with metadata associated with the sender. The file, with the image and metadata, is sent to a recipient's device, which receives and stores the file. ... International Business Machines Corporation
A method of determining contextual and cognitive metadata for shared photographs in which a sender's device takes a photographic image, and stores the image in a file along with metadata associated with the sender. The file, with the image and metadata, is sent to a recipient's device, which receives and stores the file. ... International Business Machines Corporation
A computer-implemented method, cognitive intelligence system and computer program product adapt a relational database containing multiple data types. Non-text tokens in the relational database are converted to a textual form. ... International Business Machines Corporation
A computer-implemented method, a cognitive intelligence system and computer program product adapt a relational database containing multiple data types. Non-text tokens in the relational database are converted to a textual form. ... International Business Machines Corporation
A method comprising of receiving a first communication content directed to a user. The first communication content includes one or a combination of the following: content read by the user and content written by the user. ... International Business Machines Corporation
A method comprising of receiving a first communication content directed to a user. The first communication content includes one or a combination of the following: content read by the user and content written by the user. ... International Business Machines Corporation
An aspect of auto-completion of text entered by a user includes configurable data collection components that collect from software applications text data and metadata representing an initial state of each of the applications and text data and metadata representing changes to the state of one or more of the applications. A central text matching component receives and stores the text data and metadata. ... International Business Machines Corporation
A document editor user interface interacts with a user in receiving content from the user and provides suggestions determined via cognitive computing to the user while the user is authoring a document. A search engine searches for information associated with the content and returns the information. ... International Business Machines Corporation
Techniques facilitating matrix multiplication on a systolic array are provided. A computer-implemented method can comprise populating, by a system operatively coupled to a processor, respective first registers of one or more processing elements of a systolic array structure with respective input data bits of a first data matrix. ... International Business Machines Corporation
Techniques facilitating matrix multiplication on a systolic array are provided. A computer-implemented method can comprise populating, by a system operatively coupled to a processor, respective first registers of one or more processing elements of a systolic array structure with respective input data bits of a first data matrix. ... International Business Machines Corporation
Adaptive control of input/output (i/o) operations in a data storage system is provided to enable efficient use of the data storage system. More specifically, an interface is provided in order to adaptively control i/o operations to the data storage system. ... International Business Machines Corporation
A system for managing one or more queues in a multi-processor environment includes a queue manager disposed in communication with a plurality of processors and a memory shared by the plurality of processors, and a queue configured to be controlled by the queue manager, the queue including independent and discrete queue elements and having a starting location specified by a base address, the queue manager having one or more dynamically configurable parameters, the one or more dynamically configurable parameters including a size of each of the queue elements. The queue manager is configured to perform receiving a message from a processor of the plurality of processors, the message including an operation address specifying a fixed storage location in the memory and a request related to accessing the memory, selecting the queue based on the operation address, and performing a queuing operation on the queue based on the request.. ... International Business Machines Corporation
Disclosed aspects relate to hardware-based memory protection of a container-based virtualization environment. A set of access identifiers for a container of a kernel process related to a memory component may be established. ... International Business Machines Corporation
Disclosed are embodiments for supporting dynamic tier remapping of data stored in a hybrid storage system. One embodiment includes a storage controller and firmware, where the firmware maintains a plurality of mapping elements, where each mapping element includes a plurality of group identifiers, where each group identifier is configured to indicate a mapping of a logical block addresses, and where the storage controller performs: receiving a read command including a logical block address; parsing the logical block address to determine a mapping element and a group identifier; determining, for a particular mapping element of the plurality of elements, whether the particular mapping element is locked, wherein the particular mapping element corresponds to the mapping element of the logical block address; and dependent upon the particular mapping element, queuing the read command for firmware processing or remapping the logical block address.. ... International Business Machines Corporation
A technique for supporting in-place updates in a data storage system includes in response to garbage collection for a logical block address (lba) being indicated, determining whether an in-place update to the lba is pending. In response to one or more in-place updates to the lba being pending prior to the garbage collection for the lba being indicated, the garbage collection for the lba is initiated following completion of the one or more in-place updates to the lba. ... International Business Machines Corporation
A processor memory is stress tested with a variable link stack depth using link stack test segments with non-naturally aligned data boundaries. Link stack test segments are interspersed into test code of a processor memory tests to change the link stack depth without changing results of the test code. ... International Business Machines Corporation
A processor memory is stress tested with a variable link stack depth using link stack test segments with non-naturally aligned data boundaries. Link stack test segments are interspersed into test code of a processor memory tests to change the link stack depth without changing results of the test code. ... International Business Machines Corporation
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. ... International Business Machines Corporation
A computer-implemented method is provided that is performed in a computer having a processor and multiple co-processors. The method includes launching a same set of operations in each of an original co-processor and a redundant co-processor, from among the multiple co-processors, to obtain respective execution signatures from the original co-processor and the redundant co-processor. ... International Business Machines Corporation
A computer-implemented method is provided that is performed in a computer having a processor and multiple co-processors. The method includes launching a same set of operations in each of an original co-processor and a redundant co-processor, from among the multiple co-processors, to obtain respective execution signatures from the original co-processor and the redundant co-processor. ... International Business Machines Corporation
A method for distributing data among storage devices. The method comprising one or more processors receiving a first graph workload that executes within a networked computing environment. ... International Business Machines Corporation
A facility for event failure management is provided, which includes providing a failed event database containing failed event information relating to failed events and one or more components associated with each of the failed events. Upon modification to a component associated with a failed event, the failed event is retried. ... International Business Machines Corporation
A method for memory page erasure reconstruction in a storage array includes dividing data into multiple stripes for storage in a storage array including multiple storage devices with a topology of a hypercube of a dimension t≥3. The storage devices in same hypercubes of dimension t−1 including the hypercube of dimension t have even parity. ... International Business Machines Corporation
A method is provided for execution by one or more processing modules of a dispersed storage network (dsn). The method begins by the dsn receiving a request to update one or more data segments of a data object and continues with the dsn determining whether one or more encoded data slices (edss) of a plurality of edss associated with the one or more data segments of the data object are eligible for partial updating. ... International Business Machines Corporation
Embodiments include method, systems and computer program products for an interactive, multi-level failsafe capability. In some embodiments, a failed count indicative of a number of failed attempts to launch an application may be received. ... International Business Machines Corporation
Disclosed aspects relate to speculative execution management in a coherent accelerator architecture. A first access request from a first component may be detected with respect to a set of memory spaces of a single shared memory in the coherent accelerator architecture. ... International Business Machines Corporation
Disclosed aspects relate to speculative execution management in a coherent accelerator architecture. A first access request from a first component may be detected with respect to a set of memory spaces of a single shared memory in the coherent accelerator architecture. ... International Business Machines Corporation
A technique for short-circuiting normal read-copy update (rcu) grace period computations in the presence of expedited rcu grace periods. Both normal and expedited rcu grace period processing may be periodically performing to respectively report normal and expedited quiescent states on behalf of cpus in a set of cpus until all of the cpus have respectively reported normal or expedited quiescent states so that the normal and expedited grace periods may be respectively ended. ... International Business Machines Corporation
Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received. ... International Business Machines Corporation
A self-adjusting resource-provisioning system that infers the existence of extrinsic events by monitoring external information sources. When an external source satisfies a threshold condition, the system, as a function of historical records, correlates the inferred event with a likelihood that a web site or other computerized entity's resource-utilization will reach a certain level at a future time. ... International Business Machines Corporation
A method of ordering multiple resources in a transaction includes receiving a transaction for a plurality of resources and determining, for each resource, the work embodied by the transaction. The work includes at least one identified parameter relating to an operation for the resource. ... International Business Machines Corporation
Performance of parallel portions of a streaming application implemented in multiple virtual machines (vms) is monitored and logged. When there is a need to replicate operators in an existing virtual machine to a new virtual machine, the logged performance data is used to determine a desired configuration for the new virtual machine based on a past implementation of the existing virtual machine.. ... International Business Machines Corporation
A computer system with a hypervisor detects the local physical connection of a portable storage device with an operating system image thereon. The computer system installs an instance of the operating system on the hypervisor, and the hypervisor assigns a set of resources to the instance to generate a virtual machine. ... International Business Machines Corporation
A computer system with a hypervisor detects the local physical connection of a portable storage device with an operating system image thereon. The computer system installs an instance of the operating system on the hypervisor, and the hypervisor assigns a set of resources to the instance to generate a virtual machine. ... International Business Machines Corporation
A computer system with a hypervisor detects the local physical connection of a portable storage device with an operating system image thereon. The computer system installs an instance of the operating system on the hypervisor, and the hypervisor assigns a set of resources to the instance to generate a virtual machine. ... International Business Machines Corporation
An aspect includes receiving, by a processor, a capability indicating one or more performance aspects capable of being rendered by at least one hardware device of a computer system, determining a total number of hardware devices in the system, and determining a total number of the hardware devices having the capability. Upon determining, by the processor, that the total number of hardware devices in the system matches the total of the hardware devices having the capability, the capability is enabled for each of the hardware of the system with respect to a corresponding performance aspect.. ... International Business Machines Corporation
An instruction for parsing a buffer to be utilized within a data processing system including: an operation code field, the operation code field identifies the instruction; a control field, the control field controls operation of the instruction; and one or more general registers, wherein a first general register stores an argument address, a second general register stores a function code, a third general register stores length of an argument-character buffer, and the fourth of which contains the address of the function-code data structure.. . ... International Business Machines Corporation
Systems, methods, and computer program products to perform an operation comprising receiving, via an interface, a first review specifying a first rating value, a second rating value, and a textual review for an application in an application store, associating the first review in the application store with the first rating value, invoking a semantics analysis engine to determine that the textual review specifies a first known performance issue for the application, determining, based on an update to the application and reviews for the application received subsequent to the update to the application, that the first known performance issue has been resolved, and associating the first review in the application store with the second rating value.. . ... International Business Machines Corporation
For implementing cognitive feature based code level updates, an apparatus is disclosed. In some embodiments, the apparatus includes a detection module that detects components operating at a client site, collects information associated with the detected components, and identifies defects in the detected components based on the collected information. ... International Business Machines Corporation
A method includes obtaining an input factor regarding dispersed storage operational criteria and generating a set of hardware scores for hardware resources of a computing device based on at least one of: operational conditions of the computing device and the dsn. The method further includes ordering the set of hardware scores based on the dispersed storage operational criteria and identifying a set of modules based on at least one of the dispersed storage operational criteria and the ordered set of hardware scores. ... International Business Machines Corporation
A technique for selecting context models (cms) for a cm ensemble (cme) in a context mixing compressor includes measuring compression ratios (crs) of the compressor on a dataset for each cm included in a base set of cms. A first cm that has a maximum cr for the dataset is added to the cme. ... International Business Machines Corporation
An aspect includes receiving a request to access data in a memory, the request from a requesting processor and including a virtual address of the data. It is determined, based on contents of a page table that a plurality of physical addresses in the memory corresponds to the virtual address. ... International Business Machines Corporation
Provided are a computer program product, system, and method for processing a recall request for data migrated from a primary storage system having data mirrored to a secondary storage system mirroring data from the primary storage system to the at least one secondary storage system. The primary storage system receives a recall request to recall a data object that was migrated from the primary storage system to a remote storage location. ... International Business Machines Corporation
An aspect includes receiving a request to access data in a memory, the request from a requesting processor and including a virtual address of the data. It is determined, based on contents of a page table that a plurality of physical addresses in the memory corresponds to the virtual address. ... International Business Machines Corporation
A technique for operating a data storage system includes accessing respective absolute expiration times for valid pages in one or more candidate storage blocks. Garbage collection is performed on ones of the candidate storage blocks that include a first predetermined number of the valid pages that do not expire, as indicated by the absolute expiration times, prior to a first predetermined time period. ... International Business Machines Corporation
A data storage library system includes a data storage library, at least one environmental conditioning unit, at least one data storage drive retained within the data storage library, and at least one access door for providing access to an interior portion of the data storage library. The system also includes a library controller, wherein the library controller is configured to initiate a service mode prior to and during a service procedure performed within the data storage library, and further wherein at least one operational state within the at least one data storage drive is changed during the service mode. ... International Business Machines Corporation
A system, method and apparatus to acclimate a data storage component from a first environmental setting to a second environmental setting is disclosed. In one embodiment a system having a data storage library with a plurality of data storage cartridges and at least one media acclimation device having one or more storage locations which are sized to accept one or more data storage cartridges therein is disclosed. ... International Business Machines Corporation
A data storage library system includes a first data storage library and a second data storage library, and at least one pass-through mechanism coupling the first data storage library to the second data storage library, wherein the at least one pass-through mechanism is configured to enable data storage cartridges to be transported between the first data storage library and the second data storage library. The environmental conditions within the first data storage library are controllable to maintain operational conditions conducive to at least one of reading and writing of data on a plurality of data storage cartridges. ... International Business Machines Corporation
Provided are a computer program product, system, and method for releasing space allocated to a space efficient target storage in a copy relationship with a source storage. Source and target copy relationships indicate source data in the source storage to copy to target data in the target storage. ... International Business Machines Corporation
In one embodiment, a method includes determining a data record partition size based on resources used for transferring data from a higher storage tier to one or more lower storage tiers. The method also includes determining which data records stored to the higher storage tier are suitable for export to the one or more lower storage tiers, determining a distribution mapping of the first memory, the distribution mapping indicating a relative distribution of storage locations for all of the data records that are stored to the higher storage tier, identifying all sets of contiguously stored data records on the higher storage tier that are suitable for export and greater in size than the data record partition size, logically sorting, in a descending order of size, the sets of contiguously stored data records, and sending a list of logically sorted sets of contiguously stored data records to an exporter.. ... International Business Machines Corporation
A method and associated systems for identifying and correcting suboptimal storage-reclamation processes. A storage-management system uses information received in system-generated storage-reclamation reports to assign each user a set of reclamation scores. ... International Business Machines Corporation
A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. ... International Business Machines Corporation
A physical computer keyboard which includes: a circuit board having touchpoints; physical programmable, pluggable keys such that each of the keys is programmable to provide the function of each of the keys, each of the keys having interlocking elements to join with an adjoining key, each key having connectors on a bottom surface of each key to make electrical contact with the touchpoints; and display panels with one display panel on a top surface of each key, the function of each key being displayed on the display panel of each key.. . ... International Business Machines Corporation
Physical object addition and removal based on affordance and view. A method tracks eye gaze of a group of users who view an environment, the group of users each having a respective field of view to the environment. ... International Business Machines Corporation
A mechanism is provided for power capping power consumption devices with multiple power supplies. A set of power supplies supplying power to a power consumption device having stranded power is determined. ... International Business Machines Corporation
A mechanism is provided for enforcing power caps within a power consumption device with multiple power supplies. Utilizing a minimum power error value from a set of error values, the minimum power error value is multiplied by a factor k to translate the minimum power error value to an internal power error value. ... International Business Machines Corporation
A system for controlling at least one environmental condition within at least one data storage library. The system may include at least one enclosure surrounding at least a portion of at least one data storage library. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer program product, and system for directing movements of an autonomous vehicle. A vehicle operator exiting a vehicle is detected. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer program product, and system for directing movements of an autonomous vehicle. A vehicle operator exiting a vehicle is detected. ... International Business Machines Corporation
A cognitive control of a potentially hazardous item is disclosed. A user profile can be generated for the potentially hazardous item, the user profile including a risk value and a risk threshold. ... International Business Machines Corporation
A cognitive control of a potentially hazardous item is disclosed. A user profile can be generated for the potentially hazardous item, the user profile including a risk value and a risk threshold. ... International Business Machines Corporation
An intelligent switching method and system. The method includes retrieving by a computer processor of an intelligent switching device, detection data indicating that an individual is located within a specified proximity of an apparatus. ... International Business Machines Corporation
An optical structure is presented. The optical structure includes a substrate including a cavity on a first surface of the substrate. ... International Business Machines Corporation
A photonic waveguide structure may include a tapered photonic waveguide structure within a photonic substrate, such that the tapered photonic waveguide structure has a tapered region that progressively tapers in width along a longitudinal length of the tapered photonic waveguide structure. The photonic waveguide structure also includes an optical fiber waveguide having a core region and a cladding region, whereby a portion of the core region is partially exposed by removing a portion of the cladding region. ... International Business Machines Corporation
A photonic neural component including optical transmitters, optical receivers, inter-node waveguides formed on a board, multiplexers configured to multiplex input optical signals onto the inter-node waveguides, transmitting waveguides configured to receive optical signals emitted from the optical transmitters and transmit the received optical signals to the inter-node waveguides via the multiplexers, mirrors to partially reflect optical signals propagating on the inter-node waveguides, receiving waveguides configured to receive reflected optical signals produced by the mirrors and transmit the reflected optical signals to the optical receivers, and filters configured to apply weights to the reflected optical signals. The transmitting waveguides and receiving waveguides are formed on the board such that one of the transmitting waveguides and one of the receiving waveguides crosses one of the inter-node waveguides with a core of one of the crossing waveguides passing through a core or clad of the other.. ... International Business Machines Corporation
Embodiments for controlling precipitation collection vessels to accurately and efficiently collect, measure, and aggregate precipitation accumulation data are disclosed. In one embodiment according to aspects of the present invention, a computer-implemented method includes collecting snow in a plurality of collection vessels by orienting an open end of each of the plurality of collection vessels perpendicularly to a direction of the wind based at least in part on a wind model. ... International Business Machines Corporation
A method for identifying seismic horizons in digitized seismic images includes deploying a swarm of agents at an initial position in a seismic image to be analyzed, where the swarm of agents includes picking agents that define a direction for the swarm and averaging agents that smooth the direction of the swarm, identifying a direction to follow in the seismic image for each picking agent, and advancing each picking agent in the identified direction, and averaging, by the averaging agents, the directions identified by the picking agents, wherein if an information concentration measured by a picking agent at a current time step is greater than a previous time step, the picking agent keeps a previous direction, otherwise the picking agent changes direction according to the average current state of the set of averaging agents within its neighborhood.. . ... International Business Machines Corporation
A novel system that allows for 3d radar detection that simultaneously captures the lateral and depth features of a target is disclosed. This system uses only a single transceiver, a set of delay-lines, and a passive antenna array, all without requiring mechanical rotation. ... International Business Machines Corporation
A method and circuit for implementing enhanced diagnostics with intelligent pattern combination in automatic test pattern generation (atpg), and a design structure on which the subject circuit resides are provided. A random fault is selected in the design. ... International Business Machines Corporation
An optical sensor apparatus is disclosed. The apparatus comprises: a sample holder, configured to hold a sample, in operation; a probe, comprising an arrangement of luminescent quantum dots; an optical source, configured to optically excite the luminescent quantum dots; an optical detector, configured to read optical signals from the quantum dots; and a circuit. ... International Business Machines Corporation
One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: capturing a wireless signal of a target entity, wherein the wireless signal provides the direction of the target entity with respect to a traveling entity; generating a location profile for the traveling entity, wherein the generating comprises: capturing, using an image capture device, at least one image of the environment surrounding the traveling entity; and determining movement information of the traveling entity, wherein the movement information comprises directional information and speed information; determining the location of the target entity, in view of the environment surrounding the traveling entity; and providing navigation details based upon the location profile, wherein the navigation details comprise instructions for navigating from the location of the traveling entity to the location of the target entity. Other aspects are described and claimed.. ... International Business Machines Corporation
A computing device detects that an ignition switch of the vehicle was activated, wherein the vehicle includes a navigation device. The computing device requests a destination from the navigation device. ... International Business Machines Corporation
A computing device detects that an ignition switch of the vehicle was activated, wherein the vehicle includes a navigation device. The computing device requests a destination from the navigation device. ... International Business Machines Corporation
A computing device detects that an ignition switch of the vehicle was activated, wherein the vehicle includes a navigation device. The computing device requests a destination from the navigation device. ... International Business Machines Corporation
A facility is provided for controlling climate settings for a space. The facility includes ascertaining by a cognitive control, thermal-comfort-related data for one or more individuals within the space, and determining climate settings for a climate system of the space using, at least in part, the thermal-comfort-related data of the individual(s) within the space. ... International Business Machines Corporation
A method, system and computer program product for generating answers to questions. In one embodiment, the method comprises receiving an input query; conducting a search to identify candidate answers to the input query, and producing a plurality of scores for each of the candidate answers. ... International Business Machines Corporation
A fastener head adapter includes a drive portion that can be engaged by a suitable driver, and a mating portion that is configured to mate with a fastener head. The fastener head adapter is attached to a fastener head. ... International Business Machines Corporation
Materials and methods are described herein that include forming a porous polymer network with antimicrobial and antifouling properties. The antifouling portion may be a polymer, such as polyethylene glycol, and the antimicrobial portion may be a metal, or a different cationic species, such as a quaternary ammonium salt. ... International Business Machines Corporation
A process of forming a side-chain-functionalized polyhydroxyalkanoate (pha) material is disclosed. The process includes forming a pha material having a hydroxyl-terminated side-chain. ... International Business Machines Corporation
A chain-reactive, heat-generating microcapsule comprises a first compartment including a first component and a second compartment including a second component. An isolating structure separates the first and second compartments. ... International Business Machines Corporation
Clog-resistant serpentine crossflow filters and blade loading structures for micro- and nano-fluidics are provided. In one aspect, a filter includes: a substrate; and at least one layer of pillars on the substrate, wherein the pillars are arranged adjacent to one another and groups of the pillars alternate between being perpendicular and parallel to a direction of fluid flow through the filter giving the filter a serpentine configuration having at least one downstream catch. ... International Business Machines Corporation
Embodiments of the present invention relate to a device comprising a platform comprising a layer of a 2-dimensional material. The device further comprises a plurality of electrodes and one or more molecules arranged on the platform. ... International Business Machines Corporation
Embodiments of the present invention relate to a device comprising a platform comprising a layer of a 2-dimensional material. The device further comprises a plurality of electrodes and one or more molecules arranged on the platform. ... International Business Machines Corporation
An encapsulated sunscreen product that includes a polymeric shell material having a substantially spherical geometry. The shell material is a polymeric composition that includes a photosensitizer chemically bound to the polymeric composition. ... International Business Machines Corporation
Embodiments include methods, systems, and apparatus for identification, detection, and removal of cancerous cells from a patient. The apparatus includes an apparatus handle. ... International Business Machines Corporation
A request to pair a first device with a second device is received. An indication is sent from the second device to the first device. ... International Business Machines Corporation
A method, system and computer program product are disclosed for sharing a crowd sourced wireless network, wherein a first user uses a first device to access a wireless network, and the first device includes an application to grant automatically access to the wireless network to all of a defined group of people. In an embodiment, the method comprises restricting the automatic grant of access to the wireless network by, when one person of said group of people requests access to the network, a network control obtaining a determined strength of a defined relationship between the first user and that person, and granting the person access to the wireless network only if the determined strength of the defined relationship meets one or more set criteria. ... International Business Machines Corporation
A method, system and computer program product for utilizing a caller wait time. When the caller's estimated wait time exceeds a threshold amount of time, an interactive voice response (ivr) system retrieves information (e.g., caller's previous purchases) about the caller. ... International Business Machines Corporation
A method, computer program product, and system is disclosed for generating an interactive voice response (ivr) system tree. A plurality of ivr system options from the ivr system are received. ... International Business Machines Corporation
A method, computer program product, and system is disclosed for generating an interactive voice response (ivr) system tree. A plurality of ivr system options from the ivr system are received. ... International Business Machines Corporation
A method, computer program product, and a device for establishing a direct communications connection between gateways of two computing systems includes a processor(s) of a first system receiving configuration instructions in a generic format and translating the configuration instructions into a first set of gateway configuration commands that are in a format compatible with a first gateway of the first system. The processor(s) executes the first set to configure the first gateway. ... International Business Machines Corporation
A computer-implemented method tracks and maintains a record of telecommunication device events using a blockchain that is supported by a peer-to-peer network. One or more processors detect one or more events at a telecommunication device, and then transmit a transaction of the one or more events from the telecommunication device to multiple remote computing devices that are part of a peer-to-peer network, which supports a blockchain that includes a block that includes the transaction of the one or more events.. ... International Business Machines Corporation
Status information associated with a set of cloud servers is received. Each cloud server in the set has an associated cloud agent, and the status information includes available computing resources and associated resource compensation information. ... International Business Machines Corporation
A computer-implemented method records and maintains a record of browser events in a blockchain using a peer-to-peer network. One or more processors detect one or more browser events for a browser on a computer. ... International Business Machines Corporation
A mechanism is provided for blocking ip connection addresses and prefixes. Header information is extracted from an incoming connection request. ... International Business Machines Corporation
In a computer system implemented method for generating an authorized response to a message in a network, the computer system detects a message sent by an originator via a network. The computer system selects a group of users to contribute to the authorized response to the message based on the computer system analyzing the message. ... International Business Machines Corporation
In a computer system implemented method for generating an authorized response to a message in a network, the computer system detects a message sent by an originator via a network. The computer system selects a group of users to contribute to the authorized response to the message based on the computer system analyzing the message. ... International Business Machines Corporation
An anonymized biometric representation of a target individual is used in a computer based security system. The system receives a record of a target individual containing a weakened biometric representation of a detailed biometric signal of the target individual. ... International Business Machines Corporation
A method, a device and a computer program product are provided. A networked device determines whether a condition occurred. ... International Business Machines Corporation
A computer-implemented method, computer program product, and computing system is provided for encrypted document co-editing. In an implementation, a method may include receiving, at a first computing device, a first encrypted change set for a co-editable data object from a client, the first encrypted change set being encrypted by a first key. ... International Business Machines Corporation
A method, system and computer program product for improving the quality of the posts in a social network. A topic of a post to a social network environment is identified using natural language processing. ... International Business Machines Corporation
A tool for managing message notifications in a computing environment includes a computer determining a user receives a notification of a first message received in a collaboration application on a computing device of the user, and determining a topic for the first message. The computer then determines whether the user suppresses the notification of the first message by determining whether a gesture received from the user corresponds to a gesture map stored for the collaboration application, and if so, the computer stores the topic for the first message associated with an indication the user suppressed the notification. ... International Business Machines Corporation
A tool for managing message notifications in a computing environment includes a computer determining a user receives a notification of a first message received in a collaboration application on a computing device of the user, and determining a topic for the first message. The computer then determines whether the user suppresses the notification of the first message, and if so, the computer stores the topic for the first message associated with an indication the user suppressed the notification for the collaboration application. ... International Business Machines Corporation
The system, method, and computer program product described herein provide automatic scaling of resources allocated to microservices based on projected demand data received from consumers of the microservices. In an aspect of the present disclosure, a method for scaling up or down a capacity allocated to a microservice is disclosed. ... International Business Machines Corporation
The present invention provides a method and system for distributing resources for operating applications within a network by determining a composite resource consumption of the network of resources distributed throughout the network, and determining minimum, maximum and average values of each of the resources required to operate the applications. When an application is introduced into, or removed from, the network, then a change in the composite resource consumption of the network is determined and a software patch is generated to adjust resource distribution throughout the network so that resource allocation to active applications is normalized for optimal operation.. ... International Business Machines Corporation
Embodiments of the present invention include methods, systems, and computer program products for packet forwarding. Aspects of the invention include receiving, from a source node, a first network queue in a set of network queues, wherein the first network queue includes one or more minimum network traffic performance requirements. ... International Business Machines Corporation
Embodiments of the present invention include methods, systems, and computer program products for packet forwarding. Aspects of the invention include receiving, from a source node, a first network queue in a set of network queues, wherein the first network queue includes one or more minimum network traffic performance requirements. ... International Business Machines Corporation
A personal digital assistant device includes: a memory storing an interactive personal digital assistant program and a processor configured to execute the interactive personal digital assistant program. The interactive personal digital assistant program performs an operation to determine whether the service provider is automated or is not automated. ... International Business Machines Corporation
A method is provided that includes accessing, by a debugging device associated with an external user device, (i) a serial console of a hardware network device, and (ii) a management ethernet port of the hardware network device. The method includes providing, by the debugging device, (i) a serial console interface from the serial console of the hardware network device to the external user device, and (ii) a management ethernet interface from the management ethernet port of the hardware network device to the external user device. ... International Business Machines Corporation
In a method for providing an automatic learned response in a network, a collection system observes user responses to the incoming system indicators and to parameter types and associated parameter values used in the user responses. The collection system creates alert event entries to includes the incoming system indicators, confidence thresholds, the user responses, and the parameter types and associated parameter values used in the user responses. ... International Business Machines Corporation
A network switching system and method and a computer program product for operating a network switch are disclosed. The network switch includes a multitude of input ports and a multitude of output ports. ... International Business Machines Corporation
A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement an offensive action management system for acting on offensive messages in a communication platform. A message monitoring component of the offensive action management system monitors messages posted to the communication platform. ... International Business Machines Corporation
A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement an offensive action management system for acting on offensive messages in a communication platform. A message monitoring component of the offensive action management system monitors messages posted to the communication platform. ... International Business Machines Corporation
A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce. ... International Business Machines Corporation
Embodiments are directed to a computer-implemented method and system for generating a transport key. A method can include generating, using a processor, a key agreement pair comprising a public agreement key and a private agreement key in a second element. ... International Business Machines Corporation
Provided are a computer program product, system, and method for generating public/private key pairs to deploy public keys at computing devices to verify digital signatures. A plurality of public-private key pairs are generated to store in a key store. ... International Business Machines Corporation
Provided are a computer program product, system, and method for using public keys provided by an authentication server to verify digital signatures. A plurality of public keys from a plurality of public-private key pairs and stored in a local key store. ... International Business Machines Corporation
A method includes retrieving a decode threshold number of encoded data slices, wherein codecs process, in an order, a data segment and the processed data segment is encoded into a set of encoded data slices. The method further includes decoding the decode threshold number of encoded data slices to recover the processed data segment. ... International Business Machines Corporation
Switchable and/or tunable filters, methods of manufacture and design structures are disclosed herein. The method of forming the filters includes forming at least one piezoelectric filter structure comprising a plurality of electrodes formed to be in contact with at least one piezoelectric substrate. ... International Business Machines Corporation
A method is presented for establishing a top contact to a magnetic tunnel junction (mtj) device, the method including selectively etching, via a first etching process, an oxide layer to expose a top surface of a nitride layer of a dummy fill shape and selectively etching, via a second etching process, a top portion of the nitride layer of the dummy fill shape to expose a top surface thereof. The method further includes selectively etching, via the second etching process, the oxide layer to expose a top surface of a nitride layer of the mtj device, and selectively etching, via the first etching process, a top portion of the nitride layer of the mtj device to expose a top surface thereof such that a height of the mtj device is approximately equal to a height of the dummy fill shape.. ... International Business Machines Corporation
A method is presented for establishing a top contact to a magnetic tunnel junction (mtj) device, the method including selectively etching, via a first etching process, an oxide layer to expose a top surface of a nitride layer of a dummy fill shape and selectively etching, via a second etching process, a top portion of the nitride layer of the dummy fill shape to expose a top surface thereof. The method further includes selectively etching, via the second etching process, the oxide layer to expose a top surface of a nitride layer of the mtj device, and selectively etching, via the first etching process, a top portion of the nitride layer of the mtj device to expose a top surface thereof such that a height of the mtj device is approximately equal to a height of the dummy fill shape.. ... International Business Machines Corporation
Magnetic regions of at least one of chiplet or a receiving substrate are used to permit magnetically guided precision placement of chiplets on the receiving substrate. In some embodiments, a scanning magnetic head can be used to release individual chiplets from a temporary support substrate to the receiving substrate. ... International Business Machines Corporation
Photodiode structures and methods of manufacture are disclosed. The method includes forming a waveguide structure in a dielectric layer. ... International Business Machines Corporation
A photovoltaic device and method include a crystalline substrate and an emitter contact portion formed in contact with the substrate. A back-surface-field junction includes a homogeneous junction layer formed in contact with the crystalline substrate and having a same conductivity type and a higher active doping density than that of the substrate. ... International Business Machines Corporation
At least one semiconductor nanowire laterally abutted by a pair of semiconductor pad portions is formed over an insulator layer. Portions of the insulator layer are etched from underneath the at least one semiconductor nanowire such that the at least one semiconductor nanowire is suspended. ... International Business Machines Corporation
A method of forming a vertical transport fin field effect transistor, including, forming a bottom source/drain layer at the surface of the substrate, forming one or more channels on the bottom source/drain layer, where the channels extend away from the bottom source/drain layer, forming a gate structure on each of the one or more channels, and forming a top source/drain segment on the top surface of each of the one or more channels, wherein either each of the top source/drain segments or the bottom source/drain layer has a larger bandgap than the other of the bottom source/drain layer or each of the top source/drain segments.. . ... International Business Machines Corporation
The present invention relates generally to semiconductor devices and more particularly, to a structure and method of forming a fin using double trench epitaxy. The fin may be composed of a iii-v semiconductor material and may be grown on a silicon, silicon germanium, or germanium substrate. ... International Business Machines Corporation
A method is presented for forming a semiconductor structure. The method includes forming a fin structure over a substrate, forming a dummy gate over the fin structure, and etching the dummy gate by a first amount to expose a top portion of the fin structure. ... International Business Machines Corporation
A method is presented for forming a nanosheet metal oxide semiconductor field effect transistor (mosfet) structure. The method includes forming a heteroepitaxial film stack including at least one sacrificial layer and at least one channel layer, patterning the heteroepitaxial film stack, forming a dummy gate stack with sidewall spacers, and forming a cladded or embedded epitaxial source/drain material along the patterned heteroepitaxial film stack sidewalls. ... International Business Machines Corporation
A method of forming a transistor in an integrated circuit device can include forming a first and second nanosheet structure with alternating sheets of silicon and silicon germanium. A first and second transistor structure are constructed using the first and second nanosheet structures as first and second channels. ... International Business Machines Corporation
Methods are provided for fabricating a semiconductor junction. A first semiconductor structure is selectively grown in a nanotube, which extends laterally over a substrate, from a seed extending within the nanotube. ... International Business Machines Corporation
The disclosure relates to a structure and methods of forming spacers for trench epitaxial structures. The method includes: forming a spacer material between source and drain regions of respective first-type gate structures and second-type gate structures; growing source and drain material about the first-type gate structures, confined within an area defined by the spacer material; and growing source and drain material about the second-type gate structures, confined within an area defined by the spacer material.. ... International Business Machines Corporation
The disclosure relates to a structure and methods of forming spacers for trench epitaxial structures. The method includes: forming a spacer material between source and drain regions of respective first-type gate structures and second-type gate structures; growing source and drain material about the first-type gate structures, confined within an area defined by the spacer material; and growing source and drain material about the second-type gate structures, confined within an area defined by the spacer material.. ... International Business Machines Corporation
Disclosed herein are processes and structures for uniform sti recessing. A method of making a semiconductor device includes initially forming a dense region of at least two fins on a substrate. ... International Business Machines Corporation
A method of forming a self-aligned pattern of vias in a semiconductor device comprises etching a pattern of lines that contain notches that are narrower than other parts of the line. Thereafter, vias are created where the notches are located. ... International Business Machines Corporation
After forming an interlevel dielectric (ild) layer over a semiconductor material portion located on a substrate, a gate trench is formed extending through the ild layer to expose a channel region of the semiconductor material portion. A gate structure is then formed within the gate trench. ... International Business Machines Corporation
Device and methods are provided for fabricating semiconductor devices in which metal-insulator-metal (mim) capacitor devices are integrally formed with vertical field effect transistor (fet) devices. For example, a semiconductor device includes first and second vertical fet devices, and a capacitor device, formed in different device regions of a substrate. ... International Business Machines Corporation
Apparatus including: memory cell unit(s) having a variable-resistance channel component (cc) extending between first and second supply terminals for supplying read and write (r/w) signals to the unit in respective r/w modes, and resistive memory elements (rmes) arranged along the cc, rme includes resistive memory material (rmm), extending along a respective channel segment (chs) of the cc in contact therewith, in which respective lengths along that chs of high- and low-resistance regions is variable in write mode, and a gate terminal provided on that chs for controlling resistance of the chs in response to control signal(s) (cs) applied to the gate terminal; and circuitry configured to apply the cs such that, in read mode, a rme(s) is selected by applying a cs producing chs with resistance between the resistance regions of the rmm; and remaining rme(s) are deselected by applying cs producing chs having resistance less than the low-resistance region.. . ... International Business Machines Corporation
Techniques are disclosed for performing a computer-implemented processing of slide presentation videos to automatically generate index locations corresponding to particular slides within a slide presentation video. In embodiments, a slide presentation video is uploaded to a video processing system. ... International Business Machines Corporation
An apparatus according to one embodiment includes a head having at least two modules, each of the modules having an array of transducers and at least one servo transducer. An axis of each array is defined between opposite ends thereof. ... International Business Machines Corporation
Embodiments of the invention include method, systems and computer program products for role modeling. Aspects of the invention include receiving, by a processor, audio data, wherein the audio data includes a plurality of audio conversation for one or more speakers. ... International Business Machines Corporation
A computer-implemented method for learning a policy for selection of an associative topic, which can be used in a dialog system, is described. The method includes obtaining a policy base that indicates a topic transition from a source topic to a destination topic and a short-term reward for the topic transition, by analyzing data from a corpus. ... International Business Machines Corporation
A computer-implemented method for learning a policy for selection of an associative topic, which can be used in a dialog system, is described. The method includes obtaining a policy base that indicates a topic transition from a source topic to a destination topic and a short-term reward for the topic transition, by analyzing data from a corpus. ... International Business Machines Corporation
An embodiment of the invention provides a system and method for a transaction system supporting universal ticket solutions for transportation. A fund managing device determines whether a first fund of an account of a user has sufficient credit to satisfy a transportation fee imposed by a first city. ... International Business Machines Corporation
A virtual reality processor-based system and computer implemented method that morphs an individual's personal characteristics, including appearance, voice, speech behavior, movement behavior, physical agility and expressionable ideas, so that people can have a more realistic sensation as they move in the past and future. The personal avatar morphed to a time in the past is based on interpolating the personal characteristics information and the avatar morphed to a time in the future is based on extrapolating the personal characteristics information. ... International Business Machines Corporation
One or more embodiments provide method for image distortion correction including receiving, by multiple neurosynaptic core circuits, a set of inputs comprising image dimensions and pixel distortion coefficients for at least one image frame via at least one input core circuit. Each distorted pixel is mapped to zero or more undistorted pixels by processing the set of inputs corresponding to each pixel of the at least one image frame by the at least one input core circuit. ... International Business Machines Corporation
One or more embodiments provide a neurosynaptic circuit that includes multiple neurosynaptic core circuits that: perform image distortion correction by converting a source image to a destination image by: taking as input a sequence of image frames of a video with one or more channels per frame, and converting dimensions and pixel distortion coefficients of each frame as one or more corresponding neuronal firing events. Each distorted pixel is mapped to zero or more undistorted pixels by processing each neuronal firing event corresponding to each pixel of each image frame. ... International Business Machines Corporation
The present invention provides a computer implemented method, system, and computer program product of deep learning via dynamic root solvers. In an embodiment, the present invention includes (1) forming an initial set of gpus into an initial binary tree architecture, where the initial set includes initially idle gpus and an initial root solver gpu as the root of the initial binary tree architecture, (2) calculating initial gradients and initial adjusted weight data, (3) choosing a first currently idle gpu as a current root solver gpu, (4) forming a current set of gpus into a current binary tree architecture, where the current set includes the additional currently idle gpus and the current root solver gpu as the root of the current binary tree architecture, (5) calculating current gradients and current adjusted weight data, and (6) transmitting an initial update to the weight data to the available gpus.. ... International Business Machines Corporation
The present invention provides a computer implemented method, system, and computer program product of deep learning via dynamic root solvers. In an embodiment, the present invention includes (1) forming an initial set of gpus into an initial binary tree architecture, where the initial set includes initially idle gpus and an initial root solver gpu as the root of the initial binary tree architecture, (2) calculating initial gradients and initial adjusted weight data, (3) choosing a first currently idle gpu as a current root solver gpu, (4) forming a current set of gpus into a current binary tree architecture, where the current set includes the additional currently idle gpus and the current root solver gpu as the root of the current binary tree architecture, (5) calculating current gradients and current adjusted weight data, and (6) transmitting an initial update to the weight data to the available gpus.. ... International Business Machines Corporation
The present invention provides a computer implemented method, system, and computer program product of deep learning via dynamic root solvers. In an embodiment, the present invention includes (1) forming an initial set of gpus into an initial binary tree architecture, where the initial set includes initially idle gpus and an initial root solver gpu as the root of the initial binary tree architecture, (2) calculating initial gradients and initial adjusted weight data, (3) choosing a first currently idle gpu as a current root solver gpu, (4) forming a current set of gpus into a current binary tree architecture, where the current set includes the additional currently idle gpus and the current root solver gpu as the root of the current binary tree architecture, (5) calculating current gradients and current adjusted weight data, and (6) transmitting an initial update to the weight data to the available gpus.. ... International Business Machines Corporation
Systems and associated methods are provided that aggregated data from a variety of sources, the data pertaining to an incident. The aggregated data is analyzed and the credibility of the incident report is determined. ... International Business Machines Corporation
Systems and associated methods are provided that aggregated data from a variety of sources, the data pertaining to an incident. The aggregated data is analyzed and the credibility of the incident report is determined. ... International Business Machines Corporation
A model trading method, system, and computer program product include extracting a feature-model list from a first application and a feature-model list from a second application on a device, creating a price model for a price for each feature-model of the feature-model list of the second application that matches a feature-model of the feature-model list for the first application, and facilitating feature-model trading between the first application and the second application based on the feature-model list and the price model.. . ... International Business Machines Corporation
Embodiments of the invention include method, systems and computer program products for selecting a service. Aspects include includes receiving, by a processor, customer data. ... International Business Machines Corporation
A mechanism is provided for dynamically evaluating fraud risk. Responsive to receiving a notification, a set of indicators associated with a focal object are automatically analyzed to form a combined assessment. ... International Business Machines Corporation
A computer-implemented method for identifying a problem from unstructured input includes executing on a computer processor the step of identifying context of a problem description from a service support k ticket which adds one or more tags to the service support ticket, each tag corresponding to an end-user symptom within the problem domain. Intent is mapped according to a machine learning model and the one or more tags which identifies a problem and a confidence measure.. ... International Business Machines Corporation
A computer-implemented method, system, and computer program product for optimizing analytics selection to detect fraud retrieves, from an electronic database, historical data on a plurality of available fraud detection analytics, the historical data including service times and risk levels associated with the fraud detection analytics, and analyzes the historical data to form a fraud detection analytics optimization model. A required service time for the transaction is determined based on information about the requester and the transaction, and the fraud detection analytics optimization model is used to select, from a plurality of available fraud detection analytics, a fraud detection analytic with a lowest risk level predicted to execute within the required service time. ... International Business Machines Corporation
One embodiment provides an apparatus, including: a sensor subsystem comprising i) a plurality of sensors that collect information about the apparatus' immediate environment and ii) at least one agent that fuses and interprets the collected information; a model subsystem comprising i) a plurality of models, including a model for each of the apparatus' immediate environment, sentient beings, and the apparatus itself, the models receiving the collected information and storing other information and ii) at least one agent that uses the collected information and the stored other information to deduce information about the apparatus' immediate environment; an actuator subsystem comprising a plurality of actuators that interact with the apparatus' immediate environment based upon the collected information and the information deduced by the model subsystem; and an agency subsystem comprising a plurality of agents that carry out plans according to goals identifying at least one desired outcome in relation to the apparatus' immediate environment.. . ... International Business Machines Corporation
A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to: identify, by the processor, key concepts in a domain ontology, and use, by the processor, the key concepts to create a rich entity. Identifying the key concepts includes performing centrality analysis of concepts extracted from the domain ontology. ... International Business Machines Corporation
A processing unit topology of a neural network including a plurality of processing units is determined. The neural network includes at least one machine in which each machine includes a plurality of nodes, and wherein each node includes at least one of the plurality of processing units. ... International Business Machines Corporation
Triage of training data for acceleration of large-scale machine learning is provided. In various embodiments, training input from a set of training data is provided to an artificial neural network. ... International Business Machines Corporation
A technique relates a resistive processing unit (rpu) array. A set of conductive column wires are configured to form cross-points at intersections between the set of conductive row wires and a set of conductive column wires. ... International Business Machines Corporation
A method, computer system, and a computer program product for analyzing a crowd using a plurality of images captured by an aerial drone is provided. The present invention may include determining a geographic area associated with the crowd. ... International Business Machines Corporation
A method, computer system, and a computer program product for analyzing a crowd using a plurality of images captured by an aerial drone is provided. The present invention may include determining a geographic area associated with the crowd. ... International Business Machines Corporation
A method of inputting an action to a computer device using a fingerprint recognition sensor placed on a thumb of a user. The method including: setting a plurality of actions corresponding to fingerprint data from a user's fingerprint patterns; storing the plurality of actions corresponding to the fingerprint data in the computer device; reading fingerprint data by the fingerprint recognition sensor corresponding to the user's fingerprint patterns from a first finger placed in contact with the fingerprint recognition sensor; comparing the fingerprint pattern from the first finger with the user's fingerprint data stored in the computer device; and responsive to a match between the fingerprint pattern from the first finger and the user's fingerprint data stored in the computer device, initiating the action stored in the computer device corresponding to the first finger placed in contact with the fingerprint recognition sensor.. ... International Business Machines Corporation
A semiconductor device includes a plurality of transistors on a substrate, each transistor of the plurality of transistors including a doped nanowire channel region, where the plurality of transistors are grouped into a plurality of transistor groups each including two transistors of the plurality of transistors, and where each transistor group is assigned a state based on an electrical characteristic of each transistor in each transistor group. The semiconductor device also includes a security code for the plurality of transistors generated by grouping together the states corresponding to each transistor group.. ... International Business Machines Corporation
Embodiments for performing self-contained, consistent data masking in a distributed computing environment by a processor. A data masking operation is performed on one or more datasets in one of a plurality of data formats such that a key of each value of each key-value pair representing a common set of columns or paths for the one or more datasets is masked.. ... International Business Machines Corporation
For presenting a data instance based on data rules, a processor retrieves a data unique identifier from a data instance. The processor further identifies each person associated with the data instance. ... International Business Machines Corporation
Embodiments of the invention include methods, systems, and computer program products for determining stroke onset. Aspects of the invention include determining a baseline behavioral model for a user and receiving real-time user data from a personal portable device. ... International Business Machines Corporation
A method is provided including receiving data corresponding to a three-dimensional physical representation of a porous rock sample; calculating a low-dimensional representation of a pore network in the porous rock sample based on the three-dimensional physical representation; extracting one or more geometrical parameter from the low-dimension representation; generating a capillary network model of the porous rock sample based at least on the at least one geometrical parameter for simulating fluid flow inside the porous rock sample; and performing at least one simulation of a flow of the fluid through the capillary network model of the porous rock sample with a fluid additive to provide a predicted enhanced fluid recovery efficiency.. . ... International Business Machines Corporation
A method for processing a help desk ticket comprising a problem description is provided. The method includes receiving the ticket submitted by a user of a help desk system. ... International Business Machines Corporation
An administrator may wish to limit the number of tuples that may be spawned as a result of a first tuple entering an operator graph. A first stream operator may receive a first tuple in order to perform an operation on the first tuple to generate a second tuple. ... International Business Machines Corporation
A system creates a query name bitmap signature comprising at least one bigram for a query name. The system calculates a query name bitmap range for the query name based on a match threshold and a number of bigrams in the query name bitmap signature. ... International Business Machines Corporation
Techniques facilitating iterative widening search for designing chemical compounds are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, an indication of a constrained structure portion of a chemical compound and a first unconstrained structure portion of the chemical compound. ... International Business Machines Corporation
Techniques facilitating iterative widening search for designing chemical compounds are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, an indication of a constrained structure portion of a chemical compound and a first unconstrained structure portion of the chemical compound. ... International Business Machines Corporation
In response to an i/o request, a processor reconstructs a file system request by laying out a disk image, performing type-specific introspection on the disk image including determining disk image type and using a file system specific process for a particular type of file system located in the disk image for analyzing the disk image structure.. . ... International Business Machines Corporation
Mechanisms are provided for assembling natural language user inputs into questions for a question-and-answer (qa) system. The mechanisms initialize a timer to a threshold amount of time, receive a first input of content-bearing natural language from a user computing device, and initiate running of the timer in response. ... International Business Machines Corporation
Mechanisms are provided for assembling natural language user inputs into questions for a question-and-answer (qa) system. The mechanisms initialize a timer to a threshold amount of time, receive a first input of content-bearing natural language from a user computing device, and initiate running of the timer in response. ... International Business Machines Corporation
Computational storage techniques for distribute computing are disclosed. The computational storage server receives input from multiple clients, which is used by the server when executing one or more computation functions. ... International Business Machines Corporation
Disclosed aspects relate to cache management in a stream computing environment that uses a set of many-core hardware processors to process a stream of tuples by a plurality of processing elements which operate on the set of many-core hardware processors. The stream of tuples to be processed by the plurality of processing elements which operate on the set of many-core hardware processors may be received. ... International Business Machines Corporation
Disclosed aspects relate to cache management in a stream computing environment that uses a set of many-core hardware processors to process a stream of tuples by a plurality of processing elements which operate on the set of many-core hardware processors. The stream of tuples to be processed by the plurality of processing elements which operate on the set of many-core hardware processors may be received. ... International Business Machines Corporation
Disclosed aspects relate to cache management in a stream computing environment that uses a set of many-core hardware processors to process a stream of tuples by a plurality of processing elements which operate on the set of many-core hardware processors. The stream of tuples to be processed by the plurality of processing elements which operate on the set of many-core hardware processors may be received. ... International Business Machines Corporation
A method and system for testing performance of a software product. One or more complete executions of a performance test of corresponding versions of the software product are performed. ... International Business Machines Corporation
Aspects include detecting, by an agent of a remote debugging tool that a first controller currently associated with the agent for a debugging session has not responded to a status inquiry from the agent. The first controller interacts with an end user, sends requests to the agent to operate a target program, and processes responses from the agent. ... International Business Machines Corporation
The present disclosure relates to techniques for discovering and exposing middleware applications as service endpoints through a universal connector in a middleware-agnostic fashion that does not require additional coding. In one embodiment, a back-end middleware system identifies a set of middleware applications that operate on an input/output (i/o) data area. ... International Business Machines Corporation
Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Corporation
Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Corporation
Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Corporation
Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Corporation
A method for cognitive screen sharing protection is provided. The method may include, in determining a screen sharing session of a client computing device associated with a user has been initiated, receiving, by a processor, a plurality of pertinent state data associated with the client computing device. ... International Business Machines Corporation
A method for cognitive screen sharing protection is provided. The method may include, in determining a screen sharing session of a client computing device associated with a user has been initiated, receiving, by a processor, a plurality of pertinent state data associated with the client computing device. ... International Business Machines Corporation
A mechanism is provided for use with a set of images including a first image, with each image of the set of images respectively representing a computer and respectively including software and configuration settings data. The mechanism deploys a plurality of first image instantiations of the first image for respective use by a plurality of users. ... International Business Machines Corporation
An instruction stream includes a transactional code region. The transactional code region includes a latent modification instruction (lmi), a next sequential instruction (nsi) following the lmi, and a set of target instructions following the nsi in program order. ... International Business Machines Corporation
An instruction defined to be a looping instruction is obtained and processed. A determination is made as to whether an obtained selected character is an expected selected character. ... International Business Machines Corporation
A selected boundary of memory to be used in processing an instruction is dynamically selected, based on a predictor. The instruction is decoded, and the decoding provides a sequence of operations to perform a specified operation. ... International Business Machines Corporation
An instruction defined to be a looping instruction is obtained and processed. A determination is made as to whether an obtained selected character is an expected selected character. ... International Business Machines Corporation
Dynamically selecting a version of an instruction to be executed. Based on processing, a version of an instruction to be executed is selected. ... International Business Machines Corporation
An instruction architecturally defined to be a looping instruction, in which a loop is configured to repeat a plurality of times to perform an operation on up to a defined number of units of data, is to be processed. The processing includes replicating a selected character a number of times to provide a replicated selected character, and using a sequence of operations to perform the operation, the sequence of operations replacing the loop and providing a non-looping sequence to perform the operation on up to the defined number of units of data. ... International Business Machines Corporation
Move string processing via inline decode-based micro-operations expansion. An instruction is obtained, and the instruction, which is to perform a move string operation, is decoded. ... International Business Machines Corporation
Compare string processing via inline decode-based micro-operations expansion. An instruction, which is to perform a compare string operation, is decoded. ... International Business Machines Corporation
An instruction defined to be a looping instruction that repeats a plurality of times to perform an operation on a defined amount of data is obtained. The looping instruction is expanded into a sequence of operations. ... International Business Machines Corporation
Aspects of the present invention provide an approach for performing a computer program update on a target computer. In an embodiment, a target computer having a location, a user, a computer program, and a computer program update is determined. ... International Business Machines Corporation
A computer-implemented method for deploying a build output package to a user includes: receiving a software build having a plurality of data sets and having a build version in a build output storage component; labeling each data set in the plurality of data sets with a unique identifier; receiving a package request requesting one or more data sets associated with the build version; building a package manifest that includes the unique identifier upon receiving the package request; copying each of the requested data sets and combining each of the copied data sets into a build output package based upon the package manifest, the copying and combining commencing upon building or completion of the package manifest; sending a copy of the build output package to the user; and deleting the build output package from the storage component in response to sending the copy of the build output package to the user.. . ... International Business Machines Corporation
Computer-implemented methods are provided for compiling a parallel loop and generating graphics processing unit (gpu) code and central processing unit (cpu) code for writing an array for the gpu and the cpu. A method includes compiling the parallel loop by (i) checking, based on a range of array elements to be written, whether the parallel loop can update all of the array elements and (ii) checking whether an access order of the array elements that the parallel loop reads or writes is known at compilation time. ... International Business Machines Corporation
Computer-implemented methods are provided for compiling a parallel loop and generating graphics processing unit (gpu) code, and central processing unit (cpu) code for writing an array for the cpu and the cpu. A method includes compiling the parallel loop by (i) checking, based on a range of array elements to be written, whether the parallel loop can update all of the array elements and (ii) checking whether an access order of the array elements that the parallel loop reads or writes is known at compilation time. ... International Business Machines Corporation
A circuit is provided which includes arithmetic computation logic configured to add or subtract operands of variable length to produce a result in a sign-magnitude data format. The circuit also includes an overflow detector to provide an overflow signal indicative of whether the result fits within a specified result length l. ... International Business Machines Corporation
A computer-implemented method includes identifying a storage reallocation plan associated with a primary storage volume, a secondary storage volume, and one or more client computing devices; determining a systematic importance indicator associated with the primary storage volume; and determining a systematic connectivity indicator associated with the storage reallocation plan and the one or more client computing devices. The computer-implemented method further includes determining a storage reallocation conclusion based on the systematic importance indicator and the systematic connectivity indicator. ... International Business Machines Corporation
A method is provided for managing memory allocation in a database. The method determines a preferred statement among defined statements with defined sizes of objects. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer program product, and system for allocating memory. A computer receives a request for memory to be allocated to a computer node and determines if the allocation request needs to be carried out on a cluster level, a server rack level, or on a server level. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer program product, and system for allocating memory. A computer receives a request for memory to be allocated to a computer node and determines if the allocation request needs to be carried out on a cluster level, a server rack level, or on a server level. ... International Business Machines Corporation
A computer system includes memory and a processor configured to manage memory allocation. Aspects include receiving a request to execute a computer program and obtaining a learned data file for the computer program, the learned data file including a history of memory allocation requests and memory access requests by the computer program. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer program product, and system for allocating memory. A computer receives a request for memory to be allocated to a computer node and determines if the allocation request needs to be carried out on a cluster level, a server rack level, or on a server level. ... International Business Machines Corporation
Management of storage used by pageable guests of a computing environment is facilitated. A query instruction is provided that details information regarding the storage location indicated in the query. ... International Business Machines Corporation
A determination is made that data stored in an extent of a first storage resource is to be moved to an extent of a second storage resource. Operations that are still awaiting to start execution in the first storage resource after the data stored in the extent of the first storage resource has been moved to the extent of the second storage resource, are configured for execution in the second storage resource.. ... International Business Machines Corporation
Various embodiments for managing data by a processor in a multi-tiered computing storage environment. Based on input/output (i/o) statistics, a ranking mechanism is applied to differentiate data between at least a cache rank and a solid state drive (ssd) rank. ... International Business Machines Corporation
A method, computer program product, and system for contextual determination of emotion icons. The method includes, for a particular user, determining an emotion icon to automatically input into a message, based on a class of the user, a current mood of the user, and the recipient of the message. ... International Business Machines Corporation
A system, method and program product for implementing a simplified touch screen interface for collecting character data. A device is disclosed having a touch screen interface, wherein the touch screen interface includes: a primary view that displays rotating character sets, wherein each one of the character sets sequentially rotates into an active position, and wherein a character set in the active position is selectable in response to a first touch to a uniform input region; a secondary view that displays rotating characters, wherein each one of the rotating characters sequentially rotates into the active position, and wherein a character in the active position is selectable in response to a second touch to the uniform input region; and wherein the rotating characters displayed in the secondary view are determined based on the character set selected in the primary view.. ... International Business Machines Corporation
In an approach to non-functional requirement stimulus testing of a robot, one or more computer processors receive one or more stimulus parameters to test. The one or more computer processors trigger the one or more stimulus parameters in the robot. ... International Business Machines Corporation
Embodiments for estimating ice formation and depth by a processor. Ice formation and ice depth of a selected region of water may be cognitively forecasted using a prediction model such that the prediction model identifies similar characteristics between the selected region of water and one or more alternative regions of water by analyzing content of one or more data sources associated with an ontology of concepts representing a domain knowledge related to the selected region of water and the one or more alternative regions.. ... International Business Machines Corporation
Techniques relate to an interactive logic diagnostic process. A diagnostic iteration loop is performed. ... International Business Machines Corporation
A probe head that contains a coining surface and a plurality of probe tips integrated on a same side of the probe head is provided. The probe head has a first portion and a laterally adjacent second portion, wherein the first portion of the probe head contains the coining surface, and the second portion of the probe head contains the plurality of the probe tips. ... International Business Machines Corporation
A biosensor calibration structure is provided that includes at least two electrode structures in which at least one of the electrode structures has a non-random nanopattern on the sensing surface which provides a different sensing surface area than at least one other electrode structure. The at least one other electrode structure may be non-patterned (i.e., flat) or have another non-random nanopattern on the sensing surface. ... International Business Machines Corporation
Embodiments of the invention are directed to a method for determining a pseudo location of a user. The method includes collecting, by a processing device, ultraviolet (uv) sensor data from a uv sensor of a user device of the user. ... International Business Machines Corporation
A computer-implemented method and system for providing unidirectional traffic flow distributions. The method includes generating a directed graph representing a position of a vehicle and a road network within a predetermined distance of the position of the vehicle, wherein vertices represent decision points along an edge and edges represent route segments between adjacent vertices, determining a plurality of travel routes within the directed graph by estimating a shortest path and at least one index for each edge in the directed graph, wherein each travel route includes one or more edges, selecting a travel route from the plurality of travel routes, and outputting unidirectional traffic information for edges included along the travel route.. ... International Business Machines Corporation
A cognitive illumination system is provided. The cognitive illumination system includes a light source communicatively coupled to a servomechanism, wherein the servomechanism is configured to manipulate the light source in space, a tracking assembly configured to capture and track objects in the space and a processor communicatively coupled to the light source, the servomechanism and the tracking assembly. ... International Business Machines Corporation
A method is provided including calculating a first property vector indicative of physical properties derived from a digital image of a first rock sample; determining a set of one or more similar rock samples by calculating a value indicating a similarity between the first rock sample and second rock samples based on the first property vector and second property vectors associated with the second rock samples; selecting a list of fluid additives based on existing enhanced fluid recovery efficiency values associated with the similar rock samples; performing, for each of the fluid additives, a simulation of a flow of fluid through a digital model of the first rock to determine a simulated enhanced fluid recovery efficiency value for the respective fluid additives; and outputting an optimal fluid additive for the first rock sample based at least in part on the calculated similarity values and simulated enhanced fluid recovery efficiency values.. . ... International Business Machines Corporation
Embodiments provide a method and device that enables automatic selection of settings for ironing one or more pieces of fabric. A digital camera on an ironing device captures an image of a fabric. ... International Business Machines Corporation
Embodiments of the disclosure generally provide compositions and methods involving the production of polyester composite materials that contain covalently bonded carbon black particles. The carbon black particles have surface functional groups that enable the grafting of a polyester, and/or initiate the ring opening of a monomer to create a polyester grown from the surface of the particle.. ... International Business Machines Corporation
In an approach to non-functional requirement testing of a robot, a computer determines one or more kinematic actions included in a received command. The computer determines at least one component of the robot included in an operation of the one or more kinematic actions. ... International Business Machines Corporation
A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Corporation
A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Corporation
A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Corporation
A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Corporation
Consultation advice based on ongoing user monitoring is provided. In various embodiments, first physiological data of a user is collected by a wearable device for a first time period. ... International Business Machines Corporation
An apparatus for a dust guard structure includes a particle guard coupled to a top surface of a circuit board, wherein the particle guard is located along a first side of the circuit board between an edge of the circuit board and a first electronic component. The dust guard structure further includes the first electronic component electrically coupled to the circuit board via one or more electronic connections, wherein a height of the particle guard is greater than a height of each of the one or more electrical connections of the first electronic component. ... International Business Machines Corporation
Embodiments include techniques for contextual switch from a wireless communication to human body near-field communication for power savings, the technique includes determining, via a processor, a configuration of devices for a user, the devices include wearable devices and mobile devices. The techniques include identifying a cluster of the devices, and determining a current activity and location of the user based on an indication from at least one of the devices. ... International Business Machines Corporation
A system and method of locating a wireless connection among a plurality of possible wireless connections. More particularly, a system and method of locating a user preferred wireless connection among a plurality of possible wireless connections. ... International Business Machines Corporation
A computer-implemented method includes: monitoring, by a user device, calling activity on the user device; detecting, by the user device and based on the monitoring, that a call has started on the user device; providing, by the user device, a pause instruction to an assistant device based on detecting that the call has started on the user device, causing the assistant device to disable speech response functions; detecting, by the user device and based on the monitoring, that the call has ended on the user device; and providing, by the user device, a resume instruction to the assistant device based on detecting that the call has ended on the user device, causing the assistant device to resume speech response functions.. . ... International Business Machines Corporation
A computer program product includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a processor to cause the processor to perform a method that includes determining, by a first base station, that the first base station is overloaded with connections from mobile devices. ... International Business Machines Corporation
A system comprises a video hosting subsystem configured to access a database of video streams. The video hosting subsystem comprises a processor for processing data associated with the video streams, and memory for storing data. ... International Business Machines Corporation
Aspects of the present invention provide an approach for improving communications between a software-defined networking (sdn) controller and a hardware gateway in a sdn. In an embodiment, a sdn proxy gateway is installed. ... International Business Machines Corporation
A distributed storage network (dsn) includes a dsn memory and a distributed storage (ds) processing unit. The ds processing unit determines a particular revision of source data for persistence, and generates a protocol message associated with the particular revision of source data. ... International Business Machines Corporation
A method and system for virtual networking is provided. The method includes receiving logical service chain data describing a source virtual network id (vnid) for a source virtual network, a destination vnid for a destination virtual network, and a group of intermediate waypoints. ... International Business Machines Corporation
Methods, computing systems and computer program products implement embodiments of the present invention that include initializing multiple computing nodes to execute one or more software applications that provide a computing service, each of the computing nodes having a respective set of configuration data. Examples of the services include storage services, computational services and web service. ... International Business Machines Corporation
A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. ... International Business Machines Corporation
A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. ... International Business Machines Corporation
A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. ... International Business Machines Corporation
A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. ... International Business Machines Corporation
A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. ... International Business Machines Corporation
A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. ... International Business Machines Corporation
A new management node associated with a new rack sends at least a public key of the new management node to a first management node associated with a first rack and a plurality of autonomous management nodes. The first management node sends the new management node an access token trusted by at least a portion of the plurality of autonomous management nodes and a set of public keys corresponding to at least a portion of the plurality of autonomous management nodes. ... International Business Machines Corporation
A computer program product for secure data storage. The present invention may include completing a registration process by sending, by the client device, a connection request to the server. ... International Business Machines Corporation
A computer-implemented method for identifying a physical port associated with a virtual machine is provided. The method includes receiving a request to identify the physical port associated with the virtual machine. ... International Business Machines Corporation
A computer-implemented method for performing a cloud computing resource operation in a cloud computing environment is herein provided. The method comprises receiving a request to create a resource from the cloud computing environment using a user interface and intercepting the request of the creation of the resource. ... International Business Machines Corporation
Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. ... International Business Machines Corporation
A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an i/o node network including a plurality of i/o nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the i/o nodes if the toio value of said each data packet is a specified value. ... International Business Machines Corporation
A method for bandwidth-sensitive content sharing can begin with the establishment of a content sharing session between two or more end-user devices by a bandwidth-sensitive content sharing system. At least one of the two or more end-user devices can be a mobile device having a network constraint and/or a data usage constraint. ... International Business Machines Corporation
In one embodiment, a method includes determining a first set of similarity metrics for a first storage environment, the first set of similarity metrics being based on predetermined parameters related to the first storage environment, at least one of the predetermined parameters being relating to a redundancy of connections and devices in the first storage environment. In addition, the method includes obtaining a second set of similarity metrics for a second storage environment. ... International Business Machines Corporation
One embodiment provides a method comprising intercepting an incoming communication for a user, and determining whether to classify the incoming communication as a suspicious incoming communication based on content of the incoming communication and a learned classification model or learned signatures. The method further comprises monitoring one or more outgoing communications from the user, and invoking an action relating to scam prevention in response to determining an outgoing communication from the user is linked to a suspicious incoming communication.. ... International Business Machines Corporation
Disclosed aspects relate to local encryption of a set of replicated data in a shared pool of configurable computing resources which has a set of member nodes. A first local encryption key for the first node of the set of member nodes may be determined. ... International Business Machines Corporation
A method is provided of detecting packet error during a transmission of a flit along a path from a source node through one or more intermediate nodes to a destination node. The method includes identifying a stalled node, from among the source and intermediate nodes, which prevents the transmission of the flit. ... International Business Machines Corporation
A method is provided of detecting packet error during a transmission of a flit along a path from a source node through one or more intermediate nodes to a destination node. The method includes identifying a stalled node, from among the source and intermediate nodes, which prevents the transmission of the flit. ... International Business Machines Corporation
Embodiments include a technique for a signal strength boosting in a human-body near-field communication systems, the technique includes receiving a configuration of a set of devices disposed on a body of a user for transmitting a signal across the body of the user, the devices being configured to amplify the signal, and receiving an indication of a signal strength of the signal transmitted through the devices of the set of devices. The technique also includes identifying a location of signal loss based on the signal strength, and providing a recommendation to modify the configuration of the set of devices based on the identified location of signal loss, wherein the recommendation provides a location for placement of one or more additional devices to increase the signal strength. ... International Business Machines Corporation
A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.. ... International Business Machines Corporation
An electrical power distribution unit for overload prevention and a method for preventing overload of the electrical power distribution unit. The power distribution unit includes: (i) a plurality of sockets, each socket being an electrical power outlet socket, each socket having a plurality of receptacles for receiving corresponding pins of a power plug; (ii) a mechanical disabling mechanism configured to disable each socket that is unoccupied by a respective power plug; and (iii) an excess power detector configured to detect an aggregate power drawn from the sockets. ... International Business Machines Corporation
The present invention is notably directed to an electro-optical device. This device has a layer structure, which comprises a stack of iii-v semiconductor gain materials, an n-doped layer and a p-doped layer. ... International Business Machines Corporation
The present invention is directed to a method of fabricating a flow cell device. The device comprises: an exchange membrane, extending essentially in a plane; an adhesive, at a periphery of the membrane; and two half-cells, each on a respective side of said plane, the half-cells sandwiching the membrane. ... International Business Machines Corporation
The present invention is notably directed to a flow cell device. The device comprises: an exchange membrane, extending essentially in a plane; an adhesive, at a periphery of the membrane; and two half-cells, each on a respective side of said plane, the half-cells sandwiching the membrane. ... International Business Machines Corporation
A method is presented for forming a semiconductor structure. The method includes depositing an insulating layer over a semiconductor substrate, etching the insulating layer to form trenches for receiving a metal, depositing one or more sacrificial layers, and etching portions of the one or more sacrificial layers to expose a top surface of the metal of one or more of the trenches. ... International Business Machines Corporation
A method is presented for forming a semiconductor structure. The method includes depositing an insulating layer over a semiconductor substrate, etching the insulating layer to form trenches for receiving a metal, depositing one or more sacrificial layers, and etching portions of the one or more sacrificial layers to expose a top surface of the metal of one or more of the trenches. ... International Business Machines Corporation
A semiconductor device includes a semiconductor structure formed on a substrate, a gate dielectric formed on a first side of the semiconductor structure, and a dielectric layer formed on a second side of the semiconductor structure.. . ... International Business Machines Corporation
A vertical transport fin field effect transistor (vtfet) with a smaller cross-sectional area at the top of the fin than at the bottom, including, a substrate, a vertical fin on the substrate, wherein the vertical fin has a cross-sectional area at the base of the vertical fin that is larger than a cross-sectional area at the top of the vertical fin, wherein the cross-sectional area at the top of the vertical fin is in the range of about 10% to about 75% of the cross-sectional area at the base of the vertical fin, and a central gated region between the base and the top of the vertical fin.. . ... International Business Machines Corporation
Embodiments are directed to a method and resulting structures for smoothing the sidewall roughness of a post-etched film. A sacrificial layer is formed on a substrate. ... International Business Machines Corporation
Embodiments are directed to a method and resulting structures for smoothing the sidewall roughness of a post-etched film. A sacrificial layer is formed on a substrate. ... International Business Machines Corporation
Techniques for vfet top source and drain epitaxy are provided. In one aspect, a method of forming a vfet includes: patterning a fin to form a bottom source/drain region and a fin channel of the vfet; forming bottom spacers on the bottom source/drain region; depositing a high-κ gate dielectric onto the bottom spacers and along sidewalls of the fin channel; forming gates over the bottom spacers; forming top spacers on the gates; partially recessing the fin channel to create a trench between the top spacers; forming a nitride liner along sidewalls of the trench; fully recessing the fin channel through the trench such that side portions of the fin channel remain intact; and forming a doped epitaxial top source and drain region over the fin channel. ... International Business Machines Corporation
A method of forming a semiconductor device and resulting structures having nanosheet transistors with sharp junctions by forming a nanosheet stack over a substrate, the nanosheet stack having a plurality of nanosheets alternating with a plurality of sacrificial layers, such that a topmost and a bottommost layer of the nanosheet stack is a sacrificial layer; forming an oxide recess on a first and a second end of each sacrificial layer; and forming a doped extension region on a first and a second end of each nanosheet.. . ... International Business Machines Corporation
A method is presented for tuning work functions of transistors. The method includes forming a work function stack over a semiconductor substrate, depositing a germanium oxide layer and a barrier layer over the work function stack, and annealing the germanium oxide layer to desorb oxygen therefrom to trigger oxidation of at least one conducting layer of the work function stack. ... International Business Machines Corporation
A tri-layer dielectric stack is provided for a metal-insulator-metal capacitor (mimcap). Also, a metal-insulator-metal capacitor (mimcap) is provided having three or more electrodes. ... International Business Machines Corporation
A tri-layer dielectric stack is provided for a metal-insulator-metal capacitor (mimcap). Also, a metal-insulator-metal capacitor (mimcap) is provided having three or more electrodes. ... International Business Machines Corporation
A tri-layer dielectric stack is provided for a metal-insulator-metal capacitor (mimcap). Also, a metal-insulator-metal capacitor (mimcap) is provided having three or more electrodes. ... International Business Machines Corporation
A three-dimensional (3d) bonded semiconductor structure is provided in which a first bonding oxide layer of a first semiconductor structure is bonded to a second bonding oxide layer of a second semiconductor structure. Each of the first and second bonding oxide layers has a metallic capacitor plate structure embedded therein, wherein each metallic capacitor plate structure has a columnar grain microstructure. ... International Business Machines Corporation
A three-dimensional (3d) bonded semiconductor structure is provided in which a first bonding oxide layer of a first semiconductor structure is bonded to a second bonding oxide layer of a second semiconductor structure. Each of the first and second bonding oxide layers has a metallic pad structure embedded therein, wherein each metallic pad structure has a columnar grain microstructure. ... International Business Machines Corporation
A method of forming an integrated circuit device having a nanosheet resistor includes forming a nanosheet structure having alternating sheets of silicon and silicon germanium. An ion implantation is performed on the nanosheet structure. ... International Business Machines Corporation
The present invention is notably directed to an electro-optical device. The latter comprises a layer structure with: a silicon substrate; a buried oxide layer over the silicon substrate; a tapered silicon waveguide core over the buried oxide layer, the silicon waveguide core cladded by a first cladding structure; a bonding layer over the first cladding structure; and a stack of iii-v semiconductor gain materials on the bonding layer, the stack of iii-v semiconductor gain materials cladded by a second cladding structure. ... International Business Machines Corporation
A fully-depleted silicon-on-insulator (fdsoi) semiconductor structure includes: a first pfet, a second pfet, and a third pfet each having a different threshold voltage and each being over an n-well that is biased to a first voltage; and a first nfet, a second nfet, and a third nfet each having a different threshold voltage and each being over a p-type substrate that is biased to a second voltage. The second voltage is different than the first voltage.. ... International Business Machines Corporation
An electrical device that includes at least one n-type field effect transistor including a channel region in a type iii-v semiconductor device, and at least one p-type field effect transistor including a channel region in a germanium containing semiconductor material. Each of the n-type and p-type semiconductor devices may include gate structures composed of material layers including work function adjusting materials selections, such as metal and doped dielectric layers. ... International Business Machines Corporation
A three-dimensional (3d) bonded semiconductor structure is provided in which a first bonding oxide layer of a first semiconductor structure is bonded to a second bonding oxide layer of a second semiconductor structure. Each of the first and second bonding oxide layers has a metallic bonding structure embedded therein, wherein each metallic bonding structure contains a columnar grain microstructure. ... International Business Machines Corporation
A method of forming an electrical device that includes forming a first level including an array of metal lines, wherein an air gap is positioned between the adjacent metal lines. A second level is formed including at least one dielectric layer atop the first level. ... International Business Machines Corporation
A heat sink includes a plurality of layers being disposed substantially parallel with a surface of a heat source. The layers include a plurality of pin portions spaced apart from each other in a planar arrangement wherein the pin portions of the layers are stacked and bonded to form pin fins extending in a transverse direction relative to the heat source to sink heat. ... International Business Machines Corporation
A technique relates to forming a semiconductor device. A first substrate is provided adjacent to a second substrate. ... International Business Machines Corporation
A method of making a semiconductor device including forming a first blanket layer on a substrate; forming a second blanket layer on the first blanket layer; patterning a first fin of a first transistor region and a second fin of a second transistor region in the first blanket layer and the second blanket layer; depositing a mask on the second transistor region; removing the first fin to form a trench; growing a first semiconductor layer in the trench where the first fin was removed; and growing a second semiconductor layer on the first semiconductor layer.. . ... International Business Machines Corporation
A method of making a semiconductor device including forming a first blanket layer on a substrate; forming a second blanket layer on the first blanket layer; patterning a first fin of a first transistor region and a second fin of a second transistor region in the first blanket layer and the second blanket layer; depositing a mask on the second transistor region; removing the first fin to form a trench; growing a first semiconductor layer in the trench where the first fin was removed; and growing a second semiconductor layer on the first semiconductor layer.. . ... International Business Machines Corporation
An apparatus and an associated method. The apparatus includes a chuck, an array of three or more ultrasonic sensors, a ceramic ring surrounding the chuck, and a controller connected to the ultrasonic sensors. ... International Business Machines Corporation
An estimate is made of a time since a given presenting cancer would have first been detectable using a known diagnostic technique, and an estimate is also made of initial characteristics of the given presenting cancer at the time when it would have first been detectable using the known diagnostic technique. A first probability of the cancer being present in a first set of one or more clinically significant remote sites is determined based on the estimated initial characteristics. ... International Business Machines Corporation
Predicting data correlation using multivalued logical outputs in sram storage cells including generating a plurality of logical outputs for each of a plurality of variable sets, wherein each variable in each variable set is a data point, and wherein each logical output is a binary indication of a relationship between the data points; writing, into storage cells, each logical output of the plurality of logical outputs for each of the plurality of variable sets; and for each group of corresponding logical outputs of the plurality of logical outputs: activating a fight port for the storage cells storing corresponding logical outputs, wherein activating the fight port causes each corresponding logical output to adjust a resulting voltage based on the logical output stored in each storage cell; and measuring the resulting voltage on a bitline of the activated fight port to determine a correlation probability for the corresponding logical outputs.. . ... International Business Machines Corporation
A magneto-resistance random access memory (mram) cell includes a transistor, a wire and a magnetic tunnel junction (mtj). The mtj includes a fixed layer of fixed magnetic polarity electrically connected with the transistor, a free layer of variable magnetic polarity electrically connected with the wire and an insulator between the fixed and free layers. ... International Business Machines Corporation
Embodiments are directed to a computer-implemented method of creating a work. The method includes analyzing a set of media files. ... International Business Machines Corporation
An apparatus for burnishing media, according to one embodiment, includes a first block with a media bearing surface having a plurality of channels and lands. The channels and lands alternate in a direction of media travel. ... International Business Machines Corporation
A tape drive-implemented method, according to another embodiment, includes: determining a length of a window of a servo pattern to use for calculating a lateral position estimate, determining a number of the windows of the servo pattern to use for calculating a lateral position value, receiving signals corresponding to each of the number of the windows of the servo pattern from a single servo channel, calculating a lateral position estimate for each of the number of the windows of the servo pattern, calculating the lateral position value by using the lateral position estimates, and using the lateral position value to control a tape head actuator. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation
A tape drive-implemented method, according to one embodiment, includes: determining a number of lateral position estimates to use for calculating a lateral position value, receiving lateral position estimates from a single servo channel, calculating the lateral position value by using the number of lateral position estimates, and using the lateral position value to control a tape head actuator. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation
Various embodiments for error recovery in a data storage environment, by a processor device, are provided. For monitoring signal from one or more read channels in a tape storage drive, a variable range of offsets organized by row into a table is selected by a microcode algorithm and applied by a track following servo mechanism of the tape storage drive to position a read head in relation to a track of a tape media at an offset up to and including beyond a predetermined margin of the track.. ... International Business Machines Corporation
An apparatus-implemented method according to one embodiment includes passing a magnetic recording tape over a plurality of modules having write transducers. Associated pairs of the write transducers are aligned along an intended direction of tape travel thereacross, and planes of deposition of write gaps of the write transducers in each associated pair are oriented at an angle of greater than 4 degrees relative to each other. ... International Business Machines Corporation
One embodiment provides a method comprising answering one or more incoming phone calls received at one or more pre-specified phone numbers utilizing a bot. The bot is configured to engage in a conversation with a caller initiating an incoming phone call utilizing a voice recording that impersonates a human being. ... International Business Machines Corporation
Embodiments of the present invention address deficiencies of the art in respect to podcasting and provide a method, system and computer program product for speed podcasting. In an embodiment of the invention, a speed podcasting method can include speech recognizing an audio portion of a podcast, parsing the speech recognized audio portion to identify essential words, and playing back only audio segments and corresponding video segments of the podcast including the essential words while excluding from playback audio segments and corresponding video segments of the podcast including non-essential words.. ... International Business Machines Corporation
A computing device is provided. The computing device includes a touchscreen, a speaker configured to output sounds corresponding to the musical notes and a processor. ... International Business Machines Corporation
A refreshable braille display device includes a housing having a surface containing a set of tactile markers thereon; a carriage in cooperation with the housing, the carriage having a surface containing a tactile marker thereon and a series of individual refreshable braille cells positioned above the tactile marker for tactile reading by a user; and a moving mechanism for moving the carriage relative to the housing such that the tactile marker on the surface of the carriage is aligned with one of the tactile markers in the set of tactile markers on the surface of the housing.. . ... International Business Machines Corporation
A method according to the present invention includes receiving first vehicle sensor data. The first vehicle sensor data includes first location data and first camera data. ... International Business Machines Corporation
An example system includes a processor to receive data lineage including a plurality of levels, and a configuration. The processor is to also build a three dimensional (3d) virtual reality (vr) model including a first floor based on data lineage content corresponding to a first level of the plurality of levels and the configuration. ... International Business Machines Corporation
A system, a computer readable storage medium, and a method for detecting insurance fraud or for comparing references use visual analytics-based techniques. The method can include identifying a scratch and a scratch location on a vehicle in a 3-dimensional rendering in comparison to a base image or in comparison to a stored image in a database, comparing one or more features of the scratch such as color features of the scratch in the scratch location in comparison to the scratch location or comparing one or more texture features of the scratch in the scratch location in comparison to the scratch location in the base image or the stored image. ... International Business Machines Corporation
A method, system, and/or computer program product utilize a server system to receive a product buyer data set that includes (i) information indicative of a plurality of previous-buyer individuals who have purchased a product, and (ii) current location information respectively associated with devices operated by the plurality of previous-buyer individuals. The server system receives an indication that a first device of a shopper has been located within a location in a store where the product is being offered for sale for a time. ... International Business Machines Corporation
Methods are provided for producing an authenticated packaged product. A digital signature, dependent on unique message data for the product, is generated via a digital signature scheme using a secret signing key. ... International Business Machines Corporation
Methods are provided for producing an authenticated packaged product. A digital signature, dependent on unique message data for the product, is generated via a digital signature scheme using a secret signing key. ... International Business Machines Corporation
Approaches presented herein enable identifying a deceptive social media post such as a fraudulent social survey in a social media environment. Specifically, a regression model including one or more factors, each of the one or more factors includes a respective parameter, is generated based on an analysis of prior social media scam data. ... International Business Machines Corporation
Systems and methods for cognitive mobile wallet management are disclosed. In embodiments, a method comprises: obtaining, by a computing device, user contextual data; determining, by the computing device, a potential user purchase and an associated purchase category; and dynamically determining, by the computing device, a flexible spending rule for the purchase category based on one or more stored spending rules and the contextual data, wherein the flexible spending rule changes an amount of currency available to a user through the computing device.. ... International Business Machines Corporation
At least one target area is identified based on a pollution concentration field of a geographic area. At least one candidate site is selected from a plurality of sites within the geographic area based on a relationship between the plurality of sites and pollution sources, where the plurality of sites are potential positions for deploying sensors for monitoring pollution. ... International Business Machines Corporation
A method, computer program product, and system includes a processor(s) identifying, in at least one data dictionary associated with a reporting tool, report objects available in the generation of an ad-hoc report with the reporting tool. The processor(s) contextualizes, at a given time, data accessible to the processor(s), based on utilizing one or more communications connections. ... International Business Machines Corporation
A method for generating an output comprising one or more segments includes obtaining a plurality of profiles derived from unstructured data associated with a plurality of users, wherein a given one of the profiles corresponds to a respective one of the users; repetitively executing at least one machine learning technique on the plurality of profiles, each execution producing a respective set of one or more segments from the plurality of profiles; generating a complete graph by performing pairwise comparisons between sets of segments from respective executions; applying at least one persistency graph algorithm to the complete graph to find one or more coherent clusters comprising one or more segments that are persistent across the repetitive executions of the machine learning technique; and producing the output at least in part by selecting at least one of the segments from at least one of the coherent clusters.. . ... International Business Machines Corporation
A training method is provided. The training method includes clustering, by a processor, a plurality of items that each have an item attribute value, according to the item attribute value. ... International Business Machines Corporation
A training method is provided. The training method includes clustering, by a processor, a plurality of items that each have an item attribute value, according to the item attribute value. ... International Business Machines Corporation
A method for generating an output comprising one or more segments includes obtaining a plurality of profiles derived from unstructured data associated with a plurality of users, wherein a given one of the profiles corresponds to a respective one of the users; repetitively executing at least one machine learning technique on the plurality of profiles, each execution producing a respective set of one or more segments from the plurality of profiles; generating a complete graph by performing pairwise comparisons between sets of segments from respective executions; applying at least one persistency graph algorithm to the complete graph to find one or more coherent clusters comprising one or more segments that are persistent across the repetitive executions of the machine learning technique; and producing the output at least in part by selecting at least one of the segments from at least one of the coherent clusters.. . ... International Business Machines Corporation
One embodiment provides a method comprising intercepting a voice communication, collecting multi-sensory inputs associated with the voice communication, and determining an overall risk assessment metric for the voice communication based on the multi-sensory inputs and learned signatures. The multi-sensory inputs are indicative of content of the voice communication and one or more contextual factors associated with a target of the voice communication. ... International Business Machines Corporation
The disclosed embodiments include a question and answer (qa) system, computer program product, and computer-implemented method configured to adjust passage relevancy to a question based on time. The disclosed embodiments seek to improve the process of providing answers to questions that include a temporal reference. ... International Business Machines Corporation
A system trains a facial recognition modeling system using an extremely large data set of facial images, by distributing a plurality of facial recognition models across a plurality of nodes within the facial recognition modeling system. The system optimizes a facial matching accuracy of the facial recognition modeling system by increasing a facial image set variance among the plurality of facial recognition models. ... International Business Machines Corporation
A system trains a facial recognition modeling system using an extremely large data set of facial images, by distributing a plurality of facial recognition models across a plurality of nodes within the facial recognition modeling system. The system optimizes a facial matching accuracy of the facial recognition modeling system by increasing a facial image set variance among the plurality of facial recognition models. ... International Business Machines Corporation
Embodiments include method, systems and computer program products for identifying abandoned objects. In some embodiments, first visual media data of an object can be received from a first source. ... International Business Machines Corporation
Aspects create test cases executable by a robot device to simulate user motion activity. Video analytics extract motion patterns from video image data of a user performing an activity associated with a wearable personal programmable device executing a device application. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer system, and a computer program product for routing an image file from an imaging device to a storage device via a near-field communication network. The present invention may include receiving a device search signal from the storage device. ... International Business Machines Corporation
Embodiments of the present invention disclose a method, computer system, and a computer program product for routing an image file from an imaging device to a storage device via a near-field communication network. The present invention may include receiving a device search signal from the storage device. ... International Business Machines Corporation
The present invention provides a method and system for receiving by a user from a source a communication being a fragment of a message having an unrecognizable part containing confidential data. The unrecognizable part is converted into recognizable data upon receipt of the communication and presented to the user. ... International Business Machines Corporation
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. ... International Business Machines Corporation
A method includes retrieving application files of an enterprise application store. Each application file corresponds to an application provided by the enterprise application store. ... International Business Machines Corporation
A computer-implemented method, according to one embodiment, includes: determining, using a processor, whether a virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine; determining, using the processor, whether a hypervisor is authorized to run the virtual machine using a digital signature of the data structure; and running the virtual machine on a computer system using the hypervisor in response to determining that the virtual machine is authorized to be run and that the hypervisor is authorized to run the virtual machine. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation
A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.. . ... International Business Machines Corporation
An estimate is made of a time since a given presenting cancer would have first been detectable using a known diagnostic technique, and an estimate is also made of initial characteristics of the given presenting cancer at the time when it would have first been detectable using the known diagnostic technique. A first probability of the cancer being present in a first set of one or more clinically significant remote sites is determined based on the estimated initial characteristics. ... International Business Machines Corporation
Embodiments for medical condition communication management by one or more processors. A maturity score and medical condition acceptance score relating to a medical condition of a user may be estimated according to data collected from one or more devices associated with the user. ... International Business Machines Corporation
Processing a chief medical complaint, associated with a patient, together with current clinical data items derived from current clinical data associated with the patient to establish a baseline medical diagnosis of the patient, for each of different historical clinical data items derived from historical clinical data associated with the patient, processing the chief medical complaint together with the current clinical data items and the historical clinical data item to establish a comparison medical diagnosis of the patient, where the comparison medical diagnosis results from an diagnostic effect of the historical clinical data item on the baseline medical diagnosis, and determining the diagnostic effect of each of the historical clinical data items on the baseline medical diagnosis, and visually displaying on a visual display medium any of the historical clinical data items in accordance with a prioritization arrangement based on the diagnostic effects of the historical clinical data items.. . ... International Business Machines Corporation
A computer generates a matrix using genetic code. The computer generates a result-set using the matrix and neighborhood clustering. ... International Business Machines Corporation
Creating an integrated circuit with non-linear variations, the computer identifies an integrated circuit design; identifies a timing model associated with the identified integrated circuit design; defines one or more static single sided variables; defines one or more regions of one or more of the defined one or more static single sided variables that are treated linearly; defines one or more multi-sided variables based on the defined one or more regions of the one or more of the defined one or more static single sided variables; identifies one or more timing paths within the identified integrated circuit design; performs a statistical static timing analysis on the identified timing model for the identified one or more timing paths within the identified integrated circuit design utilizing the defined one or more multi-sided variables; provides one or more timing quantities that project within a multi-parameter space based on the performed statistical static timing analysis.. . ... International Business Machines Corporation
Creating an integrated circuit with non-linear variations, the computer identifies an integrated circuit design; identifies a timing model associated with the identified integrated circuit design; defines one or more static single sided variables; defines one or more regions of one or more of the defined one or more static single sided variables that are treated linearly; defines one or more multi-sided variables based on the defined one or more regions of the one or more of the defined one or more static single sided variables; identifies one or more timing paths within the identified integrated circuit design; performs a statistical static timing analysis on the identified timing model for the identified one or more timing paths within the identified integrated circuit design utilizing the defined one or more multi-sided variables; provides one or more timing quantities that project within a multi-parameter space based on the performed statistical static timing analysis.. . ... International Business Machines Corporation
Creating an integrated circuit with non-linear variations, the computer identifies an integrated circuit design; identifies a timing model associated with the identified integrated circuit design; defines one or more static single sided variables; defines one or more regions of one or more of the defined one or more static single sided variables that are treated linearly; defines one or more multi-sided variables based on the defined one or more regions of the one or more of the defined one or more static single sided variables; identifies one or more timing paths within the identified integrated circuit design; performs a statistical static timing analysis on the identified timing model for the identified one or more timing paths within the identified integrated circuit design utilizing the defined one or more multi-sided variables; provides one or more timing quantities that project within a multi-parameter space based on the performed statistical static timing analysis.. . ... International Business Machines Corporation
A method, computer program product, and system for calculating an input timing slack at an input to a latch by subtracting an input arrival time to the latch from an input required arrival time, calculating an output timing slack at an output to the latch by subtracting an output arrival time of the latch from an output required arrival time from the latch, performing cycle stealing to improve the output timing slack by modifying the input required arrival time and the output arrival time, reducing the output timing slack by a pessimism amount, performing optimization in the integrated circuit to improve the input timing slack and the output timing slack, and increasing the output timing slack by the pessimism amount.. . ... International Business Machines Corporation
A method, computer program product, and system for calculating an input timing slack at an input to a latch by subtracting an input arrival time to the latch from an input required arrival time, calculating an output timing slack at an output to the latch by subtracting an output arrival time of the latch from an output required arrival time from the latch, performing cycle stealing to improve the output timing slack by modifying the input required arrival time and the output arrival time, reducing the output timing slack by a pessimism amount, performing optimization in the integrated circuit to improve the input timing slack and the output timing slack, and increasing the output timing slack by the pessimism amount.. . ... International Business Machines Corporation
A method, computer program product, and system for calculating an input timing slack at an input to a latch by subtracting an input arrival time to the latch from an input required arrival time, calculating an output timing slack at an output to the latch by subtracting an output arrival time of the latch from an output required arrival time from the latch, performing cycle stealing to improve the output timing slack by modifying the input required arrival time and the output arrival time, reducing the output timing slack by a pessimism amount, performing optimization in the integrated circuit to improve the input timing slack and the output timing slack, and increasing the output timing slack by the pessimism amount.. . ... International Business Machines Corporation
A method and system for processing a request document including a request. The request document is processed using a question analysis function of a question answering system, thereby extracting elements of the request. ... International Business Machines Corporation
In response to receiving a question, a corpus of textual data having content related to the question is obtained. At least one segment is extracted from the corpus of textual data. ... International Business Machines Corporation
A system and method are provided for managing content creation of data sources. The method includes: analyzing content of a data source while simultaneously identifying one or more alternative data sources having similar concepts of the content of the data source, the similar contents based on a degree of similarity between the concepts of the data source and one or more concepts of the one or more alternative data sources. ... International Business Machines Corporation
A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and functions. ... International Business Machines Corporation
A system and method are provided for indexing and mining content of multiple data sources. The method includes: providing a database of learned content of multiple data sources learned using text analysis, the learned content identifying one or more concepts to which a data source relates, wherein the concepts are cognitively associated with the data source and include concepts not explicitly referenced in the data source and providing an index of the learned content including associations between concepts with mappings between concepts and the multiple data sources. ... International Business Machines Corporation
At least one subsystem among the plurality of subsystems includes a managing section operable to manage individual route information for routes in a management target region of the at least one subsystem among the plurality of regions and adjacent route information for routes positioned in a partial range from a boundary of the management target region among routes in an adjacent region that is adjacent to the management target region, and an identifying section operable to identify the route on which the moving object is positioned based on the observation position, by using the individual route information and the adjacent route information managed by the at least one subsystem. Also provided is a method and computer program product.. ... International Business Machines Corporation
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: processing social media system data to establish a relationship graph, wherein the processing includes aggregating relationship graph information of different relationship graphs so that the relationship graph is an aggregated relationship graph; determining that a user is encountering cognitive recall difficulty, wherein the determining includes comparing current input biometric data of the user to baseline biometric data of the user; and responsively to the determining, outputting to the user media content, wherein generating the media content includes performing a search of one or more data source for content using node labels of the relationship graph as keywords and providing a media file for playback by the user, the media file having content returned from the search.. ... International Business Machines Corporation
A method, computer system, and a computer program product for data analysis using a plurality of map data is provided. The present invention may include generating recommendation data from a plurality of corpus data. ... International Business Machines Corporation
A mechanism is provided for automated management of a set of media data using a set of social networking data. The set of social networking data related to a media event is collected. ... International Business Machines Corporation
Mechanisms are provided, in a first computing device, for sharing content of communication sessions. The mechanisms establish a first communication session between the first computing device and a second computing device. ... International Business Machines Corporation
Information maintained in a port control block of an embedded port of a host bus adapter is stored in a host bus adapter memory, wherein the information corresponds to login attributes and state data of remote ports. In response to storing the information in the host bus adapter memory, code in the embedded port is updated. ... International Business Machines Corporation
A sensing device for monitoring operational conditions of an external unit associated with a data storage system includes a processor, an electromagnetic sensing coil associable to, such as, in proximity to and/or couplable to a power line to the external unit and a communication interface configured to communicative with the data storage system. The processor of the sensing device may be configured to receive a signal from the electromagnetic sensing coil that is indicative of operational conditions of the external unit, convert the received signal to a scsi data command; and transmit the converted scsi data command to a controller of the data storage system. ... International Business Machines Corporation
Cache prefetching in offloaded data transfer (odx) processes. A populate token command is received to initiate a copy offload operation. ... International Business Machines Corporation
Cache prefetching in offloaded data transfer (odx) processes. A populate token command is received to initiate a copy offload operation. ... International Business Machines Corporation
Systems and methods for data storage in a distributed storage network are disclosed. Unexpected errors can adversely affect consistency of both the content of a write (including the slice data), and the synchronicity between the written slices and metadata structures. ... International Business Machines Corporation
Provided are a computer program product, system, and method for determining the location for volumes of data being initially stored within a storage space, regardless of the physical location of the data. The storage space includes stripes composed of volumes, which can be logically represented as a utilization histogram of stripe locations offset from one another. ... International Business Machines Corporation
A set of test cases is executed on a base code to produce a baseline result and on a changed code to produce a new result. From the baseline result and the new result, a first subset of tests cases is determined that are failing with the changed code but were not failing with the base code. ... International Business Machines Corporation
An example system includes a processor to crawl a plurality of web pages of a web application to be tested. The processor is also configured to receive an intercepted input to the web application and an output from a web application associated with each crawled web page. ... International Business Machines Corporation
Verifying architectural compliance of a processor core using processor-sparing functions. A simulation of a model for a register-transfer level design of the processor core is performed. ... International Business Machines Corporation
A mechanism is provided for managing problems in a software product installed on a plurality of computing machines. Tracking information of one or more problems being solved on corresponding ones of the plurality of computing machines is received. ... International Business Machines Corporation
A computer-implemented mechanism is provided that monitors usage of one or more computing resources within a set of computing components relative to a received workload. The mechanism calculates a maximum workload for the set of computing components from the monitored use of the computing resources within the set of computing components and determines an available overhead between the calculated maximum workload for the set of computing components and a current workload being performed by the set of computing components. ... International Business Machines Corporation
A method includes storing an application in a memory of a mobile device, wherein the application is associated with a widget including an event logger and a library managing the widget, executing, by the mobile device, the application and the widget, receiving, through a user interface of the mobile device, an input corresponding to the event logger of the widget, logging, by the library, the input corresponding to the event logger of the widget in the memory of the mobile device, and reporting, by the library, the input corresponding to the event logger of the widget to a remote monitoring server as monitored data.. . ... International Business Machines Corporation
A mechanism is provided for backing up metadata in a data storage system. Given metadata stored on the data storage system is implemented by way of a tree structure operable by fixed mapping. ... International Business Machines Corporation
A method for a dispersed storage network (dsn) determines wireless connectivity metrics when a wireless device has a data file to store. The method includes determining a storage method including storing the data file locally in the wireless device as a data file, storing encoded data slices of the data file in wireless devices or storing encoded data slices of the data file in dsn memory. ... International Business Machines Corporation
A method for execution by a dispersed storage (ds) cleanup unit includes determining a dead session of a dsn. A subset of a plurality of eventual consistency intent names is generated by identifying eventual consistency intent names that include a session identifier corresponding to the dead session in a prefix of the eventual consistency intent names, where the subset of the plurality of eventual consistency intent names corresponds to all eventual consistency intents of the dead session. ... International Business Machines Corporation
Examples of techniques for running kernel dependent applications in containers are disclosed. In one example implementation, a method includes initiating, by a processing system, a user mode linux (uml) kernel in a container of a host. ... International Business Machines Corporation
Examples of techniques for running kernel dependent applications in containers are disclosed. In one example implementation, a method includes initiating, by a processing system, a user mode linux (uml) kernel in a container of a host. ... International Business Machines Corporation
A computer system includes a processor, main memory, and controller. The processor includes a plurality of hardware threads configured to execute a plurality of software threads. ... International Business Machines Corporation
A mechanism is provided for managing a development of a software program. An indication of one or more development tasks of the software program being completed is received. ... International Business Machines Corporation
Method, program and system for code optimization. A sign assignment instruction with input and output operands identical in size, which assigns a value of zero to a packed decimal data value that has a value of negative zero, is detected in source code or an executable program. ... International Business Machines Corporation
A computer-implemented method is provided for deleting a given object from among a plurality of objects in an object-oriented programming language computing system which uses a reference count (rc) of each of the plurality of objects to check a liveness of the plurality of objects. The method includes decrementing, in a reference counts (rcs) decrement operation, rcs of objects referenced from the given object using one or more non-atomic operations in a transaction that utilizes a hardware transactional memory mechanism to accelerate the reference counts decrement operation.. ... International Business Machines Corporation
A computer-implemented method is provided for deleting a given object from among a plurality of objects in an object-oriented programming language computing system which uses a reference count (rc) of each of the plurality of objects to check a liveness of the plurality of objects. The method includes decrementing, in a reference counts (rcs) decrement operation, rcs of objects referenced from the given object using one or more non-atomic operations in a transaction that utilizes a hardware transactional memory mechanism to accelerate the reference counts decrement operation.. ... International Business Machines Corporation
An apparatus is presented for generating a true random number generator (trng). The apparatus includes a magnetic tunnel junction (mtj) device including a first layer, a second layer, and third layer, as well as a bias circuit to bias the mtj device along with a pulse height discriminator and a time-to-amplitude convertor to generate random bit-streams. ... International Business Machines Corporation
A logic circuit and a method using thereof for zero detection of a sum of inputs without performing an addition. The logic circuit and the method using thereof perform a true mathematical zero check and a zero check for trailing n-bits. ... International Business Machines Corporation
A logic circuit and a method using thereof for zero detection of a sum of inputs without performing an addition. The logic circuit and the method using thereof perform a true mathematical zero check and a zero check for trailing n-bits. ... International Business Machines Corporation
Generating data structures for computer memory. Provisional data structures are generated that respectively have (i) a significand with an initial value of zero and (ii) an exponent that is included in a range of exponents. ... International Business Machines Corporation
Optimizing data approximation analysis using low power circuitry including receiving a plurality of data bits each corresponding to a binary indication of a test result; placing each of the plurality of data bits on an approximation circuit, wherein each of the data bits is placed on the approximation circuit by applying, to a first capacitor during a set time period, a voltage corresponding to the data bit, and wherein placing each of the plurality of data bits on the approximation circuit results in a resulting voltage stored on the first capacitor; and determining a potential correlation of the test results by comparing the resulting voltage to a voltage threshold.. . ... International Business Machines Corporation
The disclosure is directed to mobile application function sharing. A system according to embodiments includes: a plurality of mobile devices; and an application on each of the mobile devices; wherein the application on each of the mobile devices includes a share context framework, including: a view interface for generating a share context including a sequence of page views of content of the application; a sender interface for transmitting the generated share context directly to the application on another of the plurality of mobile devices; a receiver interface for receiving, directly from the application on another of the plurality of mobile devices, a share context including a sequence of page views of content of the application on the other mobile device; and an executor for rendering in the application the sequence of page views included in the received share context.. ... International Business Machines Corporation
In various embodiments, a computer-implemented method includes identifying data files in external storage, where the data files correspond to a computer software application (application) on a mobile device and where the data files were previously stored on the mobile device. The method may also include sorting the data files into different access levels, where the access levels designate a hierarchy for the data files. ... International Business Machines Corporation
In various embodiments, a computer-implemented method includes identifying computer software applications (applications) on a mobile device. The method may also include generating migration profiles for the applications, where each application corresponds (corresponding application) to a migration profile and where the migration profile includes data files about the corresponding application. ... International Business Machines Corporation
A method for execution by a storage unit of a dispersed storage network (dsn) includes receiving a data slice for storage. A first bin that includes the data slice is generated and stored in a first location of a memory device of the storage unit, and a bin pointer that includes a reference to the first location is generated. ... International Business Machines Corporation
A computer-implemented method according to one embodiment includes receiving a first command to inhibit one or more tracks within a volume of a storage system, in response to the first command, identifying the one or more tracks within the volume of the storage system, utilizing the first command or a previous command, and inhibiting the one or more tracks within the volume of the storage system, receiving a second command to copy data to the one or more tracks within the volume of the storage system, identifying the one or more tracks within the volume of the storage system as inhibited, and rejecting the second command, in response to the identifying.. . ... International Business Machines Corporation
A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (dsn). The method begins by determining to reposition dst execution units of a distributed storage and task network (dstn) module storage pool located at a current number of sites to an updated number of sites (larger or smaller). ... International Business Machines Corporation
A mechanism is provided for replicating data in a data storage system that comprises a first data storage device, a second data storage device, and a third data storage device arranged to receive write requests from the first data storage device and second data storage device. The first data storage device or the second data storage device is selected using a characteristic of the first data storage device and the second data storage device. ... International Business Machines Corporation
A computer-implemented method for managing a memory control unit includes receiving a command at the memory control unit. The command includes a command type that either requires or does not require buffering resources. ... International Business Machines Corporation
According to an embodiment of the present invention, a system dynamically resizes one or more application windows displayed on one or more screens based on an interactive state associated with the one or more application windows. Initially, a processor displays a plurality of different windows associated with one or more corresponding applications and determines an interactive state associated with each of the plurality of different windows. ... International Business Machines Corporation
A method is provided which includes displaying an output of an application on a touchscreen, receiving a user input for the application on the touchscreen, and determining the location of the received user input on the touchscreen. Further, the method includes generating an additional pop-up window for display on the touchscreen, and selecting a location for the additional pop-up window, where the selected location for the additional pop-up window does not coincide with the determined location of the user input for application. ... International Business Machines Corporation
Embodiments are directed to a computer-implemented method, computer system, and computer program product for customizing the presentation of a work. The method includes receiving, by a processor, a work. ... International Business Machines Corporation
A system executes an operation in a back end system by creating a declarative language definition of the operation for execution of the operation. The declarative language definition defines at least one input required to execute the operation, and comprises user interface template information for a user interface template that accepts at least one input. ... International Business Machines Corporation
A computer-implemented method according to one embodiment includes identifying an amount of force applied to a pressure-sensitive touchscreen of a device, and providing the amount of force as an input to an application of the device.. . ... International Business Machines Corporation
A smart action can be performed in response to acquiring feature information associated with a user performing a gesture on an object. The acquired acoustic information is matched with a predetermined acoustic signature that is associated with a smart action. ... International Business Machines Corporation
A method and system for eye tracking according to one or more embodiment is presented. Aspects include overlaying, on a display of an ocular device, an image comprising an inner transparent region and an outer semitransparent region. ... International Business Machines Corporation
A method for providing stable and reliable power to electronic devices is disclosed. In one embodiment, such a method includes providing a backplane having several power supplies coupled thereto. ... International Business Machines Corporation
A method for removing photoresist bridging defects includes coating a photoresist layer over a dielectric layer formed over a substrate, applying a first developer that results in formation of one or more photoresist bridging defects, and applying a second developer to remove the one or more photoresist bridging defects. The first developer is an aqueous base developer and the second developer is a reverse tone weak developer (rtwd), the rtwd being a mixture of a first (good) solvent and a second (bad) solvent for the photoresist.. ... International Business Machines Corporation
A method for removing photoresist bridging defects includes coating a photoresist layer over a dielectric layer formed over a substrate, applying a first developer that results in formation of one or more photoresist bridging defects, and applying a second developer to remove the one or more photoresist bridging defects. The first developer is an aqueous base developer and the second developer is a reverse tone weak developer (rtwd), the rtwd being a mixture of a first (good) solvent and a second (bad) solvent for the photoresist.. ... International Business Machines Corporation
A media-defined optical logic circuit composed of a set of light-transmitting polyhedral prisms arranged so that a pair of adjacent prisms can exchange photonic signals through adjacent surfaces. Each prism contains one or more quantum dots that, when excited by a photonic signal received from an adjacent prism, respond by emitting light that becomes an incoming photonic signal for an adjacent prism. ... International Business Machines Corporation
A computer-implemented method includes comparing, by a computer processor, meteorological conditions of a first duration of time to meteorological conditions of at least one second duration of time. The beginning of the second duration of time is determined based at least in part on a first event relating to air quality conditions. ... International Business Machines Corporation
A system and method are provided. The system includes a data reader having a processor for performing a signal frequency analysis, an ultrasound transmitter for transmitting ultrasound signals, and an ultrasound receiver for receiving reflected ultrasound signals. ... International Business Machines Corporation
Providing non-destructive recirculation test support in a device under test includes determining an initial latch allocation of a plurality of latches to form a plurality of self-test chains for the device under test. An optimized latch allocation to the self-test chains is determined based on a plurality of physical and logical grouping constraints. ... International Business Machines Corporation
Structurally assisted functional test and diagnostics include executing one or more functional test exercisers in a functional execution sequence for a device under test up to one or more checkpoints. One or more built-in structural test support circuits of the device under test is applied to identify one or more likely causes of a failure identified at the one or more checkpoints. ... International Business Machines Corporation
A method for detecting package tampering comprises performing first scanning of a container comprising a packaged item and a plurality of packaging elements surrounding the packaged item, wherein each of the plurality of packaging elements comprises an identification component, and the first scanning comprises using the identification component of each of the plurality of packaging elements to detect each of the plurality of packaging elements. The method further comprises determining an orientation of each of the plurality of packaging elements in the container from the first scanning, performing second scanning of the container, determining an orientation of each of the plurality of packaging elements in the container from the second scanning, and comparing the orientation of each of the plurality of packaging elements in the container from the first scanning with the orientation of each of the plurality of packaging elements in the container from the second scanning.. ... International Business Machines Corporation
A process of utilizing a water-sensitive fluorophore for moisture content evaluation in a hygroscopic polymer includes forming a blend that includes a hygroscopic polymer resin and a water-sensitive fluorophore. The process includes forming pellets having a particular geometry from the blend, determining fluorescence properties of at least one of the pellets, and determining moisture content of at least one of the pellets. ... International Business Machines Corporation
A particle concentration is determined by acquiring a particle concentration measurement at a reference station from each of a plurality of sensors to be evaluated. A reference particulate concentration measurement is acquired from a reference station sensor at the reference station. ... International Business Machines Corporation
Data indicating current driving characteristics of a driver driving a vehicle can be received in real time. A driving profile for the driver can be determined based on the data. ... International Business Machines Corporation
Data indicating current driving characteristics of a driver driving a vehicle can be received in real time. A driving profile for the driver can be determined based on the data. ... International Business Machines Corporation
Embodiments of the present invention provide a method, system and computer program product for verification of a generated route in computer assisted navigation. In an embodiment of the invention, a method for verification of a generated route in computer assisted navigation is provided. ... International Business Machines Corporation
A semiconductor structure is provided that can be used for dna sequencing detection. The semiconductor structure includes a doped epitaxial source semiconductor material structure located on a first portion of a semiconductor substrate and a doped epitaxial drain semiconductor material structure located on a second portion of the semiconductor substrate. ... International Business Machines Corporation
Aspects of the present invention provide an approach for controlling energy generation by an airflow originating from a moving elevator cabin. Wing pressure pads are positioned outside the elevator cabin extending to walls of the elevator shaft for preventing an airflow in the elevator shaft from above the elevator cabin to an area in the shaft below the elevator cabin. ... International Business Machines Corporation
A computer-implemented method, system, and/or computer program product controls a driving mode of a self-driving vehicle (sdv). One or more processors compare a control processor competence level of an on-board sdv control processor in controlling the sdv to a human driver competence level of a human driver in controlling the sdv while the sdv encounters a current roadway condition which is a result of current weather conditions of the roadway on which the sdv is currently traveling. ... International Business Machines Corporation
One or more sensors associated with a vehicle detect a roadway condition of a first roadway and an evasive maneuver is performed by the vehicle to avoid the detected roadway condition. In response to one or more processors determining that the evasive maneuver was successful, a record of the successful maneuver and the roadway condition are stored in a database. ... International Business Machines Corporation
A selection of a three-dimensional model by a user is received, and an interlocking block framework corresponding to the selected three-dimensional model is determined. The interlocking block framework includes one or more physical construction blocks configured to interlock with one another. ... International Business Machines Corporation
A selection of a three-dimensional model by a user is received, and an interlocking block framework corresponding to the selected three-dimensional model is determined. The interlocking block framework includes one or more physical construction blocks configured to interlock with one another. ... International Business Machines Corporation
A system for automatically generating an athletic training schedule includes a wearable device having one or more sensors for determining a quantity of athletic training performed by a user wearing the wearable device and an athletic performance of the user. A processor is configured to receive the quantity of athletic training performed and the athletic performance data from the wearable device, and to estimate a relationship between the quantity of athletic training performed and the athletic performance. ... International Business Machines Corporation
Embodiments for controlling an implantable cardiac device by one or more processors are described. Data from at least one wearable device sensor is received. ... International Business Machines Corporation
Plant-initiated, cognitive watering is provided, which includes ascertaining tensile stress on a root wall of a plant, and determining whether the tensile stress on the root wall of the plant reaches a specified threshold. Based on determining that the tensile stress on the root wall of the plant reaches the specified threshold, the method includes facilitating increasing water content in soil around the plant. ... International Business Machines Corporation
Embodiments of the invention provide high-efficiency cooling in a data center in response to a cooling and/or humidity demand using a system having multiple cooling loops to allow for a higher chilled liquid temperature of a first chilled liquid loop, while maintaining data center room temperature and humidity control. Specifically, the system includes a plurality of integrated cooling systems each comprising one or more specifically sized chillers and a liquid loop to address the cooling demand. ... International Business Machines Corporation
A wire-spring retained heatsink installation and removal tool for installing and removing wire-spring retained heatsinks. The wire-spring retained heatsink installation and removal tool includes a shaped portion that, when placed over a section of a torsion spring of a wire-spring retained heatsink, allows a force to be applied to the torsion spring such that a hook end of the torsion spring is forced into an associated hook on an assembly on which the wire-spring retained heatsink is being attached. ... International Business Machines Corporation
A system which provides redundant cooling of heat generating components within an electronic system with a single row of fans out the use of counter-rotational fans or multiple rows of fan by displacing failed fans in orthogonal directions. The system includes a fan track that has an orthogonal portion and at least one parallel portion. ... International Business Machines Corporation
Tamper-respondent assemblies and methods of fabrication are provided which include an enclosure, an in-situ-formed tamper-detect sensor, and one or more flexible tamper-detect sensors. The enclosure encloses, at least in part, one or more electronic components to be protected, and the in-situ-formed tamper-detect sensor is formed in place over an inner surface of the enclosure. ... International Business Machines Corporation
Biometric-based disabling of a mobile device is provided. The method includes enabling one or more biometric sensor(s) on a mobile device, and allowing setting of the biometric sensor(s) to enable use of the mobile device for a user. ... International Business Machines Corporation
A method includes, sensing an impact to a mobile device, and determining, if there is any damage to a sensor array on the mobile device. Responsive to receiving information about the damage to the sensor array on the mobile device, determining, the mobile data settings for the mobile device. ... International Business Machines Corporation
A method includes, sensing an impact to a mobile device, and determining, if there is any damage to a sensor array on the mobile device. Responsive to receiving information about the damage to the sensor array on the mobile device, determining, the mobile data settings for the mobile device. ... International Business Machines Corporation
A method and apparatus for controlling a second mobile device in response to a first mobile device having no connection to a telephony service. A first unique identifier is assigned to the first group by a broker service apparatus that is a computer apparatus. ... International Business Machines Corporation
Proximity-based sharing of venue-specific user location data is provided. The method includes, for instance, processing, in association with a locate facility, a request by one user that an other user meet the one user at a venue. ... International Business Machines Corporation
A method and system for improving an interactive video search is provided. The method includes receiving, by a remote control, data including video object based questions. ... International Business Machines Corporation
Embodiments describe a technique for utilizing biometric information to trigger an image capture, the technique includes selecting an emotion to monitor on a smart device disposed on an individual and monitoring the individual for the selected emotion using one or more sensors of the smart device. The technique also includes detecting the selected emotion based on biometric data from the sensors, and responsive to detecting the selected emotion, encoding a notification for broadcasting to an image capture device, the encoded notification indicating the selected emotion and identity of the individual. ... International Business Machines Corporation
Embodiments describe a technique for utilizing biometric information to trigger an image capture, the technique includes selecting an individual to monitor from an image capture device having a camera application, wherein the individual is wearing a smart device and wherein the image capture device is in communication with the smart device. The technique also includes selecting an emotion of the individual to monitor and receiving an emotion notification from the smart device indicating a detected change corresponding to the selected emotion. ... International Business Machines Corporation
In an approach for utilizing photographic metadata for automated photographic setup, a computer receives photographic metadata. The photographic metadata is contained within an image file. ... International Business Machines Corporation
A method, system and computer program product for utilizing a caller wait time. When the caller's estimated wait time exceeds a threshold amount of time, an interactive voice response (ivr) system retrieves information (e.g., caller's previous purchases) about the caller. ... International Business Machines Corporation
Disclosed embodiments provide improved communication between a caller and multiple parties. A caller performs a call spray operation on a group of contacts using an electronic communication device such as a mobile telephone. ... International Business Machines Corporation
In an aspect of the present disclosure, a method for capturing a context of a file download or modification is disclosed. The method includes designating a file storage location for monitoring, capturing a continuous stream of display data, monitoring the designated file storage location for the download of a new data file to the file storage location or the modification of an existing data file stored in the file storage location, determining that a download of a new data file or modification of an existing data file has been initiated, storing the new data file or the modification to the existing data file in the file storage location, storing the captured display data as file display data, and creating a correspondence between the file display data and the stored new data file or modified existing data file.. ... International Business Machines Corporation
A method, system, and computer program product for transferring files. The system provides for a data transfer system comprising a processor unit and a data transfer manager. ... International Business Machines Corporation
A computer system for scheduling downloads based on metadata in a client-server topology. A server receives from a client application a request for scheduling a download of a file, wherein the request for scheduling the download of the file comprises a requirement of a time period for downloading the file. ... International Business Machines Corporation
A computer program product for scheduling downloads based on metadata in a client-server topology. A server receives from a client application a request for scheduling a download of a file, wherein the request for scheduling the download of the file comprises a requirement of a time period for downloading the file. ... International Business Machines Corporation
A method, a computer program product, and a computer system for scheduling downloads based on metadata in a client-server topology. A server receives from a client application a request for scheduling a download of a file, wherein the request for scheduling the download of the file comprises a requirement of a time period for downloading the file. ... International Business Machines Corporation
The disclosure is directed to an autonomous method for dynamically providing a security policy. A method in accordance with an embodiment includes: determining an existence of a new internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update.. ... International Business Machines Corporation
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. ... International Business Machines Corporation
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. ... International Business Machines Corporation
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. ... International Business Machines Corporation
In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The computer determines whether the request from the user for the electronic transaction is suspicious. ... International Business Machines Corporation
A set of existing account information belonging to respective user accounts of a first set of users is retrieved. Pattern matching is performed by an attribute pattern discovery component on the retrieved set of existing account information to discover attribute patterns in the retrieved set of existing account information. ... International Business Machines Corporation
In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media list includes at least one media content item, and wherein the media list has associated access credentials that are set by the user. A processor receives a travel reservation for the user, wherein the travel reservation includes, at least, a departure location and a destination location. ... International Business Machines Corporation
In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media list includes at least one media content item, and wherein the media list has associated access credentials that are set by the user. A processor receives a travel reservation for the user, wherein the travel reservation includes, at least, a departure location and a destination location. ... International Business Machines Corporation
Embodiments for server port virtualization for guest logical unit number (lun) masking in a host direct attach configuration using a storage adapter in a computing environment by a processor. An f switch port is simulated by an n storage port to enable either n-port virtualization (npv) or n-port identification (id) virtualization (npiv) in the host direct attach configuration by directly attaching the n server port to the n storage port. ... International Business Machines Corporation
Content of an electronic message can be presented to a recipient of the electronic messaging. At least one visible user gesture made by the recipient while reviewing the content can be identified using an image capture device. ... International Business Machines Corporation
Aspects include managing distribution of messages from a message queue to a plurality of consumers for processing by maintaining a processing history for the messages in the message queue. The processing history identifies each message in the message queue by a message identifier and consumers having previously failed to successfully process a message in the message queue having the message identifier. ... International Business Machines Corporation
An approach is described of facilitating processing of a message at a target endpoint. The approach may facilitate message processing regardless of format. ... International Business Machines Corporation
A mobile data transmission management where a message sender's device queries a receiver's device to determine data remaining of a data quota associated with a time period and associated with a receiver of the message receiver's device. The data remaining for the receiver is categorized based on at least one threshold. ... International Business Machines Corporation
Disclosed aspects relate to window management in a stream computing environment. An indication of congestion may be detected with respect to the stream computing environment. ... International Business Machines Corporation
Disclosed aspects relate to window management in a stream computing environment. An indication of congestion may be detected with respect to the stream computing environment. ... International Business Machines Corporation
A method obtains a specification of a first test, which includes a set of requests for testing server operation according to a first protocol, and builds a specification of a second test, which includes requests and corresponding expected server responses for testing server operation according to a second protocol. Building the specification of the second test includes selecting and processing a request of the set of requests. ... International Business Machines Corporation
A method of managing an active-passive topology in a distributed computing environment comprising a plurality of systems each having a token manager connected to a common resource accessible by all of the systems comprising a token pool of tokens. The token manager locks the token pool and checks the token pool for an available token. ... International Business Machines Corporation
Aspects of the present invention include a method, which includes receiving, by a processor, data from one or more communicatively coupled objects associated with a device. The method further includes providing, by the processor, context information to the received data. ... International Business Machines Corporation
An aspect includes detecting a recurring intermittent error in a path of a network in a system that includes at least one data transmission port configured for connection to at least one shared data storage device via a plurality of paths of the network. It is determined by a path control module (pcm) in the network, whether a path recovery action has been initiated by a fiber channel protocol driver in the network. ... International Business Machines Corporation
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: receiving, by a network virtualization edge (nve) of a first virtual network (vn), a multicast packet from a virtual machine (vm) of the first virtual network (vn); determining, by the nve, whether the nve currently supports forwarding the multicast packet to a second nve of a second virtual network (vn), the second virtual network (vn) being logically separated from the first virtual network (vn); responsively to determining that the nve currently supports forwarding the multicast packet to a second nve of a second virtual network (vn) forwarding, by the nve, the multicast packet to the second nve.. ... International Business Machines Corporation
A method for cryptographic signing. The disclosure provides for a signature scheme to secure digital communication using homomorphic message encoding functions. ... International Business Machines Corporation
This invention relates to cryptographic signing. The disclosure provides for a signature scheme to secure digital communication using homomorphic message encoding functions. ... International Business Machines Corporation
A method and/or nfc (near field communication) enabled mobile device is provided for executing an electronic contract on nfc enabled mobile devices. The (nfc) enabled mobile device applies an electronic signature thereof in an electronic contract provided on the nfc enabled mobile device used by a first contracting party, where the electronic signature is applied through a secure element of the nfc enabled mobile device. ... International Business Machines Corporation
A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and functions. ... International Business Machines Corporation
A fiber optic light intensity encryption method is provided. The method includes determining light intensities associated with multi-frequency light pulses emitted by a laser transmitter apparatus in response to an encryptions process. ... International Business Machines Corporation
One embodiment provides a method comprising receiving an input data stream, partitioning the input data stream into a plurality of data blocks, and compressing the data blocks utilizing a plurality of processor sets. Each processor set is assigned a data block to compress. ... International Business Machines Corporation
An apparatus includes a voltage regulation module configured to provide an output voltage signal (vout) and an auto-calibration module configured to provide a calibration current signal (isink) corresponding to a voltage difference between a target voltage signal (vtarget) and the output voltage signal (vout). The voltage regulation module may adjust the output voltage in response to changes in the calibration current signal. ... International Business Machines Corporation
An apparatus includes a voltage regulation module configured to provide an output voltage signal (vout) and an auto-calibration module configured to provide a calibration current signal (isink) corresponding to a voltage difference between a target voltage signal (vtarget) and the output voltage signal (vout). The voltage regulation module may adjust the output voltage in response to changes in the calibration current signal. ... International Business Machines Corporation
Embodiments include a system, apparatus, and method for esd power clamps. Aspects include protecting a circuit using an esd power clamp device. ... International Business Machines Corporation
Selenium-fullerene heterojunction solar cells and techniques for fabrication thereof are provided. In one aspect, a method of forming a solar cell includes: forming a front contact on a substrate; depositing an n-type semiconducting layer on the front contact, wherein the n-type semiconducting layer comprises a fullerene or fullerene derivative; forming a p-type chalcogen absorber layer on the n-type semiconducting layer; depositing a high workfunction material onto the p-type chalcogen absorber layer, wherein the high workfunction material has a workfunction of greater than about 5.2 electron volts; and forming a back contact on the high workfunction material. ... International Business Machines Corporation
Semitransparent chalcogen solar cells and techniques for fabrication thereof are provided. In one aspect, a method of forming a solar cell includes: forming a first transparent contact on a substrate; depositing an n-type layer on the first transparent contact; depositing a p-type chalcogen absorber layer on the n-type layer, wherein a p-n junction is formed between the p-type chalcogen absorber layer and the n-type layer; depositing a protective interlayer onto the p-type chalcogen absorber layer, wherein the protective interlayer fully covers the p-type chalcogen absorber layer; and forming a second transparent contact on the interlayer, wherein the interlayer being disposed between the p-type chalcogen absorber layer and the second transparent contact serves to protect the p-n junction during the forming of the second transparent contact. ... International Business Machines Corporation
Replacement metal gate structures with improved chamfered workfunction metal and self-aligned contact and methods of manufacture are provided. The method includes forming a replacement metal gate structure in a dielectric material. ... International Business Machines Corporation
Provided is a method for forming a semiconductor structure. In embodiments, the method includes forming multiple channel nanosheets in multiple first stacks over a substrate. ... International Business Machines Corporation
A semiconductor device comprises a first semiconductor fin having a first width, the first semiconductor fin is arranged on a first portion of the strain relaxation buffer layer, where the first portion of the strain relaxation buffer layer has a second width and a second semiconductor fin having a width substantially similar to the first width, the second semiconductor fin is arranged on a second portion of the strain relaxation buffer layer, where the second portion of the strain relaxation buffer layer has a third width. A gate stack is arranged over a channel region of the first fin and a channel region of the second fin.. ... International Business Machines Corporation
A method of forming a semiconductor device and resulting device. The method may form a first gate on a gate region of a starting substrate. ... International Business Machines Corporation
A method is provided for three-dimensional wafer scale integration of heterogeneous wafers with unequal die sizes that include a first wafer and a second wafer. The method includes manufacturing the second wafer in accordance with a periodicity that matches the periodicity of the first wafer. ... International Business Machines Corporation
A method includes forming first structures on a first portion of a silicon substrate and second structures on a second portion of the substrate; forming spacers on the first structures; forming dummy gates on the first and second structures; depositing a first interlayer dielectric on the dummy gates; removing the dummy gates from the second structures; forming metal gates on the second structures; performing an anneal; forming recess areas in the first interlayer dielectric; removing the spacers from the first structures; epitaxially growing sidewalls on the first structures; removing portions of the first structures outside the dummy gates from the first portion; depositing a second interlayer dielectric on the first portion; removing the dummy gates from the first portion; removing portions of the first structures previously under the dummy gates from the first portion; and forming metal gates on the first structures.. . ... International Business Machines Corporation
A method includes forming first structures on a first portion of a silicon substrate and second structures on a second portion of the substrate; forming spacers on the first structures; forming dummy gates on the first and second structures; depositing a first interlayer dielectric on the dummy gates; removing the dummy gates from the second structures; forming metal gates on the second structures; performing an anneal; forming recess areas in the first interlayer dielectric; removing the spacers from the first structures; epitaxially growing sidewalls on the first structures; removing portions of the first structures outside the dummy gates from the first portion; depositing a second interlayer dielectric on the first portion; removing the dummy gates from the first portion; removing portions of the first structures previously under the dummy gates from the first portion; and forming metal gates on the first structures.. . ... International Business Machines Corporation
Cmos inverters including gate-all-around vertical transistors are fabricated without requiring center gate contacts, thereby allowing close positioning of the transistors. The gate contact and the drain contact of the transistors are shared. ... International Business Machines Corporation
A complementary metal oxide semiconductor (cmos) vertical transistor structure with closely spaced p-type and n-type vertical field effect transistors (fets) is provided. After forming a dielectric material portion contacting a proximal sidewall of a first semiconductor fin for formation of a p-type vertical fet and a proximal sidewall of a second semiconductor fin for formation of an n-type vertical fet, a first gate structure is formed contacting a distal sidewall of the first semiconductor fin, and a second gate structure is formed contacting a distal sidewall of the second semiconductor fin. ... International Business Machines Corporation
A complementary metal oxide semiconductor (cmos) vertical transistor structure with closely spaced p-type and n-type vertical field effect transistors (fets) is provided. After forming a dielectric material portion contacting a proximal sidewall of a first semiconductor fin for formation of a p-type vertical fet and a proximal sidewall of a second semiconductor fin for formation of an n-type vertical fet, a first gate structure is formed contacting a distal sidewall of the first semiconductor fin, and a second gate structure is formed contacting a distal sidewall of the second semiconductor fin. ... International Business Machines Corporation
Semiconductor devices are fabricated with vertical field effect transistor (fet) devices having uniform structural profiles. Semiconductor fabrication methods for vertical fet devices implement a process flow to fabricate dummy fins within isolation regions to enable the formation of vertical fet devices with uniform structural profiles within device regions. ... International Business Machines Corporation
A method for removing an electrical component from a substrate where the component is coupled to the substrate by connection elements. The method includes disposing liquid gallium (ga) at or near an edge of the component and dispersing the liquid ga between the substrate and the component such that the liquid ga contacts one or more of the connection elements. ... International Business Machines Corporation
A method for removing an electrical component from a substrate where the component is coupled to the substrate by connection elements. The method includes disposing liquid gallium (ga) at or near an edge of the component and dispersing the liquid ga between the substrate and the component such that the liquid ga contacts one or more of the connection elements. ... International Business Machines Corporation
Semiconductor devices are provided which have mim (metal-insulator-metal) capacitor structures that are integrated within air gaps of on-chip interconnect structures, as well as methods for integrating mim capacitor formation as part of an air gap process flow for fabricating on-chip interconnect structures. For example, a semiconductor device includes a dielectric layer with a first pattern of metal lines and second pattern of metal lines. ... International Business Machines Corporation
An interconnect structure is provided in which a seed enhancement spacer is present on vertical surfaces, but not a horizontal surface, of a diffusion barrier liner that is located in an opening present in an interconnect dielectric material layer. An interconnect metal or metal alloy structure is present on physically exposed sidewalls of the seed enhancement spacer and on the physically exposed horizontal surface of the diffusion barrier liner.. ... International Business Machines Corporation
An interconnect structure is provided in which a seed enhancement spacer is present on vertical surfaces, but not a horizontal surface, of a diffusion barrier liner that is located in an opening present in an interconnect dielectric material layer. An interconnect metal or metal alloy structure is present on physically exposed sidewalls of the seed enhancement spacer and on the physically exposed horizontal surface of the diffusion barrier liner.. ... International Business Machines Corporation
A method of making a semiconductor device includes forming a first silicon germanium layer on a substrate, the first silicon germanium layer forming a portion of a first transistor; forming a second silicon germanium layer on the substrate adjacent to the first silicon germanium layer, the second silicon germanium layer forming a portion of a second transistor and having a germanium content that is different than the first silicon germanium layer and a thickness that is substantially the same; growing by an epitaxial process a compressively strained silicon germanium layer on the first silicon germanium layer, and a tensile strained silicon germanium layer on the second silicon germanium layer; patterning a first fin in the compressively strained silicon germanium layer and the first silicon germanium layer; and patterning a second fin in the tensile strained silicon germanium layer and the second silicon germanium layer.. . ... International Business Machines Corporation
A method for forming conductive lines comprises forming a hardmask on an insulator layer, a planarizing layer on the hardmask, and a hardmask on the planarizing layer, removing exposed portions of a layer of sacrificial mandrel material to form first and second sacrificial mandrels on the hardmask, and depositing a layer of spacer material in the gap, and over exposed portions of the first and second sacrificial mandrels and the hardmask. Portions of the layer of spacer material are removed to expose the first and second sacrificial mandrels. ... International Business Machines Corporation
An interconnect structure having a pitch of less than 40 nanometers and a self-aligned quadruple patterning process for forming the interconnect structure includes three types of lines: a β line defined by a patterned bottom mandrel formed in the self-aligned quadruple patterning process; a γ line defined by location underneath a top mandrel formed in the self-aligned quadruple patterning process; and an α line defined by elimination located underneath neither the top mandrel or the bottom mandrel formed in the self-aligned quadruple patterning process. The interconnect structure further includes multi-track jogs selected from a group consisting of a βγβ jog; a βαβ jog; and αβγ jog; a γβα jog, and combinations thereof. ... International Business Machines Corporation
An electronic package includes a carrier and a semiconductor chip. In a first aspect, a lid is attached to the chip and subsequently the gap between the lid and the carrier is filled by a seal band that includes seal band material and a plurality of shim members. ... International Business Machines Corporation
A subtractive forming method that includes providing a material stack including a samarium and selenium containing layer and an aluminum containing layer in direct contact with the samarium and selenium containing layer. The samarium component of the samarium and selenium containing layer of the exposed portion of the material stack is etched with an etch chemistry comprising citric acid and hydrogen peroxide that is selective to the aluminum containing layer. ... International Business Machines Corporation
Methods are provided to form pure silicon oxide layers on silicon-germanium (sige) layers, as well as an fet device having a pure silicon oxide interfacial layer of a metal gate structure formed on a sige channel layer of the fet device. For example, a method comprises growing a first silicon oxide layer on a surface of a sige layer using a first oxynitridation process, wherein the first silicon oxide layer comprises nitrogen. ... International Business Machines Corporation
Methods are provided to form pure silicon oxide layers on silicon-germanium (sige) layers, as well as an fet device having a pure silicon oxide interfacial layer of a metal gate structure formed on a sige channel layer of the fet device. For example, a method comprises growing a first silicon oxide layer on a surface of a sige layer using a first oxynitridation process, wherein the first silicon oxide layer comprises nitrogen. ... International Business Machines Corporation
An etch process that includes removing an oxide containing surface layer from a semiconductor surface to be etched by applying a hydrofluoric (hf) based chemistry, wherein the hydrofluoric (hf) based chemistry terminates the semiconductor surface to be etched with silicon-hydrogen bonds, and applying a vapor priming agent bearing chemical functionality based on the group consisting of alkynes, alcohols and a combination thereof to convert the silane terminated surface to a hydrophobic organic surface. The method continues with forming a photoresist layer on the hydrophobic organic surface; and patterning the photoresist layer. ... International Business Machines Corporation
An etch process that includes removing an oxide containing surface layer from a semiconductor surface to be etched by applying a hydrofluoric (hf) based chemistry, wherein the hydrofluoric (hf) based chemistry terminates the semiconductor surface to be etched with silicon-hydrogen bonds, and applying a vapor priming agent bearing chemical functionality based on the group consisting of alkynes, alcohols and a combination thereof to convert the silane terminated surface to a hydrophobic organic surface. The method continues with forming a photoresist layer on the hydrophobic organic surface; and patterning the photoresist layer. ... International Business Machines Corporation
A method for semiconductor processing includes forming a trilayer resist structure having a middle layer disposed between a top layer and a bottom layer. The top layer is removed from a first region to expose the middle layer in the first region, and the middle layer and the bottom layer are removed in the first region to expose a structure to be processed. ... International Business Machines Corporation
A patterning method that includes providing an amorphous semiconductor surface to be patterned, and terminating the amorphous semiconductor surface by forming silicon-hydrogen (si—h) on the surface to be patterned. A photoresist is formed on the surface to be patterned. ... International Business Machines Corporation
A patterning method that includes providing an amorphous semiconductor surface to be patterned, and terminating the amorphous semiconductor surface by forming silicon-hydrogen (si—h) on the surface to be patterned. A photoresist is formed on the surface to be patterned. ... International Business Machines Corporation
A computer-implemented method, according to one embodiment, includes: determining, by the computer, whether a difference between information and corresponding design values is in a range. The information corresponds to how an array of writers write and/or are expected to write to a magnetic medium during shingled recording. ... International Business Machines Corporation
Procedure dialogs are improved through knowledge mining within a reinforcement learning framework. Taking an existing procedure dialog as input, a machine learning model is generated. ... International Business Machines Corporation
Embodiments of the present invention provide a method comprising receiving a task set comprising multiple tasks, receiving operational information identifying one or more operating characteristics of multiple drones, and obtaining an initial heuristic ordering of the multiple tasks based on the operational information and the climate information. Each task has a corresponding task location. ... International Business Machines Corporation
A map-display-based, computer-implemented approach is provided for providing directions to a user to assist the user in reaching a destination. The approach includes, for instance, collecting at a map display user input data, where the user input data includes the user's destination. ... International Business Machines Corporation
A map-display-based, computer-implemented approach is provided for providing directions to a user to assist the user in reaching a destination. The approach includes, for instance, collecting at a map display user input data, where the user input data includes the user's destination. ... International Business Machines Corporation
A computer-implemented method causes an amelioration of an erratic manner in which a vehicle is being driven. One or more processors receive, from at least one sensor associated with a vehicle, sensor readings indicating that the vehicle is being operated by a driver in an erratic manner. ... International Business Machines Corporation
Techniques are described relating to alert propagation in a virtualized computing environment. An associated method may include receiving a notification regarding an incident in an environment in which computing capabilities are provided as a service. ... International Business Machines Corporation
A method for generating an alert on a mobile device in an absence of a radio-frequency identification (rfid) tag in proximity to the mobile device is provided herein. The method comprises defining an event. ... International Business Machines Corporation
Provided are techniques for monitoring a moving vessel using a detachable drone coupled to the moving vessel. An event is identified that triggers detachment of the detachable drone from the moving vessel. ... International Business Machines Corporation
A method, system, and computer program product, include obtaining window status decision information based on vehicle interior background noise and determining switch status of the vehicle window(s) based on the obtained window status decision information.. . ... International Business Machines Corporation
A computer-implemented method, according to one embodiment, includes: generating two or more sample graphs by sampling edges of a current snapshot of a dynamic graph, generating two or more partial results by executing an algorithm on the two or more sample graphs, combining the partial results into a final result, and incrementally maintaining the sample graphs. Edges included in the current snapshot of a dynamic graph and which were added to the dynamic graph in a most recent update thereto are included in each of the generated two or more sample graphs. ... International Business Machines Corporation
Shifting of a focus of a first user within a first 360-view data is tracked during an observation of the first 360-view data by the first user to determine a first set of pois in the 360-view data where the first user pauses for a duration. A subset of the first set of pois is regarded as non-obvious pois in the first 360-view data. ... International Business Machines Corporation
Methods, systems, and computer program products for detecting hand-eye coordination in real time by combining camera eye tracking and wearable sensing are provided herein. A computer-implemented method includes determining an eye gaze path of an individual during a given period of time by measuring (i) any eye movements made by the individual during the given period of time and (ii) any head movements made by the individual during the given period of time; measuring any hand movements made by the individual during the given period of time; performing a spatio-temporal analysis of the determined eye gaze path and the measured hand movements to compute a hand-eye coordination value attributable to the individual; and outputting the computed hand-eye coordination value to at least one user.. ... International Business Machines Corporation
Techniques that facilitate matrix factorization associated with graphics processing units are provided. In one example, a computer-implemented method is provided. ... International Business Machines Corporation
Techniques that facilitate matrix factorization associated with graphics processing units are provided. In one example, a computer-implemented method is provided. ... International Business Machines Corporation
Techniques facilitating mitigation of dangerous activities are provided. In one example, a computer-implemented method can include detecting, by a system operatively coupled to a processor, a trigger event based on a determination that a security risk level satisfies a defined condition associated with the security risk level. ... International Business Machines Corporation
Techniques facilitating mitigation of dangerous activities are provided. In one example, a computer-implemented method can include detecting, by a system operatively coupled to a processor, a trigger event based on a determination that a security risk level satisfies a defined condition associated with the security risk level. ... International Business Machines Corporation
Disclosed aspects relate to dynamic irregularity management in a multiple-individual evaluation-activity environment. A set of activity data pertaining to the multiple-individual evaluation-activity environment may be collected. ... International Business Machines Corporation
Disclosed aspects relate to dynamic irregularity management in a multiple-individual evaluation-activity environment. A set of activity data pertaining to the multiple-individual evaluation-activity environment may be collected. ... International Business Machines Corporation
A computer-implemented method includes detecting a first and second set of citations to a plurality of legal cases cited in a plurality of legal documents and a first legal document distinct from the plurality of legal documents, respectively. The computer-implemented method further includes determining a first and second set of tones corresponding to each citation in the first and second sets of citations, respectively. ... International Business Machines Corporation
A computer-implemented method includes detecting a first and second set of citations to a plurality of legal cases cited in a plurality of legal documents and a first legal document distinct from the plurality of legal documents, respectively. The computer-implemented method further includes determining a first and second set of tones corresponding to each citation in the first and second sets of citations, respectively. ... International Business Machines Corporation
Embodiments of the present invention provide techniques for identifying and quantifying waste in a process. Waste information is input via images and/or natural language. ... International Business Machines Corporation
An approach is described for addressing propagation of inaccurate information in a social networking environment. An associated method may include identifying inaccurate information within the social networking environment, facilitating creation of countering content to address the inaccurate information, and disseminating the countering content. ... International Business Machines Corporation
Based on derived subject context of a user from subject data collected, analytics can match the subject context such as user status with item usage situation, and user goal based on subject data with item data context functions such as item purpose, and user sentiments with item sentiments addressed. Based on a product that matches at least one and preferably two of the derived subject contexts, the right brand, which is contextually relevant to the customer or user at that point in time or in real time, can be recommended to the user.. ... International Business Machines Corporation
A computerized sales tool used to stimulate sales of products and related products in a retail outlet. The tool comprises an in-store computer server, a database that stores shoppers' shopping profiles, a computer based, intelligent information retrieval system, and gaze sensors and shopper identification sensors mounted on a product rack in a store. ... International Business Machines Corporation
This invention relates to a method, system and computer program for assessing enhanced dynamic keyword-based advertising campaigns, such that a site-level keyword search request of a web page is tracked, where the site-level keyword search request includes at least one search term. The frequency of usage of the search term of the site-level keyword search request is monitored, and the frequency of usage of the search term is compared with a predetermined value. ... International Business Machines Corporation
A method, system and computer program product are disclosed for using shoppers for in-venue pick up of online orders. In an embodiment, the method comprises determining that an online order has been placed by a first shopper for a product in a venue, identifying a second shopper in a specified area to get the product, sending to the second shopper a message including a promotional offer in exchange for getting the product, receiving the product from the second shopper, and in response to receiving the product from the second shopper, honoring the promotional offer. ... International Business Machines Corporation
A valid combination of products is constructed from a set of products identified by a retailing backend system. The valid combination satisfies a condition of an offer. ... International Business Machines Corporation
Embodiments of the present invention provide a method, system and computer program product for dynamically determining dwell times in a zone of a retail setting. In an embodiment of the invention, a method for dynamically determining dwell times in a zone of a retail setting includes defining different zones of a retail setting in memory of a host computing system and establishing a different dwell time for each of the different zones. ... International Business Machines Corporation
Embodiments of the invention include methods, systems and computer program products for predicting customer purchasing behavior. Aspects include receiving, from a sensor, first customer sensor data about a first customer in a store, wherein the first customer sensor data includes accompaniment data about one or more accompaniments of the first customer. ... International Business Machines Corporation
Methods are disclosed for a digital escrow service for an electronic transfer, where the transfer is completed based on the geographic location of the sender or receiver. The method includes obtaining information representative of a geographic area, initiating an electronic transfer, determining whether or not at least one of the sender and the receiver is located within the geographic area and executing the electronic transfer based on whether it is determined that at least one of the sender and receiver is located within the geographic area. ... International Business Machines Corporation
For each of a plurality of e-mail files contained in a first data repository, at least one score for the e-mail file can be determined. Determining the at least one score can include determining whether the e-mail file contains at least one design element and, responsive to determining that the e-mail file contains at least one design element, determining whether the design element is authored by a template developer. ... International Business Machines Corporation
A computer processor may extract identity information from a document. The identity information may include at least one custodian identity attribute. ... International Business Machines Corporation
Managing misuse of machinery by an operator is disclosed. A system learns a set of safety conditions which are associated with tasks completed by an operator using machinery. ... International Business Machines Corporation
A method for using oral feedback to facilitate user selection among a plurality of service devices. The method comprises a plurality of service devices. ... International Business Machines Corporation
A technique relates to an assembly for a quantum computing device. A quantum bus plane includes a first set of recesses. ... International Business Machines Corporation
A method, and associated computer system and computer program product. Tracking data relating to movement of two or more entities associated with individuals over a past time period is received. ... International Business Machines Corporation
One embodiment provides a method, including: an application receiving, from a requesting application, a request for identifying an attribute of user behavior regarding his or her use of the requesting application, wherein the attribute corresponds to an emotional state of the user; identifying, from at least one wearable device operatively coupled to the receiving application, a plurality of sensors accessible to the receiving application; identifying, from the plurality of accessible sensors, at least one sensor that monitors information corresponding to the attribute; determining the value of the attribute by analyzing the information of the at least one sensor, wherein the analyzing comprises comparing the obtained information to information stored in at least one user behavior model directed to the attribute; and providing the determined value of the attribute to the requesting application, whereupon the requesting application modifies a parameter of the requesting application based upon the provided determined value.. . ... International Business Machines Corporation
A cognitive computing system for improve effectiveness of communications among multiple members is disclosed. The cognitive computing system receives real-time information representing communications among a plurality of members through a plurality of communication media. ... International Business Machines Corporation
Methods, computer program products, and systems are presented. The methods include, for instance: predicting a reaction by a user that may be caused from receiving social media content. ... International Business Machines Corporation
One embodiment provides a system comprising a memory device for maintaining deterministic neural data relating to a digital neuron and a logic circuit for deterministic neural computation and stochastic neural computation. Deterministic neural computation comprises processing a neuronal state of the neuron based on the deterministic neural data maintained. ... International Business Machines Corporation
Long-short term memory (lstm) cells on spiking neuromorphic hardware are provided. In various embodiments, such systems comprise a spiking neurosynaptic core. ... International Business Machines Corporation
A technique for answering questions includes receiving a question directed to a first subject. A mathematical operation is performed between each of one or more first topic vectors (associated with the first subject) and each of one or more second topic vectors (associated with a second subject) to generate respective strength values. ... International Business Machines Corporation
A technique for answering questions includes receiving a question directed to a first subject. A mathematical operation is performed between each of one or more first topic vectors (associated with the first subject) and each of one or more second topic vectors (associated with a second subject) to generate respective strength values. ... International Business Machines Corporation
Data representing an image is received by an image recognition system. An image recognition system generates an image classification output distribution for a plurality of image features based on analysis of the data representing the image and training data stored for the image recognition system. ... International Business Machines Corporation
In an approach to managing a quick response code branding device and management of a quick response code branding device, one or more computer processors receive one or more quick response code configuration parameters. The one or more computer processors determine one or more program instructions corresponding to the one or more quick response code configuration parameters based on one or more task-specific factors. ... International Business Machines Corporation
A method, apparatus and product for using a predictive model to predict if inputs reach a vulnerability of a program. Given a sample input, which when provided to a program being executed, is configured to cause execution of the program to reach a vulnerability, a set of variant inputs and labels thereof is generated based on the sample input and execution of the program with each variant input. ... International Business Machines Corporation
A method, computer product and computerized system, the method comprising: obtaining computer code, wherein the computer code is comprised of code blocks arranged in a first order and providing a functionality, wherein each code block of the code blocks comprises one or more program instructions; determining, by a processor, one or more constraints on reordering the code blocks in a second order, such that a second computer code comprising the code blocks arranged in the second order, when executed, provides the functionality; and providing the constraints to an automatic solver for determining the second order.. . ... International Business Machines Corporation
An approach is described of facilitating resolution of a human authentication test. The approach may facilitate user completion of a human authentication test having at least one image while preserving security against bots. ... International Business Machines Corporation
Providing supplemental authentication of a user based on hand gesture activity of a user with an application of a device after a user has completed a successful authentication challenge to initially access the device. Hand gesture activity of the user with the device is recorded during current use of an application of the device. ... International Business Machines Corporation
Providing supplemental authentication of a user based on hand gesture activity of a user with an application of a device after a user has completed a successful authentication challenge to initially access the device. Hand gesture activity of the user with the device is recorded during current use of an application of the device. ... International Business Machines Corporation
Medical data for transcription into a medical record is received. As the medical data is received, in real time: a computer-understandable meaning of text contained in the medical data can be identified by performing natural language processing on the text contained in the medical data; at least one medical transcription rule that applies to the medical data can be identified by processing the computer-understandable meaning of the text contained in the medical data; whether the medical data is incomplete can be determined by processing the computer-understandable meaning of text using the at least one medical transcription rule; and, responsive to determining that the medical data is incomplete, at least one annotation can be added to the medical record, the at least one annotation indicating data that is missing from the medical record and where in the medical record the data is missing.. ... International Business Machines Corporation
A data processing system to implement wiring/silicon blockages via parameterized cells (pcells) includes a front end-of-line placement/blockage (feol p/b) controller to generate a placement blockage based on an input parameter corresponding to a physical design of an integrated circuit (ic). The feol p/b outputs a placement blockage parameter that is stored in a wire track allocation database to indicate the placement blockage. ... International Business Machines Corporation
Examples of techniques for statistical static timing analysis of an integrated circuit are disclosed. In one example according to aspects of the present disclosure, a computer-implemented method is provided. ... International Business Machines Corporation
A method for analyzing power in a circuit includes identifying equivalent elements in a source netlist representing the circuit. Abstract elements are formed combining the equivalent elements of the source netlist. ... International Business Machines Corporation
A method for analyzing power in a circuit includes identifying equivalent elements in a source netlist representing the circuit. Abstract elements are formed combining the equivalent elements of the source netlist. ... International Business Machines Corporation
A method for formally verifying a hardware/software co-design includes providing in a co-design, a first model, and a second model, the first model is one of a hardware model, and the second model is one of a software model, or vice versa, providing a safety property expected to be satisfied by the co-design, combining an abstraction of the first model and the safety property to obtain an abstracted first model, composing the abstracted first model and the second model to obtain a composed model, checking if the composed model satisfies the safety property, and signaling that the hardware/software co-design violates the safety property if the safety property is violated in the composed model.. . ... International Business Machines Corporation
A system, method and program product for application landscape processing. A system is disclosed that includes: a contextual analysis engine that analyzes structured and unstructured data from external source information, internal source information, and application usage patterns to identify performance indicators; a system for storing metadata for each application in an application landscape, wherein metadata for each application specifies a set of application parameters and associated values; and a priority calculator that calculates a priority score for applications in the application landscape, wherein the priority score for a selected application is determined by evaluating performance indicators that correlate to metadata of the selected application.. ... International Business Machines Corporation
Embodiments of the present invention provide systems and methods for the discovery of facets. A search query over sets of data (e.g., a set of documents) leads to search results. ... International Business Machines Corporation
Embodiments of the present invention provide systems and methods for the discovery of facets. A search query over sets of data (e.g., a set of documents) leads to search results. ... International Business Machines Corporation
A web application programming interfaces (api) recommendations technology for use in existing context (e.g., considering an already selected api) is disclosed. For example, recommendations for a “next” api, considering already “selected” apis can be provided. ... International Business Machines Corporation
A web application programming interfaces (api) recommendations technology for use in existing context (e.g., considering an already selected api) is disclosed. For example, recommendations for a “next” api, considering already “selected” apis can be provided. ... International Business Machines Corporation
A computer-implemented method includes identifying an information resource. The information resource includes text information. ... International Business Machines Corporation
A computer-implemented method includes identifying an information resource. The information resource includes text information. ... International Business Machines Corporation
A technique for calculating a semantic distance between subjects includes performing a mathematical operation between each of one or more first topic vectors and each of one or more second topic vectors to generate respective strength values. The first topic vectors are associated with respective first topics of a first subject, the second topic vectors are associated with respective second topics of a second subject, and the respective strength values are indicative of a relative closeness between associated ones of the first and second topics. ... International Business Machines Corporation
One embodiment provides a method comprising receiving a plurality of encoded and compressed data blocks, decoding the data blocks, and decompressing the data blocks utilizing a plurality of processor sets. Each processor set is assigned a data block to decompress. ... International Business Machines Corporation
Embodiments for reducing resource consumption of a similarity index in data deduplication by a processor. Only a latest generation of repository data is represented in the similarity index. ... International Business Machines Corporation
A method, computer program product, and system includes a processor(s) executing a new instruction in place of a left outer join instruction to generate a data set, where the left outer join instruction includes at least two tables and an indication of a column in each the tables to join on. Executing the new instruction includes the processor(s) creating a temporary table including all columns of the at least two tables, where values in fields of the temporary table are null values, executing an inner join instruction, the inner join instruction includes the indication of the column in each of the at least two tables to join on, to create a preliminary results set, and generating the data set, wherein the generating includes the processor(s) overlaying the preliminary results set on the temporary table to update a portion of the null values with values from the preliminary results set.. ... International Business Machines Corporation
A blockchain may be used to store transactions in an immutable ledger. The types of transactions may vary and the information from the transactions could be used to identify information about nodes in a particular network. ... International Business Machines Corporation
Using a set of characteristics of a posted image, data from a social media platform is searched for a set of related images, a related image having at least a subset of the set of characteristics. For a related image in the set of related images, information corresponding to the related image is processed to extract an additional information that is usable with the posted image. ... International Business Machines Corporation
A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. ... International Business Machines Corporation
A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. ... International Business Machines Corporation
Techniques disclosed herein provide electronic case versioning in a case management system. A request to capture a snapshot of an electronic case at a current point in time is received. ... International Business Machines Corporation
A technique for calculating a semantic distance between subjects includes performing a mathematical operation between each of one or more first topic vectors and each of one or more second topic vectors to generate respective strength values. The first topic vectors are associated with respective first topics of a first subject, the second topic vectors are associated with respective second topics of a second subject, and the respective strength values are indicative of a relative closeness between associated ones of the first and second topics. ... International Business Machines Corporation
An approach is provided that receives a question at a question answering (qa) system. The question includes a number of words. ... International Business Machines Corporation
An approach is provided that receives a question at a question answering (qa) system. The question includes a number of words. ... International Business Machines Corporation
A method for context-aware translation is provided. The present invention may include receiving a program integrated information file (pii) associated with a graphical user interface object of with a software product. ... International Business Machines Corporation
A method for context-aware translation is provided. The present invention may include receiving a program integrated information file (pii) associated with a graphical user interface object of with a software product. ... International Business Machines Corporation
A method for context-aware translation is provided. The present invention may include receiving a program integrated information file (pii) associated with a graphical user interface object of with a software product. ... International Business Machines Corporation
The present invention provides a method and system for converting a first language of a soundtrack of a person speaking in a video to a second language. The method defines an outline of a shape of a mouth opening of the person speaking a syllable of a word of the first language in the video at a given start time by selecting a predetermined number of points along a border of the mouth opening defined by the lips. ... International Business Machines Corporation
A mechanism is provided updating a knowledge base of a sentiment analysis system, the knowledge base being operable for storing natural language terms and a score value related to each natural language term, the score value characterizing the sentiment of the natural language term. Messages comprising natural language are received. ... International Business Machines Corporation
A computer-implemented method includes detecting a first set and a second set of citations to a legal case in a plurality of legal documents and a first legal document distinct from the plurality of legal documents, respectively. The computer-implemented method further includes determining tones corresponding to each citation in the first and second sets of citations. ... International Business Machines Corporation
Natural language processing of raw text data for optimal sentence boundary placement. Raw text is extracted from a document and subject to cleaning. ... International Business Machines Corporation
Methods, computer program products, and systems are presented. The methods include, for instance: monitoring one or more message of the conversation between multiple users for an entity reference; detecting the entity reference in a message in the conversation. ... International Business Machines Corporation
Methods, computer program products, and systems are presented. The methods include, for instance: monitoring one or more message of the conversation between multiple users for an entity reference; detecting the entity reference in a message in the conversation. ... International Business Machines Corporation
Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). ... International Business Machines Corporation
Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). ... International Business Machines Corporation
The present invention may be a method, a system, and/or a computer program product. An embodiment of the present invention provides a method for paraphrasing, on a client computer, text in a webpage, the method comprising the following: transferring a request for a webpage including a plurality of passages of text to a server; receiving the webpage from the server in response to the request; judging whether or not the received webpage has text which is a subject of paraphrase; in a case where the judgment is positive, paraphrasing the text; and displaying, on a display, the webpage including the paraphrased text. ... International Business Machines Corporation
Space of a data storage memory of a data storage memory system is reclaimed by determining heat metrics of data stored in the data storage memory; determining relocation metrics related to relocation of the data within the data storage memory; determining utility metrics of the data relating the heat metrics to the relocation metrics for the data; and making the data whose utility metric fails a utility metric threshold, available for space reclamation.. . ... International Business Machines Corporation
A system and method dynamically allocate address translation tables for direct memory access windows by donating logical memory blocks to allocate to the address translation tables. A dynamic address translation table allocation module dynamically changes the allocation of memory to the address translation tables without a platform or partition reboot. ... International Business Machines Corporation
Embodiments include a method for generation of test scenarios based on risk analysis. The method includes receiving a first set of code test scenarios, the first set of code test scenarios configured to test one or more first code components, the first code components each including first code attributes. ... International Business Machines Corporation
A computer implemented method for selecting breakpoints for cross-layer debugging is provided. The method includes receiving code comprising a plurality of layers, and executing a static analysis of the code to obtain a use-definition (ud) chain, alias information, and a parameter mapping for each of the plurality of layers. ... International Business Machines Corporation
Error checking for a computer processor design under test. In multiple processing threads, and in accordance with a hardware model of a computer processor design under test, the instructions of multiple instruction sequences corresponding to the processing threads are processed, thereby resulting in an order in which the instructions are processed in accordance with the hardware model, and producing an actual result for each of the instructions. ... International Business Machines Corporation
Compare points are detected in a multi-threaded computing environment. One thread of the multi-threaded computing environment has reached a compare point for the one thread. ... International Business Machines Corporation
An approach is provided in which an information handling system retrieves a snapshot of a first service in response to determining that the first service has failed. The snapshot was captured at a point in time prior to the failure of the first service. ... International Business Machines Corporation
Embodiments include accelerating capture of a system dump at system failure in a computer system. A method includes capturing a system snapshot that includes data from real memory frames of the computer system and storing the system snapshot in a storage. ... International Business Machines Corporation
Embodiments include accelerating capture of a system dump at system failure in a computer system. A method includes capturing a system snapshot that includes data from real memory frames of the computer system and storing the system snapshot in a storage. ... International Business Machines Corporation
A method for execution by dispersed storage failure detection unit of a dispersed storage network includes generating a storage unit weights and storage set weights based on the storage unit weights. One storage unit that meets a weight-adjustment trigger condition is identified, and a new storage unit weight for the identified storage unit is generated. ... International Business Machines Corporation
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit that causes the processing circuit to receive a congestion notification message from a first virtual switch of a first server indicating that a first virtual machine (vm) hosted by the first server is overloaded. The logic also causes the processing circuit to advertise a congestion status of the first vm in a congestion status message to one or more virtual switches in a network in response to receiving the congestion notification message. ... International Business Machines Corporation
Embodiments relate to virtual machine (vm) migration via a mobile device. A method includes requesting, by a mobile device, a source computer to capture a state and memory contents of a vm executing on the source computer. ... International Business Machines Corporation
Virtual machine volumes may be migrated between software defined storage (sds) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first sds system to migrate to a second sds system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second sds system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first sds system.. ... International Business Machines Corporation
There are provided a system, a method and a computer program product for selecting an active data stream (a lane) while running spmd (single program multiple data) code on simd (single instruction multiple data) machine. The machine runs an instruction stream over input data streams. ... International Business Machines Corporation
Operation of a multi-slice processor including execution slices and load/store slices, where the load/store slices are coupled to the execution slices via a results bus and the results bus includes segments assigned to carry results of a different instruction type, includes: receiving a producer instruction that includes an identifier of an instruction type and an identifier of the producer instruction, including storing the identifier of the instruction type and the identifier of the producer instruction in an entry of a register; receiving a source instruction dependent upon the result of the producer instruction including storing, in an issue queue, the source instruction, the identifier of the instruction type of the producer instruction, and an identifier of the producer instruction; and snooping the identifier of the producer instruction only from the segment of the results bus assigned to carry results of the instruction type of the producer instruction.. . ... International Business Machines Corporation
A computer-implemented method for marking load and store instruction overlap in a processor pipeline is described. The method includes detecting a load instruction following a store instruction in an instruction stream. ... International Business Machines Corporation
Operation of a multi-slice processor including execution slices and load/store slices, where the load/store slices are coupled to the execution slices via a results bus and the results bus includes segments assigned to carry results of a different instruction type, includes: receiving a producer instruction that includes an identifier of an instruction type and an identifier of the producer instruction, including storing the identifier of the instruction type and the identifier of the producer instruction in an entry of a register; receiving a source instruction dependent upon the result of the producer instruction including storing, in an issue queue, the source instruction, the identifier of the instruction type of the producer instruction, and an identifier of the producer instruction; and snooping the identifier of the producer instruction only from the segment of the results bus assigned to carry results of the instruction type of the producer instruction.. . ... International Business Machines Corporation
A classloader object cache is instantiated from programmed code of a classloader cache class definition. The classloader object cache is referenced by a strong internal reference that is assigned programmatically within a classloader object at instantiation of the classloader object cache and prevents garbage collection of the classloader object cache while the classloader object is loaded and executing. ... International Business Machines Corporation
For automatically applying update to snapshots of a virtual machine (vm), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual nic in the cloned vm is disabled, an update is applied to the cloned vm to which a second virtual nic has been added, the second virtual nic is deleted from the cloned vm to which the update has been applied, the first virtual nic is enabled, and a second snapshot of the cloned vm is generated with the enabled first virtual nic wherein the second snapshot is associated with the virtual machine.. . ... International Business Machines Corporation
In one embodiment, a computer-implemented method for performing deduplication in conjunction with random read and write operations across a namespace that is divided into a plurality of disjoint regions is disclosed. The method includes: maintaining a metadata structure for each of the plurality of disjoint regions via the respective region manager, each metadata structure comprising metadata indicating a physical storage location of one or more data chunks associated with the respective region; and performing a deduplicated write operation. ... International Business Machines Corporation
A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, the request including a volume serial number associated with the storage device, identifying a size of the storage device, where the size is indicated within the request, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device, selecting a type of the table of contents from a plurality of different types, based on the identified size of the storage device, and automatically initializing the storage device, including creating the table of contents, reserving a physical area of the storage device for the table of contents using a physical extent, and inserting the table of contents into the storage device, where the table of contents has the determined size of the table of contents, the determined location for the table of contents, and the selected type of the table of contents.. . ... International Business Machines Corporation
A method is provided for increasing throughput in a distributed storage network (dsn). A storage unit (su) of the dsn receives a set of access requests regarding a set of encoded data slices and determines whether processing one or more access requests from the set of access requests can be delayed. ... International Business Machines Corporation
A method comprising of allocating a main memory partition and a mirrored memory partition, a mirrored copy of the main memory partition, of a mirrored memory system for scrubbing. The method also comprises of dividing the main memory partition into a first main portion and a second main portion and dividing the mirrored memory partition into a first mirrored portion and a second mirrored portion. ... International Business Machines Corporation
Provided are techniques for a headless resilient backup and restore software ecosystem. At a first backup server of a plurality of backup servers, a connection request is received. ... International Business Machines Corporation
Technical solutions are described for shifting wearout of an array of storage disks in a storage system. In an aspect, a method includes staggering completion of maximum number of writes for each storage disk in the array. ... International Business Machines Corporation
Embodiments of the present invention provide a method, system, and computer program product for allocating storage extents. Extent input/output information pertaining to an extent on a storage device is received, by a computer, where the extant input/output information includes an access rate of data stored on the extent. ... International Business Machines Corporation
In various embodiments, computer-implemented techniques for improving function of in-memory processing systems via adaptively caching datasets include: identifying data stored in a distributed filesystem, the data including data to be processed by an in-memory processing application and data not to be processed by the in-memory processing application; identifying one or more partitions of the data corresponding to the data to be processed; and selectively transferring the one or more partitions from the distributed filesystem to a memory of the in-memory processing application. Corresponding systems and computer-program products are also disclosed.. ... International Business Machines Corporation
A method, data processing system and program product utilize dynamic logical storage volume sizing for burst buffers or other local storage for computing nodes to optimize job stage in, execution and/or stage out.. . ... International Business Machines Corporation
A computer-implemented method according to one embodiment includes identifying a host within a container environment, and mapping a volume of a container to the host within the container environment, utilizing small computer system interface (scsi) second level addressing.. . ... International Business Machines Corporation
Links between data regions are intelligently formed, based on up-to-date popularity statistics, including a number of times a particular one of the data regions was a target for a potential link with another one of the data regions. An owner manages a popularity index incorporating the popularity statistics, where over time, the popularity index is subjected to an aging mechanism pursuant to a decaying algorithm. ... International Business Machines Corporation
A generated first function queues identifying data of selected files from a file directory within a queue when the first function is activated while the selected files are selected for access by a user. A generated second function imports to and opens within a single application all files within the queue when the second function is activated. ... International Business Machines Corporation
A first file is selected from within a file directory. When a first function is activated while the first file is selected, the first file is associated with a first queue, wherein the first function is selected for activation from a list of available functions that may be selectively applied to selected files within the file directory. ... International Business Machines Corporation
A chinese character pinyin input method and apparatus are disclosed. The method includes displaying on a human-machine interaction interface (hmi) initial keys representing all initials and simple final keys representing all simple finals. ... International Business Machines Corporation
A time of day (tod) synchronization mechanism in a first processor transmits a latency measure message simultaneously on two links to a second processor. In response, the receiver in the second processor detects latency differential between the two links, detects the delay in the second processor, and sends the latency differential and delay to the first processor on one of the two links. ... International Business Machines Corporation
Aspects include a method for generating a signal in response to an event. The method includes receiving, from a clock signal generator, a clock signal, wherein the clock signal has a fixed clock period. ... International Business Machines Corporation
Controlling release of earthquake energy, in one aspect, may include a controller device injecting fluid into bore holes at dynamically regulated levels to cause controlled seismic events. The bore holes are placed along a fault line with a potential for hazardous earthquakes, and installed with sensors and fluid flow controls communicating with the controller device. ... International Business Machines Corporation
Management of available energy among multiple drones is provided by identifying tasks to be completed by the multiple drones, and determining energy requirements of one or more drones of the multiple drones to facilitate completing one or more tasks of the tasks to be completed by the multiple drones. Further, the approach includes identifying an energy sharing approach for completion of the task(s) by the drone(s) where one or more other drones of the multiple drones transfer energy in operation to the drone(s) to facilitate completion of the task(s). ... International Business Machines Corporation
Techniques for integrating photovoltaics into wearables, such as eyewear, are provided. In one aspect, a method of forming a lens for photovoltaic eyewear includes: forming a semitransparent photovoltaic film on at least a portion of a viewable area of the lens, wherein the semitransparent photovoltaic film includes an inorganic absorber material having a band gap of from about 1.4 ev to about 2.2 ev, and ranges therebetween. ... International Business Machines Corporation
An integrated circuit chip includes at least two integrated circuits, at least three scan chains, and a multiplexor circuitry. Each integrated circuit includes an integrated circuit input port and an integrated circuit output port. ... International Business Machines Corporation
A technique relates to a machine for sorting. A removable cartridge includes a nanofluidic module. ... International Business Machines Corporation
Carbon nanotube-based multi-sensors for packaging applications and methods to form the carbon nanotube-based multi-sensors are capable of simultaneously measuring at least two measurands including temperature, strain, and humidity via changes in its electrical properties.. . ... International Business Machines Corporation
Carbon nanotube-based multi-sensors for packaging applications and methods to form the carbon nanotube-based multi-sensors are capable of simultaneously measuring at least two measurands including temperature, strain, and humidity via changes in its electrical properties.. . ... International Business Machines Corporation
An aspect of the disclosure includes a natural gas leakage detection device. The natural gas leakage device includes a metering interface for detecting usage of natural gas. ... International Business Machines Corporation
A smart opening system is provided. The smart opening system includes a vehicle defining an aperture, a door coupled to the vehicle to assume a first position at which the aperture is closed and multiple second positions at which the aperture is open and to move between the first and second positions, a sensor disposed to sense obstructions surrounding the vehicle and a processing element coupled to the sensor and configured to determine whether any of the obstructions are within a range of motion of the door.. ... International Business Machines Corporation
A drone or uav can use a mobile docking platform mounted to a vehicle to receive fuel. The fuel provided from the vehicle to the uav. ... International Business Machines Corporation
A method and system for automatically enabling an automated commercial fishing process is provided. The method includes enabling a commercial fishing software application associated with selecting a location for implementing a commercial fishing process. ... International Business Machines Corporation
A method of protecting an in-vivo sensor includes forming a sensing surface on a surface of the in-vivo sensor, the sensing surface including a functionalized monolayer that will bind to an analyte of interest; and coating the sensing surface of the sensor with a bioabsorbable polymeric coating including a bioabsorbable polymer; wherein the bioabsorbable polymeric coating is configured to protect the in-vivo sensor until needed for implantation.. . ... International Business Machines Corporation
An apparatus for sorting macromolecules includes a first chip including a channel formed in a first side of the first chip and having at least one monolithic sorting structure for sorting macromolecules from the sample fluid. A first set of vias formed in the first chip has openings in a second side of the first chip, the sample fluid being provided to the sorting structure through the first set of vias. ... International Business Machines Corporation
A hybrid microfluidics device includes a substrate having a base region with a width and a length. A paper has testing regions disposed along the width of the base region. ... International Business Machines Corporation
A scan head for scanning skin includes a frame and a camera coupled to the frame. A controllable probe is coupled to the frame and is configured to change an orientation of hair on the skin to be examined and imaged with the camera.. ... International Business Machines Corporation
Techniques that facilitate two-phase liquid cooling of an electronic device are provided. In one example, an apparatus, such as a cold plate device, comprises a first stackable layer and a second stackable layer. ... International Business Machines Corporation
Techniques that facilitate two-phase liquid cooling of an electronic device are provided. In one example, an apparatus, such as a cold plate device, comprises a first stackable layer and a second stackable layer. ... International Business Machines Corporation
Techniques that facilitate two-phase liquid cooling of an electronic device are provided. In one example, an apparatus, such as a cold plate device, comprises a first stackable layer and a second stackable layer. ... International Business Machines Corporation
The invention relates to a method for embedding a discrete electronic device in a chip module. The chip module comprises a multilayer substrate which comprises a plurality of electrically conductive layers stacked above each other and an electrically non-conductive layer arranged between each pair of electrically conductive layers. ... International Business Machines Corporation
A process of forming an angled fiberglass cloth weave includes weaving a first set of fibers oriented at a first non-orthogonal angle with respect to a printed circuit board to be formed from the angled fiberglass cloth weave with a second set of fibers oriented at a second non-orthogonal angle with respect to the printed circuit board to be formed form the angled fiberglass cloth weave.. . ... International Business Machines Corporation
A method and structure are provided for implementing enhanced reworkable strain relief packaging for electronic component interconnects. A plurality of custom strain relief pads is provided with a component footprint wiring layout on a component carrier or a component. ... International Business Machines Corporation
Techniques are provided for performing automated operations in order to predict obstacles to mobile device travel paths. Historical mobile device path data about multiple historical paths previously taken by a plurality of mobile devices during a first period of time is tracked. ... International Business Machines Corporation
Aspects provide for attention diversion selection and presentment in response to observer identity and content attributes executes steps on a computer processor. In response to determining that a portion of content that has objectionable content with respect to a first observer of a presentation of media content will be presented to the first observer and to a second observer over an upcoming future presentation period of time, a computer processor selects a competing sensory stimulus that is indicated as interesting to the first observer and sufficiently distracting during the future time period that it will interfere with comprehension by the first observer of an objectionable attribute of the objectionable content portion as a function of historical data applicable to the first observer. ... International Business Machines Corporation
A method includes identifying a plurality of user-interested multimedia files based at on one of a history of a plurality of user multimedia searches, a plurality of user multimedia views, or a history of multimedia sharing with other users. The method creates a catalog of the plurality of user-interested multimedia files, wherein the catalog includes one of more groups of the plurality of multimedia files based on one of a multimedia file length, the history of the plurality of user multimedia searches, the plurality of user multimedia views, or a history of multimedia shares with other users. ... International Business Machines Corporation
In some examples, a system for conference management can include a processor to initiate a conference comprising a plurality of cameras and at least one user and process a series of images with at least one service to generate service output, the series of images comprising an aggregation of images from the plurality of cameras. The processor can also detect metadata associated with each of the series of images by the at least one service and aggregate the metadata and the service output based on a timestamp for each image to detect an event. ... International Business Machines Corporation
A computer-implemented method for cache memory management in a distributed computing environment includes tracking, via a cache balancing engine, a plurality of vehicles operating in a first region. The method further includes executing, via the cache balancing engine, an analysis for a subset of the plurality of vehicles in the first region to determine a weighted mean velocity for each vehicle in the subset of the plurality of vehicles in the first region. ... International Business Machines Corporation
Disclosed are systems, methods, and machine readable storage media that cause a storage computer and a client computer to perform a method of providing access to one or more resources on the storage computer for the client computer. The storage computer is operable for initiation of a network connection between the client computer and the storage computer. ... International Business Machines Corporation
A method for distributed file transfers with high performance and reliability includes creating, on a first trivial file transfer protocol (tftp) server, a global cache, where the global cache is used to store up to a first portion of a data file. The method further includes storing, on the first tftp server, in the global cache, one or more continuous data blocks that have exceeded a defined first request rate threshold, where the one or more continuous data blocks make up a subset of the data blocks of the first portion of the data file. ... International Business Machines Corporation
A method for distributed file transfers with high performance and reliability includes creating, on a first trivial file transfer protocol (tftp) server, a global cache, where the global cache is used to store up to a first portion of a data file. The method further includes storing, on the first tftp server, in the global cache, one or more continuous data blocks that have exceeded a defined first request rate threshold, where the one or more continuous data blocks make up a subset of the data blocks of the first portion of the data file. ... International Business Machines Corporation
A method for distributed file transfers with high performance and reliability includes creating, on a first trivial file transfer protocol (tftp) server, a global cache, where the global cache is used to store up to a first portion of a data file. The method further includes storing, on the first tftp server, in the global cache, one or more continuous data blocks that have exceeded a defined first request rate threshold, where the one or more continuous data blocks make up a subset of the data blocks of the first portion of the data file. ... International Business Machines Corporation
A method for distributed file transfers with high performance and reliability includes creating, on a first trivial file transfer protocol (tftp) server, a global cache, where the global cache is used to store up to a first portion of a data file. The method further includes storing, on the first tftp server, in the global cache, one or more continuous data blocks that have exceeded a defined first request rate threshold, where the one or more continuous data blocks make up a subset of the data blocks of the first portion of the data file. ... International Business Machines Corporation
A method, computer program product, and system includes a processor(s) initiating a web conferencing session between a host and a client, by the client receiving a presentation and transmitting the presentation to a semantic engine, wherein the semantic engine performs an automatic machine learning session to generate a presentation concepts list comprising concepts relevant to the presentation, and progressively displaying the presentation in a thin client application on the client. The processor(s) monitors on the client, during the web conferencing session, activities executed on the client and extracts web concepts related to the activities executed on the client. ... International Business Machines Corporation
The present disclosure relates to a computer implemented method for identifying potentially fraudulent usage of a user identifier of an information or communication service. The method comprises: receiving from a user device at least one address book entry related to a person. ... International Business Machines Corporation
A method and system for calculating and ascribing reputation scores to domain name system (dns) domain names, the method including capturing domain names appearing in a network during a predefined time frame and extracting features of each of the captured domain names, and calculating a reputation score for each of the captured domain names by assessing an expected life duration of each of the captured domain names based on the domain name features.. . ... International Business Machines Corporation
A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (mls) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. ... International Business Machines Corporation
A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. ... International Business Machines Corporation
A method is provided for communicating messages between sender and receiver computers, connectable via a network to a system of servers, based on authentication of receiver passwords, associated with respective receiver ids, by the system. A method is also provided for receiving a message from a sender based on authentication of a receiver password, associated with a receiver id, by a system of servers, in a network, wherein each server stores for the id a ciphertext produced by encrypting the receiver password under a public key via a homomorphic threshold encryption scheme having a threshold, and a key-share of a secret key corresponding to that public key, and stores an encrypted message from the sender encrypted under the public key. ... International Business Machines Corporation
A virtual memory management method, system, and computer program product at a first machine, receiving a request to access memory associated with a virtual address, at the first machine, initiating a translation of the virtual address to a logical address, during the translation of the virtual address to the logical address, determining that a machine identifier corresponds to a second machine, communicating the request to access the memory to the second machine, and at the second machine, fulfilling the memory access request.. . ... International Business Machines Corporation
Systems and methods for communication inversion for online communities are disclosed. In embodiments, a computer-implemented method comprises: detecting, by a computing device, that an online community has a low vitality; determining, by the computing device and based on the detecting that the online community has a low vitality, a related community is associated with the online community; detecting, by the computing device, a participant communication within the related community; and redirecting, by the computing device, the participant communication to the online community.. ... International Business Machines Corporation
A method, computer program product, and computer system for sending, from a first computing device, an email digest in an email message to a second computing device at a first point in time, wherein the email digest includes one or more content items for display at the second computing device when the email digest in the email message is accessed. An action is determined to be performed on a content item of the one or more content items at a second point in time that is after the first point in time. ... International Business Machines Corporation
A messaging system comprises a plurality of connected components and including a schema defining fields for messages, at least one field defined as non-essential. A mechanism for operating the messaging system comprises the steps of collecting one or more performance metrics for one or more components of the messaging system, determining that at least one performance metric has crossed a predetermined threshold, informing one or more components of the messaging system that a surge in workload has occurred, and the informed components removing non-essential fields from transmitted messages and/or not processing non-essential fields from received messages.. ... International Business Machines Corporation
Technical solutions are described for optimizing operation of a server cluster. An example method includes receiving a job request that executes using a set of data blocks, the job request being associated with an expected completion time. ... International Business Machines Corporation
A method is provided for packet broadcasting in a mesh-interconnected multi-computer network having a plurality of routers and a plurality of arbiters. The method includes interconnecting each of the plurality of routers to each of the plurality of arbiters. ... International Business Machines Corporation
A method is provided for packet broadcasting in a mesh-interconnected multi-computer network having a plurality of routers and a plurality of arbiters. The method includes interconnecting each of the plurality of routers to each of the plurality of arbiters. ... International Business Machines Corporation
A resource management method, system, and computer program product in a distributed computing environment that, for each distributable component, determines a characteristic maximum memory requirement by profiling resource utilization targeting the component's range of expected use cases. A component is instantiated on a node whose available non-swap virtual memory is nearest to, but greater than or equal to, the component's characteristic maximum memory requirement as determined via the profiling.. ... International Business Machines Corporation
A mechanism is provided for managing a plurality of computing machines. An indication of a management activity having an applicability rule is deployed to a plurality of computing machines to cause each of the plurality of computing machines having corresponding values of one or more characteristics fulfilling the applicability rule to apply the management activity. ... International Business Machines Corporation
A cloud extension agent can be provided on a customer premise for interfacing, via an outbound secure connection, cloud based services. The cloud extension agent can reach the cloud based services through existing firewall infrastructure, thereby providing simple, secure deployment. ... International Business Machines Corporation
Disclosed aspects relate to managing a database management system (dbms). A central database to include a set of central data may be structured with respect to the dbms. ... International Business Machines Corporation
Disclosed aspects relate to managing a database management system (dbms). A central database to include a set of central data may be structured with respect to the dbms. ... International Business Machines Corporation
Embodiments of methods and apparatuses may provide the capability to extend the tuning range of a vco in a way that does not degrade vco circuit performance. For example, the parasitic capacitance of semiconductor devices in the vco circuit may be utilized to extend the tuning range of a vco without significant degradation of vco circuit performance. ... International Business Machines Corporation
A surface with various layers that provide wireless charging may include at least one of a top surface layer, a second layer, comprising a plurality of lights and a power grid, disposed under the top surface layer, a charging pad disposed on a portion of the power grid, and a third layer, comprising a power supply which provides power to the plurality of lights and the power grid, disposed under the second layer.. . ... International Business Machines Corporation
A structure includes an optoelectronic device having a group iv substrate (e.g., si); a buffer layer (e.g. Sige) disposed on the substrate and a first distributed bragg reflector (dbr) disposed on the buffer layer. ... International Business Machines Corporation
A power distribution unit (pdu) having a connector to connect to an input power supply and a plurality of power outlet sockets for receiving plugs having a number of pins. Each power outlet socket has a mechanical locking mechanism movable between a locked position and an unlocked position when a plug is inserted into the power outlet socket to lock and unlock a plug pin in the power outlet socket. ... International Business Machines Corporation