International Business Machines Corporation Patent applications |
Patent application number | Title | Published |
20160142938 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 05-19-2016 |
20160142501 | CONTENT PREVIEW GENERATION USING SOCIAL NETWORK ANALYSIS - Disclosed is a system and method for generating a preview of a digital content item using social network analysis. Members of a social network who acquire the digital content item may identify interesting portions of the digital content. When a member of the social network requests a preview of the digital content item, typically in anticipation of an acquisition of the digital content item, the interesting portions of the digital content item identified by fellow social network members are considered in the generation of the preview. Selection of the interesting content for preview may include more identified content, as well as social network relationship and role magnitudes. The digital content item may include: text, such as books or articles; multimedia such as audio/video; and interactive, such as games or virtual worlds. | 05-19-2016 |
20160142334 | Homogenizing Tooling for a Heterogeneous Cloud Environment - A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common image, is created in a cloud computing environment. A unique set of randomized system parameters are then generated for the new node, which is then mapped to a set of generic system parameters. A request to access the new node is intercepted, which contains the generic system parameters. The intercepted access request is then parsed to extract the set of generic system parameters, which are then replaced with the unique set of randomized system parameters associated with the target node to generate a modified access request. The modified access request is then forwarded to the target node. | 05-19-2016 |
20160141379 | INTEGRATED CIRCUITS WITH MIDDLE OF LINE CAPACITANCE REDUCTION IN SELF-ALIGNED CONTACT PROCESS FLOW AND FABRICATION METHODS - Devices and methods for forming semiconductor devices with middle of line capacitance reduction in self-aligned contact process flow and fabrication are provided. One method includes, for instance: obtaining a wafer with at least one source, drain, and gate; forming a first contact region over the at least one source and a second contact region over the at least one drain; and forming at least one first and second small contact over the first and second contact regions. One intermediate semiconductor device includes, for instance: a wafer with a gate, source region, and drain region; at least one first contact region positioned over a portion of the source; at least one second contact region positioned over a portion of the drain; at least one first small contact positioned above the first contact region; and at least one second small contact positioned above the second contact region. | 05-19-2016 |
20160140674 | METHOD OF MANAGING PETRO-CHEMICAL RESERVOIR PRODUCTION AND PROGRAM PRODUCT THEREFOR - A method and computer program product for managing hydrocarbon field production, e.g., petro-chemical reservoir production. The hydrocarbon field is modeled using the finite volume method (FVM) model and the finite element method (FEM). Centroids are located in each FVM cell and each FEM element and overlapping cells are identified. After determining the distance between centroids for overlapping cells, fluid characteristics are mapped to the FEM element centroids, weighted inversely for distance between the respective centroids. A permeability/conductivity weighted average is determined for pore pressure and temperature of sub-volumes clustered around each FEM element node. Field production may be adjusted in response to FEM element node characteristics. | 05-19-2016 |
20160140337 | System to Create Mobile Digital Identifier - A method, system and computer-usable medium are disclosed for producing a digital identifier. A set of design elements are selected for inclusion in the digital identifier, followed by the selection of an associated digital identifier template and a set of user credentials. The selected design elements, template and user credentials are then used to produce the digital identifier. | 05-19-2016 |
20160140312 | GENERATING DRUG REPOSITIONING HYPOTHESES BASED ON INTEGRATING MULTIPLE ASPECTS OF DRUG SIMILARITY AND DISEASE SIMILARITY - Various embodiments predict drug-disease associations. In one embodiment, a plurality of disease similarity matrices and a plurality of disease similarity matrices are accessed. Each of the plurality of drug similarity matrices is associated with a different drug information source. Each of the plurality of disease similarity matrices is associated with a different disease information source. A known drug-disease association matrix is also accessed. The known drug-disease association matrix indicates if a given drug identified is known to treat a given disease. At least one drug-disease association prediction is generated based on the plurality of drug similarity matrices, the plurality of disease similarity matrices, and the known drug-disease association matrix. The at least one drug-disease association prediction identifies a previously unknown association between a given drug and a given disease, and a probability that the given disease is treatable by the given drug. | 05-19-2016 |
20160140216 | Adjusting Fact-Based Answers to Consider Outcomes - A method, system and computer-usable medium are disclosed for adjusting fact-based answers provided by a question/answer (QA) system. A user submits a question to the QA system, where it is categorized into a question type. The QA system then processes the question to generate an answer. The QA system then generates an answer adjustment if it is determined that the question type and answer meet a predicted undesirable outcome. The answer adjustment may include a warning, a disclaimer, a recommendation, an alternative fact-based answer, a referral to an assistance service, or any combination thereof. | 05-19-2016 |
20160140172 | Method and Apparatus for Optimizing the Evaluation of Semantic Web Queries - A semantic query over an RDF database is received with RDF database statistics and access methods for evaluating triple patterns in the query. The semantic query is expressed as a parse tree containing triple patterns and logical relationships among the triple patterns. The parse tree and access methods create a data flow graph containing a plurality of triple pattern and access method pair nodes connected by a plurality of edges, and an optimal flow tree through the data flow graph is determined such that costs are minimized and all triple patterns in the semantic query are contained in the optimal flow tree. A structure independent execution tree defining a sequence of evaluation through the optimal flow tree is created and is transformed into a database structure dependent query plan. This is used to create an SQL query that is used to evaluate the semantic query over the RDF database. | 05-19-2016 |
20160140053 | RE-MRU OF METADATA TRACKS TO REDUCE LOCK CONTENTION - For reducing lock contention on a Modified Least Recently Used (MLRU) list for metadata tracks, upon a conclusion of an access of a metadata track, if one of the metadata track is located in a predefined lower percentile of the MLRU list, and the metadata track has been accessed, including the access, a predetermined number of times, the metadata track is removed from a current position in the MLRU list and moved to a Most Recently Used (MRU) end of the MLRU list. | 05-19-2016 |
20160140032 | CORRELATING TEST RESULTS VARIATIONS WITH BUSINESS REQUIREMENTS - A method, system, and computer program product for relating test data to business requirements are provided in the illustrative embodiments. a test operation of a code is configured in a test data processing environment, a section in the code corresponding to a portion of a business requirements document. A set of baseline results is received. The test operation is executed, identifying the section of the code and associating the section of the code with a test result produced from the test operation. A determination is made whether the test result matches a first baseline result from the set of baseline results within a tolerance. When the test result does not match the first baseline result from the set of baseline results within the tolerance, the portion of the business requirements document is annotated. | 05-19-2016 |
20160140000 | SVC CLUSTER CONFIGURATION NODE FAILOVER - An SVC cluster manages a plurality of storage devices and includes a plurality of SVCs interconnected via a network, each SVC acting as a separate node. A new configuration node is activated in response to configuration node failures. The new configuration node retrieves client subscription information about events occurring in storage devices managed by the SVC cluster from the storage devices. In response to events occurring in the storage device managed by the SVC cluster, the new configuration node obtains storage device event information from a storage device event monitoring unit. The new configuration node sends storage device events to clients who have subscribed to this information according to subscription information obtained. The storage device is not installed in the original configuration node. | 05-19-2016 |
20160139981 | TECHNIQUES FOR INFORMATION PROTECTION IN A SOLID-STATE DEVICE BASED STORAGE POOL - A technique for protecting stored information from read disturbance includes receiving a first write request to a solid-state device (SSD) in a storage pool that employs an erasure code. The first write request has an associated identifier and associated data. In response to receiving the first write request, the first write request is assigned to two or more SSD blocks of the SSD device based on the identifier. Pages of the associated data are then written to the assigned SSD blocks, such that each SSD block holds data associated with only a single identifier. | 05-19-2016 |
20160139975 | RECORDING THE CORE DATA OF A COMPUTER PROCESS WHICH PROVIDES TRACE DATA - A method, apparatus and computer program for recording the core data of a computer process, the computer process comprising trace points and core data is provided for each such trace point. A first set of core data comprising an image of a memory for the computer process is stored in response to a first set of trace data being produced for the computer process for a first trace point. A second set of core data is stored in response to a second set of trace data being produced for the computer process for a second trace, where the second set of core data comprises a record of any change in current memory contents for the computer process with respect to the first set of core data. | 05-19-2016 |
20160139953 | PREFERENTIAL CPU UTILIZATION FOR TASKS - In a computing storage environment having multiple processor devices, lists of Task Control Blocks (TCBs) are maintained in a processor-specific manner, such that each of the multiple processor devices is assigned a local TCB list. | 05-19-2016 |
20160139945 | TECHNIQUES FOR CONSTRUCTING VIRTUAL IMAGES FOR INTERDEPENDENT APPLICATIONS - A technique for automating the construction of multiple virtual images with interdependencies includes creating a first virtual image (VI) instance by extending a first base VI based on input values associated with the first base VI and software bundles associated with the first base VI. A second VI instance is created by extending a second base VI based on input values associated with the second base VI, instance values received from the first VI instance, dependency instance values received from a deployed dependency instance, and software bundles associated with the second base VI. The first and second VI instances are then deployed to designated machines in a cloud environment for execution. | 05-19-2016 |
20160139935 | LIVE INITIALIZATION OF A BOOT DEVICE - Embodiments of the present invention are provided that include executing, by a processor, a software stack received from a first boot image, and retrieving and executing, by the processor, a second software stack. A writeable boot device such as a storage device with a removable medium is detected, and the second software stack is saved by replacing, on the writeable boot device, the first boot image with a second boot image comprising the second software stack. The second software stack is saved upon detecting the boot device having no boot image. | 05-19-2016 |
20160139928 | TECHNIQUES FOR INSTRUCTION GROUP FORMATION FOR DECODE-TIME INSTRUCTION OPTIMIZATION BASED ON FEEDBACK - A technique of processing instructions for execution by a processor includes determining whether a first property of a first instruction and a second property of a second instruction are compatible. The first instruction and the second instruction are grouped in an instruction group in response to the first and second properties being compatible and a feedback value generated by a feedback function indicating the instruction group has been historically beneficial with respect to a benefit metric of the processor. Group formation for the first and second instructions is performed according to another criteria, in response to the first and second properties being incompatible or the feedback value indicating the grouping of the first and second instructions has not been historically beneficial. | 05-19-2016 |
20160139925 | TECHNIQUES FOR IDENTIFYING INSTRUCTIONS FOR DECODE-TIME INSTRUCTION OPTIMIZATION GROUPING IN VIEW OF CACHE BOUNDARIES - A technique for processing instructions includes examining instructions in an instruction stream of a processor to determine properties of the instructions. The properties indicate whether the instructions may belong in an instruction sequence subject to decode-time instruction optimization (DTIO). Whether the properties of multiple ones of the instructions are compatible for inclusion within an instruction sequence of a same group is determined. The instructions with compatible ones of the properties are grouped into a first instruction group. The instructions of the first instruction group are decoded subsequent to formation of the first instruction group. Whether the first instruction group actually includes a DTIO sequence is verified based on the decoding. Based on the verifying, DTIO is performed on the instructions of the first instruction group or is not performed on the instructions of the first instruction group. | 05-19-2016 |
20160139844 | IMPERSONATING SCSI PORTS THROUGH AN INTERMEDIATE PROXY - Methods, apparatus and computer program products implement embodiments of the present invention that include ascertaining, by a first storage system, a respective port identifier for each of one or more host ports defined to the first storage system for a logical volume stored on a second storage system. Examples of the port identifiers include WWPN and iSCSI iQN identifiers. A respective unique identifier is assigned to each of the ascertained one or more host ports, and for each of the one or more host ports, the respective port identifier and the assigned respective unique identifier are conveyed to the second storage system. Upon receiving, from one of the one or more host ports, an input/output (I/O) request for the logical volume, I/O request with the respective unique identifier of the one of the one or more host ports is conveyed to the second storage system. | 05-19-2016 |
20160139825 | REDUCING READ LATENCY USING A POOL OF PROCESSING CORES - In a read processing storage system, using a pool of CPU cores, the CPU cores are assigned to process either write operations, read operations, and read and write operations, that are scheduled for processing. A minimal number of the CPU cores are allocated for processing the write operations, thereby increasing write latency. | 05-19-2016 |
20160139592 | DYNAMIC BATCH SIZE AND INTERNAL TRANSPORTATION - Embodiments of the invention relate to statistical and mathematical optimization techniques to predict completion time of parts and subassemblies in one production line. A real-time visibility of products and work-in-process is produced. Optimization techniques are utilized to allow for dynamic modification of a transportation schedule and/or batch size, thereby reducing transportation costs. | 05-19-2016 |
20160139019 | METHOD AND INTEGRATED DEVICE FOR ANALYZING LIQUID FLOW AND LIQUID-SOLID INTERFACE INTERACTION - An Integrated Circuit (IC) chip with a lab-on-a-chip, a method of manufacturing the lab-on-a-chip and a method of using the lab-on-a-chip for fluid flow analysis in physical systems through combination with computer modeling. The lab-on-a-chip includes cavities in a channel layer and a capping layer, preferably transparent, covering the cavities. Gates control two dimensional (2D) lattice structures acting as heaters, light sources and/or sensors in the cavities, or fluid channels. The gates and two dimensional (2D) lattice structures may be at the cavity bottoms or on the capping layer. Wiring connects the gates and the 2D lattice structures externally. | 05-19-2016 |
20160135051 | Telephone Caller Authentication - Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including the caller identification information; and simultaneously providing a data carrier signal including the encrypted caller identification information. The receiving device implements receiving the telephone call; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of verifying the authenticity of a certificate used to encrypt the caller identification information; and comparing the decrypted caller identification information with the caller identification information from the voice carrier signal. A telephony device implementing such an authentication technique is also disclosed. | 05-12-2016 |
20160134645 | IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK - A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account. | 05-12-2016 |
20160134558 | Automatic Scaling of at Least One User Application to External Clouds - Embodiments of the invention provide a method, a system and a computer program product configured to automatically auto-scale a user compute instance to multiple cloud providers while considering a multiplicity of user requirements. The method, executed on a digital data processor, includes obtaining information, via a user interface, that is descriptive of user cloud computing related preferences, including a user cloud computing budgetary preference. The method further includes sensing properties of a plurality of clouds and making decisions, based at least on the obtained information and on the sensed properties, of when to scale up or scale down the user cloud instance, of selecting one of the plurality of clouds as where to scale the user cloud instance, and determining which resource or resources of the selected cloud to add or remove from the selected cloud. The method further includes automatically executing the decisions on the selected cloud. | 05-12-2016 |
20160133061 | Anomaly Detection For Road User Charging Systems - A computer readable medium embodies a program of machine-readable instructions executable by a processing apparatus to perform operations including determining information corresponding to a number of differences in distances between ending points of journeys taken by a vehicle and starting points of consecutive journeys taken by the vehicle, and transmitting one or more representations of the information. Another computer readable medium tangibly includes instructions for, for each of a number of vehicles, receiving one or more scores corresponding to a vehicle, and determining a ranked list containing at least a portion of the scores, and outputting the ranked list. Another computer readable medium includes instructions for, for each of a number of vehicles, receiving information corresponding to a vehicle, using one or more metrics, calculating one or more values from the received information, and communicating one or more representations of the one or more value to one or more entities. | 05-12-2016 |
20160132815 | SKILL ESTIMATION METHOD IN MACHINE-HUMAN HYBRID CROWDSOURCING - In one embodiment, a computer-implemented method for estimating an ability of a worker in a process for integrating work results of multiple workers for the same task includes acquiring, for each of one or more tasks, a work result of a preceding-stage worker and a work result of a succeeding-stage worker that works based on the work result of the preceding-stage worker. The method also includes estimating multiple parameters of a probability model in which an ability of the succeeding-stage worker conditioned by a quality of the work result of the preceding-stage worker is introduced as a conditioned ability parameter, based on the multiple work results obtained for each of the one or more tasks. | 05-12-2016 |
20160132775 | WEIGHT ADJUSTED COMPOSITE MODEL FOR FORECASTING IN ANOMALOUS ENVIRONMENTS - A method, system, and computer program product for weight adjusted composite model for forecasting in anomalous environments are provided in the illustrative embodiments. A base forecasting model and a second forecasting model are combined to form a composite model, the base forecasting model configured to forecast an event in a time series, the second forecasting model configured to represent an anomalous portion of data in the time series. A mixing algorithm is combined with the composite model to adjust a set of weights associated with the composite model. Upon identifying a future period in which the event is to be forecasted, using the mixing algorithm, a subset of the set of weights is adjusted to from a weight adjusted composite model. The weight adjusted composite model is executed to forecast the event in the future period. | 05-12-2016 |
20160132773 | Method for Automatic Near-Real-Time Prediction, Classification, and Notification of Events in Natural Language Systems - An approach is provided for automatically predicting an event occurrence based on a question from an end user presented using a near-real-time natural language processing (NLP) analysis to generate, score and rank a plurality of event occurrences based on a plurality of question context parameters extracted from the question, one or more user profile parameters for the end user, and the one or more historical questions, answers, and events having a specified spatial and/or temporal proximity to the question which are identified by an information handling system. In the approach, performed by an information handling system, a top ranked event occurrence from the ranked plurality of event occurrences is selected for inclusion in a notification message that is communicated or broadcast to the end user, as well as other users engaged with the information handling system and/or first responders in the affected area. | 05-12-2016 |
20160132685 | COMMUNICATION BETWEEN KEY MANAGER AND STORAGE SUBSYSTEM KERNEL VIA MANAGEMENT CONSOLE - System, computer program product, and method embodiments for communication between a kernel operational on a storage subsystem and a key manager (KM) through a hardware management console (HMC) to provide encryption support are provided. In one embodiment, an event request is initiated by the kernel to the KM to execute an event flow. Pursuant to a communication request by the kernel to the HMC, a socket of the HMC is opened along a communication path between the KM and the kernel according to an event flow type selected by the KM for the event flow. Data including a data payload is sent by the KM to the kernel, the data payload corresponding to the selected event flow type. | 05-12-2016 |
20160132680 | RESOURCE USAGE OPTIMIZED AUDITING OF DATABASE SHARED MEMORY - A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an available capacity of a computing resource in a data processing system usable to analyze a database protocol packet. The database protocol packet is stored in a shared memory during a data communication. A number of database protocol packets expected in the shared memory during the specified period is determined Determining a second number of database protocol packets that can be analyzed using the available capacity of the computing resource is computed. During the specified period, the second number of database protocol packets is caused to be selected from every number of database protocol packets stored in the shared memory for analysis using the computing resource during the specified period. | 05-12-2016 |
20160132548 | RESOURCE USAGE OPTIMIZED AUDITING OF DATABASE SHARED MEMORY - A method for security auditing of database transactions is provided in the illustrative embodiments. For a specified period, an available capacity of a computing resource in a data processing system usable to analyze a database protocol packet. The database protocol packet is stored in a shared memory during a data communication. A number of database protocol packets expected in the shared memory during the specified period is determined. Determining a second number of database protocol packets that can be analyzed using the available capacity of the computing resource is computed. During the specified period, the second number of database protocol packets is caused to be selected from every number of database protocol packets stored in the shared memory for analysis using the computing resource during the specified period. | 05-12-2016 |
20160132544 | EFFICIENT SORTING IN A RELATIONAL DATABASE - The present invention relates to a method, computer program product and system to compute one sorted list of enumeration values in a specific language, read from at least one relational database including at least one data table storing enumeration programming variable values and at least one catalog table storing an expression, in at least one language, of the enumeration programming variable values, said method comprising the steps of receiving a request for providing enumeration variable values including one list sorted in a specific order, of the values of a specific enumeration, in a specific language; then, all the expressions of the enumeration values for the specific language for the specific enumeration read in a corresponding catalog table are sorted in the specific order; if the sorted list of the specific enumeration expression values matches a list of the specific enumeration variable values sorted in the specific order in the same catalog table, the sorted list of enumeration values in a specific language is created from this ordered catalog table; if in the preceding step the match was not found, if the sorted list of the specific enumeration expressions values matches a list of the specific enumeration variable values sorted in the reverse order from the specific order in the same catalog table, the sorted list of enumeration values in a specific language is created from the sorted catalog table; if in any of the two preceding steps, the match was not found, a new table joined table is built from data and catalog table in the standard way. | 05-12-2016 |
20160132519 | APPLYING A MINIMUM SIZE BOUND ON CONTENT DEFINED SEGMENTATION OF DATA - Applying a content defined minimum size bound on blocks produced by content defined segmentation of data by calculating the size of the interval of data between a newly found candidate segmenting position and a last candidate segmenting position of same or higher hierarchy level, and then discarding the newly found candidate segmenting position if a size of an interval of data is lower than the minimum size bound, or retaining the newly found candidate segmenting position if the size of the interval of data is not lower than the minimum size bound or if there is no last candidate segmenting position of a same or higher hierarchy level as the newly found candidate segmenting position. When a last candidate segmenting position of a same or higher hierarchy level becomes available, the evaluation is reiterated to converge edge segmenting positions of the outputs of consecutive calculation units. | 05-12-2016 |
20160132512 | HIERARCHICAL MULTI-TENANCY MANAGEMENT OF SYSTEM RESOURCES IN RESOURCE GROUPS - Establishing hierarchical user management authority for storage resources organized into resource groups in a computing storage environment are provided. Each storage resource is associated with a resource group and storage resource object having a resource group attribute associating the storage resource object with one of the resource groups. The resource group label attribute is assigned to the resource group object. An additional attribute of the resource group object, that specifies management policies for the resource group object and the storage resources associated with the resource group object, is defined. One of the available users of the storage resources is associated with a user resource scope attribute. A schema is defined for comparing of values of the user resource scope attribute with the resource group label attribute. | 05-12-2016 |
20160132509 | COMPLEX QUERY HANDLING - Processing a query for a database includes: receiving a portion of a query from a client device in a server implemented by at least one processor, the portion of the query comprising an incomplete component; determining that the incomplete component is one of multiple predefined types with the server; providing the incomplete component to an auto-complete function specific to the determined type of the incomplete component; receiving in the server a suggestion for completing the query from the auto-complete function, the suggestion being specific to the type of the incomplete component; and providing the suggestion from the server to the client device. | 05-12-2016 |
20160132376 | DIAGNOSTC DATA SET COMPONENT - Various embodiments for retaining diagnostic information for data in a computing storage environment. In one such embodiment, a diagnostic component, apart from a volume table of contents (VTOC), associated with an integrated catalog facility (ICF) catalog and with a base data set from data sets via a catalog association record, is initialized. The diagnostic component is configured to retain base data set-specific diagnostic information retrievable by the computing storage environment to assist in error diagnosis. The base data set-specific diagnostic information is stored pursuant to at least one detected event associated with the base data set. | 05-12-2016 |
20160132349 | Processing a guest event in a hypervisor-controlled system - The embodiments relate to a method for processing a guest event in a hypervisor-controlled system. A guest event triggers a first firmware service for the guest event in firmware. The guest event is associated with a guest, a guest key, and with a guest state and protected guest memory accessible only by the guest and the firmware. The firmware processes information associated with the guest event. The processed information includes information of the guest state and the protected guest memory. A subset of the processed information is received by a hypervisor to process the guest event, and a non-received portion of the information is retained by the firmware. The hypervisor processes the guest event based on the received subset and sends a process result to the firmware triggering a second firmware service for the guest event. The firmware processes the process result together with the retained information to generate modification associated with the guest event. The firmware performs the generated modification associated with the guest event at the protected guest memory. | 05-12-2016 |
20160132345 | Processing a guest event in a hypervisor-controlled system - The embodiments relate to processing a guest event in a hypervisor-controlled system. A guest event triggers a first firmware service for the guest event in firmware. The guest event is associated with a guest, a guest key, and with a guest state and protected guest memory accessible only by the guest and the firmware. The firmware processes information associated with the guest event. The processed information includes information of the guest state and the protected guest memory. A subset of the processed information is received by a hypervisor to process the guest event, and a non-received portion of the information is retained by the firmware. The hypervisor processes the guest event based on the received subset and sends a process result to the firmware triggering a second firmware service for the guest event. The firmware processes the process result together with the retained information to generate modification associated with the guest event. The firmware performs the generated modification associated with the guest event at the protected guest memory. | 05-12-2016 |
20160132325 | VISUALIZING A CONGRUENCY OF VERSIONS OF AN APPLICATION ACROSS PHASES OF A RELEASE PIPELINE - A method for visualizing a congruency of versions of an application across phases of a release pipeline includes a selecting engine to select a phase from a number of phases; a representing engine to represent, via a user interface (UI), a congruency for a number of versions of an application compared against a target version of the application across the phases of a release pipeline, the congruency for the number of versions of the application represented with identifiers; a differentiating engine to differentiate a latest-deployed version of the application against a planned version of the application in a particular environment; and a comparing engine to compare, based on a selection, properties of the versions of the application. | 05-12-2016 |
20160132273 | TIERED CACHING AND MIGRATION IN DIFFERING GRANULARITIES - For data processing in a distributed computing storage environment by a processor device, the distributed computing environment incorporating at least high-speed and lower-speed caches, and managed tiered levels of storage, groups of data segments and clumped hot ones of the data segments are migrated between the tiered levels of storage such that uniformly hot ones of the groups of data segments are migrated to use a Solid State Drive (SSD) portion of the tiered levels of storage; uniformly hot groups of data segments are determined using a first, heat map for a selected one of the group of the data segments; and a second heat map is used to determine the clumped hot groups. | 05-12-2016 |
20160132268 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for transforming a logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Transforming the logical data object comprises creating in the storage device a transformed logical data object comprising and one or more allocated storage sections with a predefined size; processing one or more sequentially obtained chunks corresponding to the transforming logical data object, wherein at least one of said processed data chunks comprises transformed data resulting from said processing; sequentially storing the processed data chunks into said storage sections in accordance with an order the chunks received. The method further includes reading a data range from the transformed logical object in response to a read request specifying desired point in time to be read. | 05-12-2016 |
20160132250 | CONTACTLESS IC MEMORY ON REMOVEABLE MEDIA - Method, system, and computer program product embodiments for recording data on a contactless integrated circuit (IC) memory associated with a data storage cartridge are provided. In one exemplary embodiment, a consistency is verified between a TOC written to a contactless IC memory and an index, wherein if the TOC and the index are inconsistent, a TOC profile file is refreshed with data from the index. The TOC is written to the contactless IC memory. | 05-12-2016 |
20160131677 | MOTION PATTERN BASED EVENT DETECTION USING A WEARABLE DEVICE - A method, system, and computer program product for motion pattern based event detection using a wearable device are provided in the illustrative embodiments. During a period beginning at a first time, using the wearable device, a pattern of a motion is detected, the motion being in body part of a user on which the wearable device is worn. The pattern is recorded for the period, the pattern occurring over at least the period. A collaborative information is received from the wearable device, the collaborative information defining a characteristic of the pattern. The pattern and the collaborative information are associated with an event. During a second period beginning at a second time, the pattern and the collaborative information are detected. Responsive to detecting at the second time, an action associated with the event is performed. | 05-12-2016 |
20160131493 | SOCIAL MEDIA BASED WEIGHTED ROUTE SELECTION - A method, system, and computer program product for social media based weighted route selection are provided in the illustrative embodiments. It is detected that a first route and a second route are possible between two places. A first set of points of interest (POIs) is identified relative to the first route. By accessing a social media source, a set of social information is collected comprising information related to a POI. A subset of the social information is organized into a set of categories related to the POI. Each information in the subset is assigned a corresponding weight to compute a value for each information. A total value of each POI is determined using the computed values. From the first route and the second route, that route as presented as socially preferred route which has a higher total route value. | 05-12-2016 |
20160127427 | FOCUS COORDINATION IN GEOGRAPHICALLY DISPERSED SYSTEMS - A method, system, and computer program product for focus coordination in geographically dispersed systems are provided in the illustrative embodiments. A shifting of focus to a first object present in a first view is detected at a first data processing system in a first location in the geographically dispersed plurality of data processing systems. Metadata of the first view is identified, the metadata being usable to identify a second object in a second view at a second data processing system in a second location in the geographically dispersed plurality of data processing systems, the second object corresponding to the object in the view. A focus information package is constructed, wherein the focus information package includes an attribute of the first object and the metadata of the first view. The focus information package is sent to the second data processing system. | 05-05-2016 |
20160125760 | Controlled Resources Based on Good Behavior - Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters. | 05-05-2016 |
20160125176 | BEHAVIORAL CHARACTERISTICS BASED USER VERIFICATION - A method, system, and computer program product for user verification based on behavioral characteristics are provided in the illustrative embodiments. A set of questions is presented from an application to a user, where the user has not previously been asked the set of questions. A set of answers received from the user corresponding to the set of questions is analyzed. A score is computed using the set of answers. A determination is made whether the score matches, within a tolerance value, a base score in a psychological profile of the user. When the score matches the base score within the tolerance value, a conclusion is made that an identity of the user has been verified. | 05-05-2016 |
20160124997 | SAVING EVENTS INFORMATION IN IMAGE METADATA - A method, system, and computer program product for saving events information in image metadata are provided in the illustrative embodiments. A first event is detected at a first time, using a processor and a memory in a device. Information related to the first event is collected. At a second time, the capturing of a first image is detected, the second time being later than the first time. The information related to the first event is associated with the first image as first metadata of the first image. | 05-05-2016 |
20160124985 | PRESERVING REDUNDANCY IN DATA DEDUPLICATION SYSTEMS BY DESIGNATION OF VIRTUAL ADDRESS - Various embodiments for preserving data redundancy of identical data in a data deduplication system in a computing environment are provided. In one embodiment, a method for such preservation is disclosed. A selected range of virtual addresses of a virtual storage device in the computing environment is designated as not subject to a deduplication operation. Other system and computer program product embodiments are disclosed and provide related advantages. | 05-05-2016 |
20160121218 | TECHNIQUES FOR CREATING DYNAMIC GAME ACTIVITIES FOR GAMES - A technique for dynamically generating game activities for a game (e.g., a role-playing game) includes loading game information about the game into a data processing system (e.g., a question answering system). Context data (e.g., a question) is received from a client (e.g., a player of the game, a user of the game, another system, or a game engine). In response to receiving the context data, a game activity is dynamically generated based on the context data and the game information. The game activity is then initiated in the game and presented to the client. | 05-05-2016 |
20160119299 | END-TO-END ENCRYPTION IN A SOFTWARE DEFINED NETWORK - A first information comprising an identification of an encryption algorithm supported by a first component from the first component of a software defined network (SDN) is received at a controller of the SDN. A set of policies and a set of encryption algorithms are sent to the first component. A policy determines a cryptographic operation applicable to a path in the SDN between the first component and a second component of the SDN. The first component comprises an originating point of the path and the second component comprises a destination point of the path. | 04-28-2016 |
20160118703 | METHOD FOR PERFORMING FREQUENCY BAND SPLITTING - A frequency band splitter is disclosed. The frequency band splitter includes a first, a second, and a third waveguides, A first narrow rectangular waveguide is utilized to connect the first waveguide to second waveguide. The first narrow rectangular waveguide has a first width to allow signals of a frequency band centered around a first frequency to be transmitted from the first waveguide to the second waveguide. A second narrow rectangular waveguide is utilized to connect the first waveguide to the third waveguide. The second narrow rectangular waveguide has a second width, which is different from the first width, to allow signals of a frequency band centered around a second frequency to be transmitted from the first waveguide to the third waveguide. | 04-28-2016 |
20160117456 | Criteria Conditional Override Based on Patient Information and Supporting Evidence - A method, system and computer-usable medium are disclosed for conditionally overriding strict criteria for a prospective medical treatment. Criteria for answering a question are received by a Question/Answer (QA) system, wherein the question is associated with a proposed medical treatment and the criteria are associated with a first condition. A second condition affecting the first condition is identified, which results in a modification to the first condition when it is determined that the second condition exceeds a predetermined threshold. | 04-28-2016 |
20160117233 | Quasi Disk Drive For Testing Disk Interface Performance - Embodiments relate to diagnostic evaluation of hardware components of a computer machine. A conventional storage device is replaced with a modified storage device. Read and write operations are received by the modified storage device. Issuance of a response to the read and write operations is limited to an acknowledgement receipt, which is employed to evaluate performance and/or bandwidth of the machines with respect to hardware for data storage. | 04-28-2016 |
20160117128 | SYSTEMS AND METHODS FOR INITIALIZING A MEMORY SYSTEM - Systems and methods for initializing a memory system are provided. One system includes a processor and a memory including a storage volume coupled to the processor. The storage volume includes a first bitmap for tracking an initialization process for the storage volume and a second bitmap for tracking a copying process for the storage volume. A method includes performing, via the processor, an initialization process for the storage volume and tracking, via the processor utilizing the first bitmap, the initialization process. The method further includes performing, via the processor, a copying process for the storage volume prior to completing the initialization process and tracking, via the processor utilizing the second bitmap, the copying process. Also provided are computer storage mediums including computer program code for performing the above method. | 04-28-2016 |
20160117111 | READING ORDER SEARCH METHOD AND PROGRAM FOR RECORDING - The present invention provides a search method used to search for the reading order of a plurality of recording groups when the plurality of recording groups written on tape are continuously read by a tape drive which manages data on tape in recording units having a fixed data length for each recording. This search method includes the steps of: receiving information on a plurality of tape groups to be read; and sorting the plurality of recording groups to be read so the reading time is shortened. In the sorting step, the time required to sort the plurality of reading groups is reduced by combining two or more recording groups into a single object to be sorted in the sorting step when at least two or more contiguous recording groups have been assigned to the same region or are assigned across adjacent regions among the plurality of regions. | 04-28-2016 |
20160116967 | Firmware Update Method and Power System Thereof - A firmware update method is provided for use in an information processing system powered by a power system. The power system is powered by an external power source and the power system includes a rechargeable battery and a controller. The method includes checking a power status of the rechargeable battery through the controller in response to a firmware update procedure. A power status of the rechargeable battery is determined to be sufficient to perform the firmware update procedure, and an insufficiency of the external power source to power the power system is determined. Power for the firmware update procedure is limited, through the controller, to the rechargeable battery. | 04-28-2016 |
20160116957 | POWER SUPPLY SYSTEM FOR AN INFORMATION HANDLING SYSTEM AND POWER SUPPLY METHOD THEREOF - A power supply system is provided to control one or more power supply units associated with an information handling system. A first power supply unit and a second power supply unit are electrically coupled to the information handling system. A controller is provided in communication with both the first and second power supply units. The controller functions to select one of the first and second power supply units to electrically power the information handling system. The non-selected unit generates zero output. | 04-28-2016 |
20160112507 | Pointing Device Router for Smooth Collaboration Between Devices - The present disclosure relates to optimizing collaborative activities between computing devices (e.g., desktop computers, laptop computers, smart TV's, tablets, mobile devices), and more particularly to systems, methods, and computer products for inputting data or commands on a computing device, and for moving, sharing, and controlling files between computing devices through the use of a pointing device with a corresponding pointer that can be shared between “N” computing devices. | 04-21-2016 |
20160110778 | CONDITIONAL ANALYSIS OF BUSINESS REVIEWS - A method, system, and computer program product for conditional analysis of business reviews are provided in the illustrative embodiments. A request, directed to an application executing in a data processing system, for a report on a business entity is detected. The application has access to a set of reviews about the business entity. A condition associated with the request is determined, where a future interaction between a user and the entity is expected to occur subject to the condition. A set of factors related to the condition is identified. Using a selection criterion, a subset of the set of reviews about the entity is selected. The subset of the set of reviews is analyzed. Responsive to the analyzing, the report is generated. | 04-21-2016 |
20160110248 | STORAGE ARRAY MANAGEMENT EMPLOYING A MERGED BACKGROUND MANAGEMENT PROCESS - In at least one embodiment, a controller of a non-volatile memory array iteratively performs a merged background management process independently of any host system's demand requests targeting the memory array. During an iteration of the merged background management process, the controller performs a read sweep by reading data from each of a plurality of page groups within the memory array and recording page group error statistics regarding errors detected by the reading for each page group, where each page group is formed of a respective set of one or more physical pages of storage in the memory array. During the iteration of the merged background management process, the controller employs the page group error statistics recorded during the read sweep in another background management function. | 04-21-2016 |
20160110244 | SYSTEMS AND METHODS FOR MANAGING COMPUTING SYSTEMS UTILIZING AUGMENTED REALITY - Various embodiments for managing computing systems are provided. In one embodiment, a method comprises comparing an identified target device in a captured environmental input to a model of the target device; recognizing, in real-time, a status condition of the target device based on the comparison; and determining if the target device is functioning properly if the target device and the model of the target device match, wherein if the target device is not functioning properly: a cause of error and troubleshooting instructions are displayed. | 04-21-2016 |
20160110111 | EFFICIENT INITIALIZATION OF A THINLY PROVISIONED STORAGE ARRAY - In at least one embodiment, a data storage system has a plurality of non-volatile storage devices, a higher level controller and one or more lower level controllers. In response to one or more inputs, the higher level controller of the data storage system issues an initialization command specifying initialization of a storage extent. In response to the initialization command, one or more lower level controllers issue dataless initialization commands to the plurality of non-volatile storage devices. In response to the dataless initialization commands, multiple first non-volatile storage devices among the plurality of non-volatile storage devices each initialize a respective data portion of the storage extent and a second non-volatile storage device among the plurality of non-volatile storage devices initializes a data protection portion of the storage extent. | 04-21-2016 |
20160105804 | SHARING FREQUENCIES IN AN OFDM-BASED WIRELESS COMMUNICATION SYSTEM - An apparatus for sharing frequencies in an orthogonal frequency-division multiplexing OFDM-based wireless communication system, wherein the OFDM-based wireless communication system comprises a base station and a mobile device that work within a radio frequency band, the method comprising: detecting an interference signal in the radio frequency band; setting by the base station, based upon the interference signal, interference indication information in a control header of a downlink frame to be sent to the mobile device, the interference indication information indicating a frequency range that is occupied by the interference signal in the radio frequency band; and sending by the base station the downlink frame to the mobile device, such that the mobile device may, based upon the interference indication information, avoid the frequency range where the interference signal is located. | 04-14-2016 |
20160105526 | Photographic Album Creation and Sharing - Embodiments of the invention relate to file sharing, and more specifically to sharing image files based on a spatiotemporal relationship. A device with image taking capabilities, such as a camera or mobile computing device, is provided with functionality to communicate with a shared pool of resources via a network connection. The device is connected to a network at a venue. As image files are captured in the venue, social contact metadata from all connected devices is embedded with the captured file(s). These files are published to a shared storage, and the publication includes the social contact metadata. Other image files from other devices may be added to the shared storage, with each added file having embedded social contact metadata. Authority to access the image files located on the shared storage is granted to social networking users based on their social networking name being contained within the embedded social contact metadata. | 04-14-2016 |
20160105384 | Processing of Email Based on Semantic Relationship of Sender to Recipient - Embodiments are provided for processing received electronic mail messages. A received message is processed based upon a set of rules made up of at least first and second sets of rules. The processing includes ascertaining a property derived from the received message and determining a set of rules associated with the ascertained property. The received message is processed corresponding to at least one rule in the first set of rules if the ascertained property is associated with the first set of rules, and the received message is processed corresponding to at least one rule in the second set of rules if the ascertained property is associated with the second set of rules. The received message is communicated to a recipient based on the at least one rule. | 04-14-2016 |
20160105267 | ASSEMBLING RESPONSE PACKETS - Proposed is an action machine for assembling response packets in a network processor. The action machine comprises: a first register array adapted to store data for entry into fixed-length fields of differing response packets, a fixed-length field having the same length in the differing response packets; and a second register array adapted to store data for entry into variable-length fields of differing response packets, a variable-length field having different values or lengths in the differing response packets. The action machine is adapted to assemble a response packet by combining data stored in the first register array with data stored in the second register array. | 04-14-2016 |
20160104644 | PROCESS FOR INTEGRATED CIRCUIT FABRICATION INCLUDING A UNIFORM DEPTH TUNGSTEN RECESS TECHNIQUE - Dummy gates are removed from a pre-metal layer to produce a first opening (with a first length) and a second opening (with a second length longer than the first length). Work function metal for a metal gate electrode is provided in the first and second openings. Tungsten is deposited to fill the first opening and conformally line the second opening, thus leaving a third opening. The thickness of the tungsten layer substantially equals the length of the first opening. The third opening is filled with an insulating material. The tungsten is then recessed in both the first and second openings using a dry etch to substantially a same depth from a top surface of the pre-metal layer to complete the metal gate electrode. Openings left following the recess operation are then filled with a dielectric material forming a cap on the gate stack which includes the metal gate electrode. | 04-14-2016 |
20160103868 | EFFICIENT CALCULATION OF SIMILARITY SEARCH VALUES AND DIGEST BLOCK BOUNDARIES FOR DATA DEDUPLICATION - For efficient calculation of both similarity search values and boundaries of digest blocks in data deduplication, input data is partitioned into chunks, and for each chunk a set of rolling hash values is calculated. A single linear scan of the rolling hash values is used to produce both similarity search values and boundaries of the digest blocks of the chunk. The rolling hash values are used to contribute to the calculation of the similarity search values and to the calculation of the boundaries of the digest blocks. | 04-14-2016 |
20160103853 | Propagation of Photographic Images with Social Networking - Embodiments of the invention relate to file sharing, and more specifically to sharing image files based on a social networking relationship. A digital image and associated file are created with geotag data that defines an image capture. Data associated with the image capture is stored as image metadata associated with the image file. A hyperlink to a preferred viewing URL is created and established based on a match produced from a comparison of the image file image capture data with at least one physical location identified in an index of cached data. The hyperlink is associated with the image file and directs a viewer to the physical and/or virtual location where the image was captured. | 04-14-2016 |
20160103850 | Synchronizing Updates Across Cluster Filesystems - The embodiments described herein relate to synchronization of data in a shared pool of configurable computer resources. One or more consistency points are created in a source filesystem. A first consistency point is compared with a second consistency point to detect a directory change at the source filesystem, which includes identifying at least one difference between the first and second consistency points. A file level change associated with an established directory at a target filesystem is identified responsive to the detection of the directory change. A link is established between the source filesystem and the target filesystem, and the established directory is updated based on the file level change. | 04-14-2016 |
20160103752 | ENHANCING WEAK CONSISTENCY - Methods to discover weak consistency errors in an application, by executing, by a debugger, a first thread of the application, by, determining that a first instruction in the first thread specifies to store a first value at a first memory address, setting a current value stored in the first memory address as an old value for the first memory address in a container for the first thread, executing the first instruction to store the first value at the first memory address, and setting the first value as a new value for the first memory address in the container for the first thread. The debugger then executes a second thread of the application, by restoring old values in the containers for all other threads and restoring a new value for each memory address specified in a container for the second thread to its respective memory address. | 04-14-2016 |
20160103733 | REDUCING ERROR CORRECTION LATENCY IN A DATA STORAGE SYSTEM HAVING LOSSY STORAGE MEDIA - In at least one embodiment, a read operation in a data storage system having lossy storage media includes fetching target data of the read operation from a lossy storage device into a buffer, transferring the target data from the buffer to an external controller external to the lossy storage device via a communication bus, performing error location processing on the target data during the transferring of the target data, communicating error location information regarding at least one error location to error repair logic via the communication bus, the error repair logic repairing the at least one error in the target data using the error location information, and the external controller causing the target data as repaired to be transmitted toward a destination. By deserializing the suboperations comprising the read operation, read latency can be reduced. | 04-14-2016 |
20160103616 | CLUSTER FAMILIES FOR CLUSTER SELECTION AND COOPERATIVE REPLICATION - Cluster families for cluster selection and cooperative replication are created. The clusters are grouped into family members of a cluster family base on their relationships and roles. Members of the cluster family determine which family member is in the best position to obtain replicated information and become cumulatively consistent within their cluster family. Once the cluster family becomes cumulatively consistent, the data is shared within the cluster family so that all copies within the cluster family are consistent. | 04-14-2016 |
20160100173 | Enhanced Video Streaming - Embodiments of the invention relate to improving functioning of a computer, and associated operating efficiency. An encoded video stream is separated into a plurality of segments, each segment having separate start and end times, and each segment having an original encoding resolution and associated size. At least one of the segments is selected and re-encoded at a resolution different than the original resolution. The re-encoded segment(s) has a data size less than the originally encoded segment. Transmission of the video stream with the re-encoded segment reduced data size of the transmission and reduces network bandwidth. | 04-07-2016 |
20160098634 | TECHNIQUES FOR MANAGING DATA IN A CACHE MEMORY OF A QUESTION ANSWERING SYSTEM - A technique for caching evidence for answering questions in a cache memory of a data processing system (that is configured to answer questions) includes receiving a first question. The first question is analyzed to identify a first set of characteristics of the first question. A first set of evidence for answering the first question is loaded into the cache memory. A second question is received. The second question is analyzed to identify a second set of characteristics of the second question. A portion of the first set of evidence, whose expected usage in answering the second question is below a determined threshold, is unloaded from the cache memory. | 04-07-2016 |
20160098398 | Method For Preserving Conceptual Distance Within Unstructured Documents - A method, system and computer-usable medium are disclosed for preserving conceptual distance within unstructured documents by characterizing conceptual relationships. Natural language processing is applied to content in a plurality of documents to identify topics and subjects. Analytic analysis is then applied to the identified topics and subjects to identify concepts. The content in each of the plurality of documents is partitioned into a first structured hierarchy, preserving at least one structure in each document inherent in the each document. Access is then provided to the content through a first index based upon utilizing the first structured hierarchy and through a second index utilizing a second structured hierarchy. The conceptual relationship criteria are based upon a directed graph with weights based upon a similarity and a distance based upon concepts. | 04-07-2016 |
20160098379 | Preserving Conceptual Distance Within Unstructured Documents - A method, system and computer-usable medium are disclosed for preserving conceptual distance within unstructured documents by characterizing conceptual relationships. Natural language processing is applied to content in a plurality of documents to identify topics and subjects. Analytic analysis is then applied to the identified topics and subjects to identify concepts. The content in each of the plurality of documents is partitioned into a first structured hierarchy, preserving at least one structure in each document inherent in the each document. Access is then provided to the content through a first index based upon utilizing the first structured hierarchy and through a second index utilizing a second structured hierarchy. The conceptual relationship criteria are based upon a directed graph with weights based upon a similarity and a distance based upon concepts. | 04-07-2016 |
20160098320 | EFFICIENTLY STORING DATA IN A DISPERSED STORAGE NETWORK - A method includes determining that one or more data blocks of a permanently stored data blocks are to be deleted. In response, the method further includes obtaining a group of partial redundancy data for the permanently stored data blocks. The method further includes identifying a temporarily stored plurality of data blocks for which partial redundancy data does not yet exist. The method further includes creating a new plurality of data blocks from data blocks of the permanently stored plurality of data blocks that are to remain permanently stored and data blocks from the temporarily stored plurality of data blocks that are to be permanently stored. The method further includes permanently storing the new plurality of data blocks. The method further includes generating a new group of partial redundancy data. The method further includes sending the new group of partial redundancy data and the group of partial redundancy data. | 04-07-2016 |
20160098296 | TASK POOLING AND WORK AFFINITY IN DATA PROCESSING - Mechanisms for improving computing system performance by a processor device. System resources are organized into a plurality of groups. Each of the plurality of groups is assigned one of a plurality of predetermined task pools. Each of the predetermined task pools has a plurality of tasks. Each of the plurality of groups corresponds to at least one physical boundary of the system resources such that a speed of an execution of those of the plurality of tasks for a particular one of the plurality of predetermined task pools is optimized by a placement of an association with the at least one physical boundary and the plurality of groups. | 04-07-2016 |
20160098295 | INCREASED CACHE PERFORMANCE WITH MULTI-LEVEL QUEUES OF COMPLETE TRACKS - Exemplary method, system, and computer program product embodiments for increased cache performance using multi-level queues by a processor device. The method includes distributing to each one of a plurality of central processing units (CPUs) workload operations for creating complete tracks from partial tracks, creating sub-queues of the complete tracks for distributing to each one of the CPUs, and creating demote scan tasks based on workload of the CPUs. Additional system and computer program product embodiments are disclosed and provide related advantages. | 04-07-2016 |
20160098228 | PRIORITY BASED DEPOPULATION OF STORAGE RANKS - Various embodiments for priority based depopulation of ranks in a computing storage environment are provided. In one embodiment, a method comprises prioritizing a plurality of ranks selected for depopulation. Highest priority and lowest priority ranks are marked and selected for depopulation. Lower priority ranks are placed in a queue in order of priority. An extent of one of the lower priority ranks is migrated to a rank not selected for depopulation. One of the lower priority ranks with newer data is selected for executing a read operation in response to a read operation to one of the lower priority ranks. At least one of the highest priority ranks is depopulated to at least one of a plurality of targeted ranks. The highest priority rank is left as unassigned to one of the plurality of targeted ranks until determining if the highest priority rank is to be assigned the targeted ranks. | 04-07-2016 |
20160092812 | End-to-End Commodity and Commodity Marking Tracking - Embodiments of the invention relate to establishing commodity traceability across supplier, manufacturer, and customer processes via end-to-end commodity marking traceability. A manufacturer receives incoming material, such as an industry standard commodity, from a supplier and authenticates a marking affixed to the incoming material. After authenticating the supplier's marking for the incoming material, a second marking is affixed to the incoming material. The commodity is converted at manufacturing into a finished product and associated with finished product data. The supplier's marking and the manufacturer's markings for the incoming material are related, and the relationship is related to the finished product data. The stored and maintained relationships supports integration of the first marking data and the second marking data with product data, and supports end-to-end commodity marking traceability. | 03-31-2016 |
20160092792 | Method for Dynamically Assigning Question Priority Based on Question Extraction and Domain Dictionary - An approach is provided dynamically prioritizing question requests based on extracted question data. In the approach, performed by an information handling system, a number of question requests to a question and answering (QA) system are received from a computer network, and a plurality of question priority parameters are identified, including one or more question topics and a plurality question context parameters, by performing natural language processing (NLP) analysis of each question request. The approach determines a target priority value for each question request based on the plurality of question priority parameters identified for said question request. By evaluating the target priority values for the plurality of question requests, processing of the question requests is prioritized, such as by applying an artificial intelligence (AI) learned models and rule-based logic at the information handling system to evaluate the target priority values for the plurality of question requests. | 03-31-2016 |
20160092741 | OPTIMIZING THE DETECTION OF OBJECTS IN IMAGES - A method, system, and computer program product, for detecting objects of interest in a digital image. At least positional data associated with a vehicle is received. Geographical information associated with the positional data is received. A probability of detecting an object of interest within a corresponding geographic area associated with the vehicle is determined based on the geographical data. The probability is compared to a given threshold. An object detection process is at least one of activated and maintained in an activated state in response to the probability being one of above and equal to the given threshold. The object detection process detects objects of interest within at least one image representing at least one frame of a video sequence of an external environment. | 03-31-2016 |
20160092568 | TAGGING AND QUERYING SYSTEM OBJECTS - Methods, computing systems and computer program products implement embodiments of the present invention that include defining multiple group names, and identifying multiple system objects in a computer system such as a storage system. Examples of system objects include physical objects such as storage devices, network objects such as IP addresses, and logical objects such as logical volumes. Each of the system devices is tagged with a given group name, and upon receiving a query including a condition and an operation, one or more of the system devices matching the condition are identified, and the operation is performed on the one or more identified system objects. In some embodiments, the operation may include retrieving a parameter associated with the one or more identified system objects, and presenting a result of the query. In alternative embodiments, the operation may include updating a parameter associated with the one or more identified system objects. | 03-31-2016 |
20160092549 | Information Handling System and Computer Program Product for Deducing Entity Relationships Across Corpora Using Cluster Based Dictionary Vocabulary Lexicon - An approach is provided for identifying entity relationships based on word classifications extracted from business documents stored in a plurality of corpora. In the approach, performed by an information handling system, a plurality of cluster classifications are identified for the business documents so that entity information from the business documents can be classified or assigned to the cluster classifications, such as by performing natural language processing (NLP) analysis of the business documents. The approach applies semantic analysis to identify and score entity relationships between the entity information classified in the cluster classifications, and based on the scored entity relationships, cluster relationships between the cluster classifications are identified. | 03-31-2016 |
20160092523 | INFORMATION HANDLING SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DYNAMCALLY ASSIGNING QUESTION PRIORITY BASED ON QUESTION EXTRACTION AND DOMAIN DICTIONARY - An approach is provided dynamically prioritizing question requests based on extracted question data. In the approach, performed by an information handling system, a number of question requests to a question and answering (QA) system are received from a computer network, and a plurality of question priority parameters are identified, including one or more question topics and a plurality question context parameters, by performing natural language processing (NLP) analysis of each question request. The approach determines a target priority value for each question request based on the plurality of question priority parameters identified for said question request. By evaluating the target priority values for the plurality of question requests, processing of the question requests is prioritized, such as by applying an artificial intelligence (AI) learned models and rule-based logic at the information handling system to evaluate the target priority values for the plurality of question requests. | 03-31-2016 |
20160092448 | Method For Deducing Entity Relationships Across Corpora Using Cluster Based Dictionary Vocabulary Lexicon - An approach is provided for identifying entity relationships based on word classifications extracted from business documents stored in a plurality of corpora. In the approach, performed by an information handling system, a plurality of cluster classifications are identified for the business documents so that entity information from the business documents can be classified or assigned to the cluster classifications, such as by performing natural language processing (NLP) analysis of the business documents. The approach applies semantic analysis to identify and score entity relationships between the entity information classified in the cluster classifications, and based on the scored entity relationships, cluster relationships between the cluster classifications are identified. | 03-31-2016 |
20160092298 | TIME ALIGNED TRANSMISSION OF CONCURRENTLY CODED DATA STREAMS - A method includes receiving a plurality of streams of data from a plurality of data sources. During a first time interval of receiving the streams of data, the method further includes dividing each of the plurality of streams into a first time-aligned data segment to produce a set of first time-aligned data segments. The method further includes generating a first data matrix from data blocks of the set of first time-aligned data segments. The method further includes encoding the first data matrix using an encoding matrix to produce a first coded matrix. The method further includes slicing the first coded matrix into a first set of encoded data slices based on the first orientation. The method further includes outputting a first set of encoded data slices of the first coded matrix. | 03-31-2016 |
20160092132 | Consistent Data Retrieval In A Multi-Site Computing Infrastructure - Embodiments of the invention relate to dynamic application migration in a shared pool of configurable computer resources with disaster recovery support. Write operations are executed by an application at a first data site. Data is generated and stored in first data storage local to the first data site. The stored data is replicated from the first data storage to a backup data storage, and a consistency point of the data is created in both the first data storage and the backup data storage. In response to a local hardware failure at the first data site, an unplanned migration protocol is initialized to migrate the application to a second data site remote from the first data site, which includes re-launching the application at the second data site. Data is transferred from the backup data storage to the second data storage local to the second data site from the consistency point. | 03-31-2016 |
20160091405 | METHOD AND INTEGRATED DEVICE FOR ANALYZING LIQUID FLOW AND LIQUID-SOLID INTERFACE INTERACTION - An Integrated Circuit (IC) chip with a lab-on-a-chip, a method of manufacturing the lab-on-a-chip and a method of using the lab-on-a-chip for fluid flow analysis in physical systems through combination with computer modeling. The lab-on-a-chip includes cavities in a channel layer and a capping layer, preferably transparent, covering the cavities. Gates control two dimensional ( | 03-31-2016 |
20160087985 | Protecting Online Meeting Access Using Secure Personal Universal Resource Locators - Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a first user for addressing collaborative resource; responsive to the first user accessing the first user-specific URL, granting by a computing system access to the collaborative event to the first user; and responsive to a second user accessing the first user-specific URL, preventing by a computing system access to the collaborative event to the second user. Optionally, time criteria for accessing the first user-specific URL may be used to invalidating the first user-specific URL, wherein access to the collaborative resource is disabled. | 03-24-2016 |
20160087788 | CALCULATING STATE OF CRYPTOGRAPHIC OBJECTS AND GENERATING SEARCH FILTER FOR QUERYING CRYPTOGRAPHIC OBJECTS - Mechanisms are provided for calculating state of cryptographic objects and generating search filters for querying cryptographic objects based on the given state or on the given combination of unique states. The mechanism to calculate a state of a cryptographic object allows an application or system to resolve the current state of any cryptographic object with the following set of state altering date values: initial date, activation date, deactivation date, compromise date, and destroy date. A processing module may retrieve the state meta-data and calculate the current state of a given cryptographic object. The current state may be, for example, one of the following: unknown, pre-active, active, deactivated, compromised, destroyed, and destroyed-compromised. The mechanism to generate a search filter may generate a search query language (SQL) search filter to query for cryptographic objects using the state altering date values stored for each object. | 03-24-2016 |
20160087533 | Slab Inductor Device Providing Efficient On-Chip Supply Voltage Conversion And Regulation - A method is disclosed to operate a voltage conversion circuit such as a buck regulator circuit that has a plurality of switches coupled to a voltage source; a slab inductor having a length, a width and a thickness, where the slab inductor is coupled between the plurality of switches and a load and carries a load current during operation of the plurality of switches; and a means to reduce or cancel the detrimental effect of other wires on same chip, such as a power grid, potentially conducting return current and thereby degrading the functionality of this slab inductor. In one embodiment the wires can be moved further away from the slab inductor and in another embodiment magnetic materials can be used to shield the slab inductor from at least one such interfering conductor. | 03-24-2016 |
20160086629 | DYNAMICALLY CONTROLLING TAPE VELOCITY - A maximum velocity is dynamically determined during a tape drive operation to obtain a statistical standard deviation of a position error signal (PES) that yields an amount of stopwrite (SW) operations that avoids backhitching. The tape velocity is adjusted to the maximum velocity. | 03-24-2016 |
20160085896 | METHOD FOR DESIGNING TOPOGRAPHIC PATTERNS FOR DIRECTING THE FORMATION OF SELF-ASSEMBLED DOMAINS AT SPECIFIED LOCATIONS ON SUBSTRATES - Methods and computer program products for designing topographic patterns for directing the formation of self-assembled domains at specified locations on substrates. The methods include generating mathematical models that operate on mathematical descriptions of the number and locations of cylindrical self-assembled domains in a mathematical description of a guiding pattern. | 03-24-2016 |
20160085722 | DATA PACKET PROCESSING - Proposed is an action machine for processing packet data in a network processor. The action machine comprises: first and second data storage units adapted to store data for processing; and a processing unit adapted to process data from the first and second data storage units. The first storage unit is adapted to be accessed by the processing unit and a unit external to the action machine, and the second storage unit is adapted to only be accessed by the processing unit. | 03-24-2016 |
20160085679 | Managing Access to a Cache Memory - Managing access to a cache memory includes dividing said cache memory into multiple of cache areas, each cache area having multiple entries; and providing at least one separate lock attribute for each cache area such that only a processor thread having possession of the lock attribute corresponding to a particular cache area can update that cache area. | 03-24-2016 |
20160085676 | Managing Access to a Cache Memory - Managing access to a cache memory includes dividing said cache memory into multiple of cache areas, each cache area having multiple entries; and providing at least one separate lock attribute for each cache area such that only a processor thread having possession of the lock attribute corresponding to a particular cache area can update that cache area. | 03-24-2016 |
20160085673 | CONCURRENT UPDATE OF DATA IN CACHE WITH DESTAGE TO DISK - Mechanisms for concurrent update of data in cache with destage of data from the cache to disk by a processor device. A second copy of the data is established in the cache and on a cache directory. A first copy of the data and the second copy of the data are adjacently ordered in the cache directory. One of the first and second copies is held for an update operation so as to include a latest data modification, while the remaining copy concurrently is used for a destage operation to disk. | 03-24-2016 |
20160085629 | MODIFYING A DISPERSED STORAGE NETWORK MEMORY DATA ACCESS RESPONSE PLAN - A method includes segmenting a data object into data segments based on segmenting information. For a first data segment, the method further includes dispersed storage error encoding the first data segment. The method further includes identifying a first set of storage units from a pool of storage units. The method further includes issuing a first set of write requests to the first set of storage units. The method further includes receiving write responses from the first set of storage units. The method further includes, when a write threshold number of favorable write responses have been received, generating a first DSN addresses for encode data slices based on Internet addresses of storage units that provided the favorable write responses and based on the temporary slice names of the encoded data slices. The method further includes storing an association of the first DSN addresses and the first encode data slices. | 03-24-2016 |
20160085581 | HYPERVISOR TO I/O STACK CONDUIT IN VIRTUAL REAL MEMORY - Provided is a virtual interface, a “Forwarder” and a Virtual Block Storage Device (VBSD). The virtual interlace is the interface between a Command/Response Queue (CRQ), which receives CRQ commands from a hypervisor, and a common interface of the Forwarder. The Forwarder receives I/O commands in a format associated with the common interface and converts the commands into a generic I/O format. The reformatted command is transmitted to the VBSD. The hypervisor sends a read or write (R/W) request to the virtual interface, which passes the request to the Forwarder. The Forwarder receives the request, converts the request into a form readable by the VBSD and transmits the converted request to the VBSD. The VBSD transmits the request to a block storage device and returns the response to the Forwarder. The Forwarder replies to the request from the virtual interface with the response from the ABSD. The virtual interface then responds to the hypervisor. | 03-24-2016 |
20160084882 | TEST PROBE HEAD FOR FULL WAFER TESTING - A test probe head for probe testing multiple chips on a wafer in a single probing. A probe head substrate includes an array of probe tip attach pads on one surface. The array includes a subarray for each probe head chip test site. Probe tips attached to each probe tip attach pad have an across the head tip height variation less than one micrometer (1 μm). The subarray probe tips may be on a pitch at or less than fifty microns (50 μm). The test probe head may be capable of test probing all chips in a quadrant and even up to all chips on a single wafer in a single probing. | 03-24-2016 |
20160080392 | IMPLEMENTING SECURITY IN A SOCIAL APPLICATION - Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a security level individualized to the connection based on the closeness level. | 03-17-2016 |
20160080286 | OPTIMALLY PROVISIONING AND MERGING SHARED RESOURCES TO MAXIMIZE RESOURCE AVAILABILITY - A shared resource system, a method of managing resources on the system and computer program products therefor. A resource consolidation unit causes identification of identical memory segments on host computers. The resource consolidation unit may be in one or more host computers. Each identical memory segment is associated with multiple instances of resources provisioned on at least two host computers. The resource consolidation unit causes provisioned resources to be migrated for at least one instance from one of the two hosts to another. On the other host computer the migrated resources share respective identical memory segments with resources already provisioned on the other host. | 03-17-2016 |
20160078349 | Method for Identifying Verifiable Statements in Text - A method, system and computer-usable medium are disclosed for identifying verifiable statements in a corpus of text. A training corpus of text containing manually annotated instances of verifiable and non-verifiable statements is processed to parse the text into segmented statements, which are in turn processed to extract features. The extracted features and the annotated statements are then processed with a machine learning algorithm to generate a verifiable statement classification model. In turn, the verifiable statement classification model is referenced by a verifiable statement classification system to distinguish verifiable and non-verifiable statements contained within an input corpus of text. | 03-17-2016 |
20160078018 | Method for Identifying Verifiable Statements in Text - A method, system and computer-usable medium are disclosed for identifying verifiable statements in a corpus of text. A training corpus of text containing manually annotated instances of verifiable and non-verifiable statements is processed to parse the text into segmented statements, which are in turn processed to extract features. The extracted features and the annotated statements are then processed with a machine learning algorithm to generate a verifiable statement classification model. In turn, the verifiable statement classification model is referenced by a verifiable statement classification system to distinguish verifiable and non-verifiable statements contained within an input corpus of text. | 03-17-2016 |
20160077972 | Efficient and Consistent Para-Virtual I/O System - Embodiments of the invention relate to a para-virtual I/O system. A consistent para-virtual I.O system architecture is provided with a new virtual disk interface and a semantic journaling mechanism. The virtual disk interface is extended with two primitives for flushing and ordering I/O, both of the primitives being exported to para-virtual I/O drivers in a guest operating system. The ordering primitive guarantees ordering of preceeding writes, and the flushing primitive enforces order and durability. The guest drivers selectively uses both of these primitives based on semantics of the data being persisted from the para-virtual cache hierarchy to physical disk. The order of committed writes is enforced in order to enable a consistent start recovered after a crash. | 03-17-2016 |
20160077696 | SYSTEM, METHOD, AND APPARATUS FOR PRESERVATION OF ACCESSIBILITY AND SERVICEABILITY INFORMATION - A computer program product including a computer useable storage medium to store a computer readable program for communicating serviceability information according to accessibility information. The computer readable program, when executed on a computer, causes the computer to perform operations including displaying an image on a computer display. The image includes a screen shot of display content from a remote computer display. The operations further include identifying a selection indicator relative to the image of the display content from the remote computer display. The operations further include communicating accessibility context information to a user based on the location of the selection indicator relative to the image of the display content from the remote computer display. The accessibility context information includes an accessibility parameter associated with an application window depicted within the image of the display content from the remote computer display. | 03-17-2016 |
20160072753 | SUPPRESSING CONTENT OF A SOCIAL NETWORK - A method of suppressing content of a social network, the method comprising monitoring for a number of gestures of rejection of content on the social network from a number of users, generating suppression data based on the gestures of rejection, receiving input from a first user among the number of users indicating that the suppression data is to be leveraged, and suppressing content based on the suppression data. | 03-10-2016 |
20160072461 | Current-Mode Sense Amplifier - A current sense amplifier comprises a reference current input terminal, a control line input terminal, a sense current input terminal, an output terminal, a first NAND gate, a transmission gate, and two cross coupled inverters each comprising a n-FET. The first NAND gate comprises an output terminal being coupled to the output terminal of the amplifier. The transmission gate comprises two transmission terminals and a gate terminal. The gate terminal is coupled to the control line terminal. Sources of the n-FETs are coupled to the sense current input terminal and the reference current input terminal, respectively. One of the transmission terminals is coupled to an input terminal of one of the inverters and the other transmission terminal is coupled to an input terminal of the other inverter. The input terminals of the first NAND gate are coupled to the control line terminal and one of the input terminals of the inverters, respectively. | 03-10-2016 |
20160071555 | Current-Mode Sense Amplifier and Reference Current Circuitry - An electronic circuit comprising is provided with a current sense amplifier. The amplifier comprises a reference current input terminal, a sense current input terminal, and a first output terminal. The electronic circuit includes a reference current source. The reference current source includes two reference n-FET stacks connected in series, and the reference current input terminal is coupled to a ground terminal via the two reference n-FET stacks. The electronic circuit includes a plurality of memory cells each coupled in parallel via a respective sense n-FET stack to the sense current input terminal. The amplifier is configured to generate a first logical value at the first output terminal of the amplifier in response to a sense current of the sense current input terminal being lower than a reference current of the reference current input terminal. The amplifier is further configured to generate a second logical value at the first output terminal of the amplifier in response to the sense current being higher than the reference current. | 03-10-2016 |
20160071295 | Automatic Tuning of Value-Series Analysis Tasks Based on Visual Feedback - A method for selecting an analysis procedure for a value series, including displaying a value series on a computer display monitor, receiving one or more sequences of user provided annotations, where the annotations overlay at least a sub-interval of the value series on the computer display monitor, using the sequences of user provided annotations to select an optimal value series analysis method from a set of value series analysis methods, where selecting an optimal value series analysis method includes determining parameter values for the optimal value series analysis method, and presenting the selected optimal value series analysis method and parameters, and the optimal reconstruction of the annotation sequences to the user. | 03-10-2016 |
20160070730 | Data Encoding and Processing Columnar Data - The embodiments described herein relate to accessing a plurality of data elements. A page of column data is compressed and stored in a format that includes a collection of data elements. A tuple map is stored, and the collection of data elements is indexed via the tuple map. A query is processed based on the compressed page by identifying a set of tuple identifiers mapping to stored data in support of the query. Each tuple identifier corresponds to a location of a respective tuple of the compressed page. | 03-10-2016 |
20160070660 | RESETTING MEMORY LOCKS IN A TRANSACTIONAL MEMORY SYSTEM - A system and computer program product for resetting of memory locks in a transactional memory system. The system includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The system further includes the processor determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register. | 03-10-2016 |
20160070650 | RESETTING MEMORY LOCKS IN A TRANSACTIONAL MEMORY SYSTEM - A method for resetting of memory locks in a transactional memory system. The method includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The method further includes determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register. | 03-10-2016 |
20160069840 | METHODS AND SYSTEMS TO IDENTIFY AND MANAGE RECYCLABLE MATERIALS - A method to identify and manage recyclable materials provides a recyclable material with a quartz crystal identification element configured to oscillate at a predetermined frequency associated with the recyclable material. A mobile device detects the oscillation frequency of the quartz crystal, identifies the recyclable material based on the detected oscillation frequency, and sends that information to a controller. | 03-10-2016 |
20160066061 | USE OF PARALLEL DATA PROGRAMMING FOR DEVICE INTEGRATION - Provided are techniques for detecting a presentation of media content on a first display device; synchronizing contextual data corresponding to the media content with the media content; transmitting the contextual metadata corresponding to the media content to a second display device in response to the detecting, wherein the second display device is a different device than the first display device; and presenting the contextual metadata, in synchronization with the media content, on the second display device in conjunction with the presentation of the media content on the first display device. | 03-03-2016 |
20160066019 | USE OF PARALLEL DATA PROGRAMMING FOR DEVICE INTEGRATION - Provided are techniques for detecting a presentation of media content on a first display device; synchronizing contextual data corresponding to the media content with the media content; transmitting the contextual metadata corresponding to the media content to a second display device in response to the detecting, wherein the second display device is a different device than the first display device; and presenting the contextual metadata, in synchronization with the media content, on the second display device in conjunction with the presentation of the media content on the first display device. | 03-03-2016 |
20160065540 | Shared Data Encryption and Confidentiality - Embodiments of the invention relate to deduplication and compression on data performed downstream from where the data is encrypted. Confidentiality of data is maintained, and the ability of storage systems to perform data reduction functions is supported. Data to be written to a storage system is separated into data chunks. Each data chunk is decrypted into a plaintext data format with a master encryption key of an owning entity. Once decrypted, one or more advanced data functions may be performed on the plaintext. A private key is created and used to encrypt the plaintext of the data chunk(s), which are stored as an encryption unit. Thereafter, a first wrapped key is created by encrypting the private key with the master key. The wrapped key is stored as metadata of the data chunk. Access to each data chunk is limited to one or more entities that have been granted access. | 03-03-2016 |
20160065518 | TRANSMITTAL OF BLOCKED MESSAGE NOTIFICATION - A method according to one embodiment is for transmitting a message. In one embodiment, one or more processor of a messaging system identifies a certain message of the messaging system, the certain message being a blocked message intended for transmission to a certain user of the messaging system. In one embodiment, the one or more processor further determines one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user, the certain user being a prospective recipient of a message. In one embodiment, the one or more processor transmits a message to the certain user responsively to a result of the determining of the one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user of the messaging system. | 03-03-2016 |
20160065366 | Password-Based Generation and Management of Secret Cryptographic Keys - Methods and apparatus are provided for generating a secret cryptographic key of a user computer connectable to a server via a network. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. The user computer encodes the secret user value and an input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first and the check values to check whether the input password equals the user password. If so, the server encodes the first and the secret server values to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value. | 03-03-2016 |
20160064509 | HYDROGEN-FREE SILICON-BASED DEPOSITED DIELECTRIC FILMS FOR NANO DEVICE FABRICATION - Embodiments of the present invention provide hydrogen-free dielectric films and methods of fabrication. A hydrogen-free precursor, such as tetraisocyanatosilane, and hydrogen-free reactants, such as nitrogen, oxygen (O2/O3) and nitrous oxide are used with chemical vapor deposition processes (PECVD, thermal CVD, SACVD, HDP CVD, and PE and Thermal ALD) to create hydrogen-free dielectric films. In some embodiments, there are multilayer dielectric films with sublayers of various materials such as silicon oxide, silicon nitride, and silicon oxynitride. In embodiments, the hydrogen-free reactants may include Tetra Isocyanato Silane, along with a hydrogen-free gas including, but not limited to, N2, O2, O3, N2O, CO2, CO and a combination thereof of these H-Free gases. Plasma may be used to enhance the reaction between the TICS and the other H-free gasses. The plasma may be controlled during film deposition to achieve variable density within each sublayer of the films. | 03-03-2016 |
20160064330 | METHOD AND STRUCTURE TO REDUCE THE ELECTRIC FIELD IN SEMICONDUCTOR WIRING INTERCONNECTS - Embodiments of the present invention provide increased distance between vias and neighboring metal lines in a back end of line (BEOL) structure. A copper alloy seed layer is deposited in trenches that are formed in a dielectric layer. The trenches are then filled with copper. An anneal is then performed to create a self-forming barrier using a seed layer constituent, such as manganese, as the manganese is drawn to the dielectric layer during the anneal. The self-forming barrier is disposed on a shoulder region of the dielectric layer, increasing the effective distance between the via and its neighboring metal lines. | 03-03-2016 |
20160064218 | HYDROGEN-FREE SILICON-BASED DEPOSITED DIELECTRIC FILMS FOR NANO DEVICE FABRICATION - Embodiments of the present invention provide hydrogen-free dielectric films and methods of fabrication. A hydrogen-free precursor, such as tetraisocyanatosilane, and hydrogen-free reactants, such as nitrogen, oxygen (O2/O3) and nitrous oxide are used with chemical vapor deposition processes (PECVD, thermal CVD, SACVD, HDP CVD, and PE and Thermal ALD) to create hydrogen-free dielectric films. In some embodiments, there are multilayer dielectric films with sublayers of various materials such as silicon oxide, silicon nitride, and silicon oxynitride. In embodiments, the hydrogen-free reactants may include Tetra Isocyanato Silane, along with a hydrogen-free gas including, but not limited to, N2, O2, O3, N2O, CO2, CO and a combination thereof of these H-Free gases. Plasma may be used to enhance the reaction between the TICS and the other H-free gasses. The plasma may be controlled during film deposition to achieve variable density within each sublayer of the films. | 03-03-2016 |
20160063618 | INTERCEPTION OF DIGITAL INTERACTION TO DRIVE DESIRED OUTCOMES - Method, system and computer program product for transaction evaluation based on a potential impact of the potential transaction on defined plans. In one embodiment, the method comprises receiving at a financial analysis computer system specified interactions intercepted when a person uses a client computing device to identify a potential transaction, and the analysis computer system processing these interactions for determining a potential impact of said transaction on one or more defined goals of the person. Before the person commits to the transaction, the analysis computer system generates a client guidance signal based on this determining, and sends the client guidance signal to the client computing device to instruct that device to convey guidance to the specified about the transaction. The specified interactions received at the financial analysis computer system data may identify a transaction context and activity of the person. | 03-03-2016 |
20160063607 | MANUFACTURING ADAPTIVE ORDER LOAD FOR COMPLEX CONFIGURE TO ORDER PRODUCTS - A data processing system (DPS) and a computer program product selectively modifies an existing production order based on a change request. An order configuration module (OCM) receives order specifications for a second order that replaces and/or modifies a first order, while the first order is being fulfilled. The OCM generates hash tag pairs respectively associated with various characteristics of the orders. For each hash tag pair, the OCM compares a first hash tag associated with the first order with a second hash tag associated with the second order, using an established pattern. If the hash tags match, the OCM includes within a second production order, an unchanged production specification corresponding to the first hash tag. If a match does not occur, the OCM initiates an order reload, which provides, within the second production order, new production specifications that are associated with the second hash tag. | 03-03-2016 |
20160063605 | MANUFACTURING ADAPTIVE ORDER LOAD FOR COMPLEX CONFIGURE TO ORDER PRODUCTS - A method selectively modifies an existing production order based on a change request. An order configuration module (OCM) receives order specifications for a second order that replaces and/or modifies a first order, while the first order is being fulfilled. The OCM generates hash tag pairs respectively associated with various characteristics of the orders. For each hash tag pair, the OCM compares a first hash tag associated with the first order with a second hash tag associated with the second order, using an established pattern. If the hash tags match, the OCM includes within a second production order, an unchanged production specification corresponding to the first hash tag. If a match does not occur, the OCM initiates an order reload, which provides, within the second production order, new production specifications that are associated with the second hash tag. | 03-03-2016 |
20160063126 | WEB-BASED CUSTOMER SERVICE INTERFACE - A system and method for processing a web-based query is provided. The system comprises a web server for transmitting a web form having a text field box for entering a natural language query, and a language analysis server for extracting concepts from the natural language query and classifying the natural language query into predefined categories via computed match scores based upon the extracted concepts and information contained within an adaptable knowledge base. In various embodiments, the web server selectively transmits either a resource page or a confirmation page to the client, based upon the match scores. The resource page may comprise at least one suggested response corresponding to at least one predefined category. The language analysis server may adapt the knowledge base in accordance with a communicative action received from the client after the resource page is transmitted. | 03-03-2016 |
20160062918 | Receipt, Data Reduction, and Storage of Encrypted Data - Embodiments of the invention relate to processing streams of encrypted data received from multiple users. As the streams are processed, smaller partitions in the form of data chunks are created and subject to individual decryption. The data chunks are placed into sub-stream based on a master key associated with its owning entity. Prior to processing, the data chunks in each stream are decrypted, and advanced functions, including but not limited to de-duplication and compression, are individually applied to the data chunks, followed by aggregation of processed data chunks into data units and encryption of the individual data units including use of a master key from the data's owning entity. Individual encryption units are created by encrypting the data unit(s) with an encryption key, thereby limiting access to the data unit. Confidentiality of data is maintained, and the ability of storage systems to perform data reduction functions is supported. | 03-03-2016 |
20160062892 | CACHE BACKING STORE FOR TRANSACTIONAL MEMORY - In response to a transactional store request, the higher level cache transmits, to the lower level cache, a backup copy of an unaltered target cache line in response to a target real address hitting in the higher level cache, updates the target cache line with store data to obtain an updated target cache line, and records the target real address as belonging to a transaction footprint of the memory transaction. In response to a conflicting access to the transaction footprint prior to completion of the memory transaction, the higher level cache signals failure of the memory transaction to the processor core, invalidates the updated target cache line in the higher level cache, and causes the backup copy of the target cache line in the lower level cache to be restored as a current version of the target cache line. | 03-03-2016 |
20160062891 | CACHE BACKING STORE FOR TRANSACTIONAL MEMORY - In response to a transactional store request, the higher level cache transmits, to the lower level cache, a backup copy of an unaltered target cache line in response to a target real address hitting in the higher level cache, updates the target cache line with store data to obtain an updated target cache line, and records the target real address as belonging to a transaction footprint of the memory transaction. In response to a conflicting access to the transaction footprint prior to completion of the memory transaction, the higher level cache signals failure of the memory transaction to the processor core, invalidates the updated target cache line in the higher level cache, and causes the backup copy of the target cache line in the lower level cache to be restored as a current version of the target cache line. | 03-03-2016 |
20160062824 | METHOD AND SYSTEM FOR SCRUBBING DATA WITHIN A DATA STORAGE SUBSYSTEM - Various embodiments for scrubbing data within a data storage subsystem are disclosed. According to one embodiment, a method is provided for scrubbing data of a storage element within a data storage subsystem, the method comprising: selecting a storage element from the plurality of storage events; determining that a quantity of active data has reached a predetermined quantity threshold; and temporarily suspending data modifications on a portion of the selected storage element while maintaining read access to the selected storage element in response to the determination. | 03-03-2016 |
20160062771 | OPTIMIZE CONTROL-FLOW CONVERGENCE ON SIMD ENGINE USING DIVERGENCE DEPTH - There are provided a system, a method and a computer program product for selecting an active data stream (a lane) while running SPMD (Single Program Multiple Data) code on SIMD (Single Instruction Multiple Data) machine. The machine runs an instruction stream over input data streams. The machine increments lane depth counters of all active lanes upon the thread-PC reaching a branch operation. The machine updates the lane-PC of each active lane according to targets of the branch operation. The machine selects an active lane and activates only lanes whose lane-PCs match the thread-PC. The machine decrements the lane depth counters of the selected active lanes and updates the lane-PC of each active lane upon the instruction stream reaching a first instruction. The machine assigns the lane-PC of a lane with a largest lane depth counter value to the thread-PC and activates all lanes whose lane-PCs match the thread-PC. | 03-03-2016 |
20160062362 | MEDIA MOBILITY UNIT (MMU) AND METHODS OF USE THEREOF - In one embodiment, a data storage system includes a source media library configured to send a message to a destination media library when a media cartridge from the source media library is sent to the destination media library using a media mobility unit (MMU), and/or a destination media library configured to receive a message from a source media library when a media cartridge from the source media library is sent to the destination media library using a MMU. In another embodiment, a method for transporting a media cartridge includes receiving one or more media cartridges from a source media library, storing the media cartridge(s) in a holding portion of a media mobility unit, sensing at least an approximate location of the media mobility unit, transporting the media cartridge(s) to a destination library; and transferring the media cartridge(s) from the MMU to the destination media library. | 03-03-2016 |
20160062347 | METHOD AND SYSTEM FOR HIERARCHICAL DATA-DRIVEN INVENTORY AND WAREHOUSE MANAGEMENT FOR MANUFACTURING ENVIRONMENTS - A method, data processing system and computer program product for managing inventory used in a manufacturing operation to manufacture a product. The method includes a processor communicating with at least one database containing manufacturing operation data. Several inventory locations and components are identified within the manufacturing operation data. A current component inventory and space data, historical component usage data and a demand forecast are retrieved. A statistical analysis is performed upon the current component inventory and space data, the historical component usage data and the demand forecast to obtain a target inventory level range for each of the components at each of the inventory locations. An inventory level control chart is generated, based on the statistical analysis, for selected components associated with at least one inventory location. | 03-03-2016 |
20160060419 | METHODS AND MATERIALS FOR DEPOLYMERIZING POLYESTERS - Provided is a method of depolymerizing polyesters from post-consumer products, such as beverage bottles, to produce a high purity reaction product. For the depolymerization reaction, the polyesters are reacted with an alcohol and an amine organocatalyst at a temperature of about 150° C. to about 250° C. In one application, the use of an organocatalyst with a boiling point significantly lower than the boiling point of the reactant alcohol allows for the ready recycling of the amine organocatalyst. In another application, performing the depolymerization reaction under pressure at a temperature above the boiling point of the alcohol allows for accelerated depolymerization rates and the recovery of the organocatalyst with no further heat input. In a further application, glycolytic depolymerization of poly(ethylene terephthalate) (PET) produces a reaction product of bis(2-hydroxyethyl)terephthalate (BHET), which may in turn be used to produce high purity beverage bottle grade PET, in a closed loop process with minimal waste. | 03-03-2016 |
20160057889 | Fan Control Method For A Computer System Based On A Time Variable Rate of Current - A fan control method for a computer system is provided. The computer system includes a fan and a target device. The fan control system includes a controller to control the rotation speed of the fan. The controller controls the rotation speed according to a time-variable rate of current consumed by the target device. Particularly, when the time-variable rate of current exceeds a threshold, the controller controls the fan to operate at a maximum rotation speed. | 02-25-2016 |
20160057180 | Social Collaborative Mapping - Provided are techniques for the modification of social collaborative maps that include processors; a computer-readable storage medium (CRSM); a concept map stored on the CRSM, the concept map comprising a plurality of nodes; a plurality of connections between the plurality of nodes; and a plurality of social network connections, wherein each node of the plurality of nodes is coupled to a corresponding subset of the plurality of social network connections; and logic, stored on the CRSM and executed on the plurality of processors, for providing a user interface to provide a user access to the plurality of nodes and to the plurality of social network connections; collecting data corresponding to navigation of the user of the plurality of nodes and interaction by the user with the plurality of social network connections; analyzing the data and modifying, based upon the analyzing, the concept map to generate a modified concept map. | 02-25-2016 |
20160056111 | HYDROGEN-FREE SILICON-BASED DEPOSITED DIELECTRIC FILMS FOR NANO DEVICE FABRICATION - Embodiments of the present invention provide hydrogen-free dielectric films and methods of fabrication. A hydrogen-free precursor, such as tetraisocyanatosilane, and hydrogen-free reactants, such as nitrogen, oxygen (O2/O3) and nitrous oxide are used with chemical vapor deposition processes (PECVD, thermal CVD, SACVD, HDP CVD, and PE and Thermal ALD) to create hydrogen-free dielectric films. In some embodiments, there are multilayer dielectric films with sublayers of various materials such as silicon oxide, silicon nitride, and silicon oxynitride. In embodiments, the hydrogen-free reactants may include Tetra Isocyanato Silane, along with a hydrogen-free gas including, but not limited to, N2, O2, O3, N2O, CO2, CO and a combination thereof of these H-Free gases. Plasma may be used to enhance the reaction between the TICS and the other H-free gasses. The plasma may be controlled during film deposition to achieve variable density within each sublayer of the films. | 02-25-2016 |
20160055207 | Processing Multi-Way Theta Join Queries Involving Arithmetic Operators on Mapreduce - Methods, systems, and computer program products for processing multi-way theta join queries involving arithmetic operators on MapReduce are provided herein. A method includes converting (i) a multi-way theta join query into a multi-way interval join query, and (ii) one or more items of data associated with the multi-way theta join query to one or more items of interval data; executing the multi-way interval join query on the one or more items of interval data via MapReduce to generate an output, wherein the output comprises a set of multiple responses to the multi-way interval join query; and processing the output to generate a solution to the multi-way theta join query, wherein said processing comprises discarding each response from the set that does not satisfy the multi-way theta join query. | 02-25-2016 |
20160055091 | FUZZY COUNTERS FOR NVS TO REDUCE LOCK CONTENTION - A method for data management in a computing storage environment includes a processor device, operable in the computing storage environment, that divides a plurality of counters tracking write and discard storage operations through Non Volatile Storage (NVS) space into first, accurate, and second, fuzzy, groups where the first, accurate, group is one of updated on a per operation basis, while the second, fuzzy, group is one of updated on a more infrequent basis as compared to the first, accurate group. | 02-25-2016 |
20160055034 | STREAM PROCESSING USING A CLIENT-SERVER ARCHITECTURE - Responsive to a client request, a processing thread for handling the client request is assigned. Responsive to the client request, a server request is sent to a stream server configured to interact with a plurality of stream processing nodes. The processing thread is maintained in an idle state pending a write response message from the stream server. The processing thread is returned to an active state responsive to receiving the write response message including a stream processing result from the stream server. A client response including the stream processing result is sent to the client | 02-25-2016 |
20160054941 | SPACE RESERVATION IN A DEDUPLICATION SYSTEM - A calculated factoring ratio is determined as a weighted ratio of current nominal data to physical data. A maximal nominal estimated space in the computing storage environment is calculated. A remaining space, defined as the maximal nominal estimated space minus a current nominal space in the computing storage environment, is calculated. Data replication operations are accepted and stored in the computing storage environment if the remaining space is below a predetermined threshold of space for backup operations. | 02-25-2016 |
20160054367 | POWER DISTRIBUTION UNIT AND ALARM METHOD APPLIED IN THE SAME - A power distribution unit including a base, at least one socket, at least one detecting unit and a management unit is provided. The socket is disposed at the base and has at least one power end and a ground end. The detecting unit is disposed at the base. When a plug is disposed at the socket, the detecting unit outputs an alarm signal if the plug is electrically connected to the power end of the socket but the plug is not electrically connected to the ground end of the socket. The management unit is electrically connected to the detecting unit and performs a predetermined operation in response to the alarm signal. | 02-25-2016 |
20160050677 | SYNCHRONIZATION METHOD AND APPARATUS FOR A WIRELESS WIDE BAND SYSTEM IN AN INTERFERENCE ENVIRONMENT - Synchronization method and apparatus for a wireless wide band system in an interference environment. The method includes: obtaining interference information of a network; selecting at least one channel based at least in part on the interference information; and transmitting resource information through the at least one channel, wherein the resource information indicates a resource allocation determined at least in part on the interference information; and wherein a position of the at least one channel is indicated by a synchronization sequence. The present invention also provides another method and apparatus for synchronization. | 02-18-2016 |
20160050641 | LOCATING COMPUTER-CONTROLLED ENTITIES - A beacon device is provided in proximity to a computing system within a computing center. A request to locate the computing system in the computing center is triggered on a central control unit. In response to the request to locate the computing system, the control unit generates specification data for a unique radio signal identifier, sends an activation request and the specification data to the beacon device, and provides the specification data to a portable device and stores the specification data on the portable device. In response to receiving the activation request, the beacon device sends a radio signal identifier generated from the specification data. | 02-18-2016 |
20160050297 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Methods and systems for compressing a logical data object for storage in a storage device in a distributed network are provided. One method includes creating, in the storage device, a compressed logical data object including a header and one or more allocated compressed sections with a predefined size, compressing the one or more obtained chunks of data corresponding to the logical data object, thus giving rise to the compressed data chunks, and storing the compressed data chunks in the compressed sections, wherein the compressed sections serve as atomic elements of compression or decompression operations during input/output transactions on the logical data object. | 02-18-2016 |
20160050239 | AUTOMATIC REGISTRATION OF DEVICES - Exemplary methods, computer systems, and computer program products for automatic registration of devices in a computer environment are provided. In one embodiment, the computer environment is configured for monitoring a fibre channel. In response to one of a fabric login (FLOGI) and a fixed disk (Fdisk) received from one of an initiator and a target disk, executing each of an automatic name server registration, a state change registration, and a management server registration to identify at least one of the plurality of devices, and signing up one of the initiator and the target disk for the automatic name server registration, the state change registration, and the management server registration, wherein port initialization is eliminated for the initiator. | 02-18-2016 |
20160049475 | GRAPHENE LAYER TRANSFER - A method to transfer a layer of graphene from one substrate to another substrate is provided. The method includes providing a first layered structure including, from bottom to top, a copper foil, a layer of graphene, an adhesive layer and a carrier substrate. The copper foil is removed exposing a surface of the layer of graphene. Next, an oxide bonding enhancement dielectric layer is formed on the exposed surface of the layer of graphene. A second layered structure including a receiver substrate and a dielectric oxide layer is provided. Next, an exposed surface of the dielectric oxide layer is bonded to an exposed surface of the oxide bonding enhancement dielectric layer. The carrier substrate and the adhesive layer are removed exposing the layer of graphene. | 02-18-2016 |
20160049345 | LOW-STRESS DUAL UNDERFILL PACKAGING - The present invention relates generally to flip chip technology and more particularly, to a method and structure for reducing internal packaging stresses, improving adhesion properties, and reducing thermal resistance in flip chip packages by using more than one underfill material deposited in different regions of the flip chip interface. According to one embodiment, a method of forming a first underfill in an interior region of an interface such that a periphery region of the interface remains open, and forming a second underfill in the periphery region is disclosed. | 02-18-2016 |
20160049198 | CONTENT ADDRESSABLE MEMORY CELL AND ARRAY - A content addressable memory (CAM) cell system is provided. The CAM cell system includes a first memory cell, a first logic circuitry and a first compare circuitry. The first logic circuit includes a first n-FET, a first p-FET, and a first input terminal. A gate of the first n-FET and a gate of the first p-FET are galvanically coupled to the first input terminal. The first compare circuitry is communicatively coupled to the first memory cell via a first coupling, and to the first input terminal via a second coupling. The first compare circuitry is configured to receive first data stored in the first memory cell via the first coupling, receive first match data, transmit a first binary logical value to the first input terminal via the second coupling in response to the first data not matching the first match data, and transmit a second binary logical value to the first input terminal via the second coupling in response to the first data matching the first match data. | 02-18-2016 |
20160048666 | Triggering Actions on a User Device Based on Biometrics of Nearby Individuals - Methods, systems, and computer program products for automatically triggering actions on a user device based on biometrics of nearby individuals are provided herein. A method includes capturing, via one or more sensors resident on a first computing device, one or more items of biometric information from one or more individuals located within a given proximity of the first computing device; determining a degree of proximity of the one or more individuals to the first computing device; transmitting, to a second computing device, (i) the one or more captured items of biometric information from the one or more individuals and (ii) the determined degree of proximity of the one or more individuals to the first computing device; and automatically executing one or more actions on the first computing device based on an instruction provided by the second computing device in response to said transmitting. | 02-18-2016 |
20160048551 | RELATIONSHIP-BASED WAN CACHING FOR OBJECT STORES - A method for pre-fetching objects from an object store and storing them in an object cache is disclosed. In one embodiment, such a method includes monitoring access to objects in an object store. The objects have metadata tags, such as user-defined or pre-defined metadata tags, associated therewith. The method further maintains a database for metadata tags associated with the objects, and keeps track of a number of object accesses per metadata tag. In the event a threshold number of object accesses for a particular metadata tag is reached, the method promotes objects having the metadata tag and/or a related metadata tag to an object cache. A corresponding system and computer program product are also disclosed. | 02-18-2016 |
20160048452 | DYNAMIC HIERARCHICAL MEMORY CACHE AWARENESS WITHIN A STORAGE SYSTEM - A computing device-implemented method for implementing dynamic hierarchical memory cache (HMC) awareness within a storage system is described. Specifically, when performing dynamic read operations within a storage system, a data module evaluates a data prefetch policy according to a strategy of determining if data exists in a hierarchical memory cache and thereafter amending the data prefetch policy, if warranted. The system then uses the data prefetch policy to perform a read operation from the storage device to minimize future data retrievals from the storage device. Further, in a distributed storage environment that include multiple storage nodes cooperating to satisfy data retrieval requests, dynamic hierarchical memory cache awareness can be implemented for every storage node without degrading the overall performance of the distributed storage environment. | 02-18-2016 |
20160048435 | SYSTEM AVAILABILITY IN PPRC FAILOVER ENVIRONMENTS - A method for improving system availability in data replication environments is disclosed herein. In one embodiment, such a method includes detecting a suspend trigger, where the suspend trigger indicates that data mirroring between a primary volume and a secondary volume has been suspended. The method further detects a swap trigger some time after detecting the suspend trigger. The swap trigger indicates that I/O directed to the primary volume has failed. In the event the swap trigger is detected within a specified amount of time after detecting the suspend trigger, the method redirects I/O from the primary volume to the secondary volume. A corresponding system and computer program product are also disclosed. | 02-18-2016 |
20160048340 | SYNCHRONOUS EXTENT MIGRATION PROTOCOL FOR PAIRED STORAGE - Extent migration is provided in a data storage environment configured for synchronous replication between a primary and secondary pair of storage entities, each having tiered storage devices. In one embodiment, by way of example only, a migration instruction is sent, by the primary storage entity, to the secondary storage entity, the migration instruction including a time delta approximately equal to a time of an intended migration at the primary storage entity adjusted for a transmission time such that the primary and secondary storage entities conduct the extent migration at approximately a same time. | 02-18-2016 |
20160048339 | INTELLIGENT COMPUTER MEMORY MANAGEMENT - A plurality of memory allocators are initialized within a computing system. At least a first memory allocator and a second memory allocator in the plurality of memory allocators are each customizable to efficiently handle a set of different memory request size distributions. The first memory allocator is configured to handle a first memory request size distribution. The second memory allocator is configured to handle a second memory request size distribution. The second memory request size distribution is different than the first memory request size distribution. At least the first memory allocator and the second memory allocator that have been configured are deployed within the computing system in support of at least one application. Deploying at least the first memory allocator and the second memory allocator within the computing system improves at least one of performance and memory utilization of the at least one application. | 02-18-2016 |
20160047038 | HYDROGEN-FREE SILICON-BASED DEPOSITED DIELECTRIC FILMS FOR NANO DEVICE FABRICATION - Embodiments of the present invention provide hydrogen-free dielectric films and methods of fabrication. A hydrogen-free precursor, such as tetraisocyanatosilane, and hydrogen-free reactants, such as nitrogen, oxygen (O2/O3) and nitrous oxide are used with chemical vapor deposition processes (PECVD, thermal CVD, SACVD, HDP CVD, and PE and Thermal ALD) to create hydrogen-free dielectric films. In some embodiments, there are multilayer dielectric films with sublayers of various materials such as silicon oxide, silicon nitride, and silicon oxynitride. In embodiments, the hydrogen-free reactants may include Tetra Isocyanato Silane, along with a hydrogen-free gas including, but not limited to, N2, O2, O3, N2O, CO2, CO and a combination thereof of these H-Free gases. Plasma may be used to enhance the reaction between the TICS and the other H-free gasses. The plasma may be controlled during film deposition to achieve variable density within each sublayer of the films. | 02-18-2016 |
20160043088 | NON-VOLATILE MEMORY DEVICE EMPLOYING A DEEP TRENCH CAPACITOR - A non-volatile memory device with a programmable leakage can be formed employing a trench capacitor. After formation of a deep trench, a metal-insulator-metal stack is formed on surfaces of the deep trench employing a dielectric material that develops leakage path filaments upon application of a programming bias voltage. A set of programming transistors and a leakage readout device can be formed to program, and to read, the state of the leakage level. The non-volatile memory device can be formed concurrently with formation of a dynamic random access memory (DRAM) device by forming a plurality of deep trenches, depositing a stack of an outer metal layer and a node dielectric layer, patterning the node dielectric layer to provide a first node dielectric for each non-volatile memory device that is thinner than a second node dielectric for each DRAM device, and forming an inner metal layer. | 02-11-2016 |
20160042506 | Method For Locating A Unit In An Assembly - The present embodiments disclose a method for locating a unit in an assembly. According to the embodiments, a unit in an assembly is located. An identification of the target unit in the assembly is obtained. An image of at least a part of the assembly is acquired. The image includes a visual code associated with the part. The visual code is decoded to obtain an identification of at least one unit in the part. It is determined if the target unit is included in the part responsive to identification of a match of the target unit with the identification of the at least one unit. There is further disclosed a corresponding apparatus, assembly, and fault diagnosis device. | 02-11-2016 |
20160042037 | QUERY-AWARE COMPRESSION OF JOIN RESULTS - A method is provided for compressing results of a join query. A join order of a result set is determined from the join query, where the result set includes a plurality of tuples. A plurality of dictionary entries for the result set is received. A nested hierarchy of dictionaries is created based on the join order and the dictionary entries. A plurality of encoded tuples is received. The nested hierarchy of dictionaries is used by a processor to decode the plurality of encoded tuples so as to produce the plurality of tuples of the result set. | 02-11-2016 |
20160041920 | SYSTEMS AND METHODS FOR MANAGING READ-ONLY MEMORY - Embodiments for managing read-only memory. A system includes a memory device including a real memory and a tracking mechanism configured to track relationships between multiple virtual memory addresses and real memory. The system further includes a processor configured to perform the below method and/or execute the below computer program product. One method includes mapping a first virtual memory address to a real memory in a memory device and mapping a second virtual memory address to the real memory. | 02-11-2016 |
20160041787 | COST-EFFECTIVE IAAS (INFRASTRUCTURE-AS-A-SERVICE) CLOUD STORAGE BASED ON ADAPTIVE VIRTUAL DISKS (AVD) - There are provided a system, a method and a computer program product for operating a cloud computing storage system. The cloud computing storage system allocates and manages virtual disks. A virtual disk provides a logical data storage. The cloud computing storage system divides data stored in the virtual disks into chunks and allocates the chunks to physical data storage devices. The cloud computing storage system monitors I/O access patterns and user requests to change data storage capacities and throughputs of the virtual disks in real time. The cloud computing storage system dynamically reconfigures an allocation of the chunks to the physical data storage devices. | 02-11-2016 |
20160041746 | VALUE SPECIFICATION IN A RESPONSIVE INTERFACE CONTROL - A responsive interface control system includes a display device and a control modification engine. The display device displays an interface control in a section of a user interface on the display device. The interface control is an interactive interface element configured to set an interface value. The control modification engine displays the interface control in a section of a user interface on a display device. The interface control is an interactive interface element configured to set an interface value. The control modification engine also displays both a slider and a spinner to implement a spin-slider mode. The interface control is configured to perform a spin function in response to an interaction with the slider to alter the interface value in the spin-slider mode. | 02-11-2016 |
20160039965 | METHOD AND DEVICE FOR HIGH DENSITY DATA STORAGE - A local probe storage array is provided that includes a substrate, and a polymeric layer over the substrate, the polymeric layer comprising a crosslinking agent comprising at least three alkyne groups. | 02-11-2016 |
20160037688 | CONTROLLING AIR CIRCULATION IN A DATA CENTER - A method of controlling air circulation in a data center system. The data center system includes: a cold aisle; a hot aisle including a floor element and a ceiling element; a server rack comprising a controller and servers separating the cold aisle from the hot aisle; and an air conditioning unit. The method includes: toggling, by the controller, the hot aisle between: (a) a first configuration in which the ceiling element is opened and the floor element is closed and (b) a second configuration in which the ceiling element is closed and the floor element is opened, wherein the first configuration enables circulation of air from the from the hot aisle to the cold aisle via the air conditioning unit, and wherein the second configuration enables circulation of air from the from the hot aisle to the cold aisle without the circulated air passing through the air conditioning unit. | 02-04-2016 |
20160036812 | Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations - A method, system and computer-usable medium are disclosed for performing forensic database security operations to verify database query integrity. A database protocol packet is intercepted, inspected and then processed by an external database security mechanism (EDSM) system to extract a database query. The database query is then processed with a secret key to generate a first keyed-hash message authentication code (HMAC) value, which is then inserted into the intercepted database protocol packet according to database protocol rules to generate a modified database protocol packet in a way that HMAC values and database query will be stored in predetermined database server session tracking tables. The modified database protocol packet is then provided to a database server, where database server subsequently accessed by the EDSM system to retrieve the database query and the first HMAC value. The EDSM system then uses the same secret key to calculate a second HMAC value for the retrieved database query, which is compared to the first HMAC value to determine whether they match. If not, then the database query is marked as having been modified after being inspected by the EDSM system. | 02-04-2016 |
20160036738 | NOTIFYING A USER OF AN INSTANT MESSAGING (IM) SERVICE ABOUT A MODIFICATION MADE TO AN OPPORTUNITY - Notifying a user of an instant message (IM) service about a modification made to an opportunity includes receiving at least one modification to an opportunity stored in a customer relationship management (CRM) system, the opportunity representing a complex record structure in the CRM system, identifying a first user associated with the modification made to the opportunity stored in the CRM system, determining, from a list of users associated with the opportunity, a second user associated with the first user through an IM service, and sending an alert to the second user on the IM service, the alert indicating to the second user the modification made to the opportunity by the first user. | 02-04-2016 |
20160036682 | DIAGNOSTIC HEARTBEAT THROTTLING - A method, system, and computer program product for a diagnostic heartbeat throttling are provided in the illustrative embodiments. A component, executing using a processor and a memory in a data processing system, sends diagnostic heartbeat packets over a communication link at a first rate, wherein a diagnostic heartbeat packet is a packet comprises a header, a set of heartbeat parameters, and a set of diagnostic attributes. The component detects a change in data traffic over the communication link. The component changes a rate of sending diagnostic heartbeat packets from the first rate to a second rate responsive to the change in the data traffic over the communication link. | 02-04-2016 |
20160035872 | METHOD FOR THE FORMATION OF SILICON AND SILICON-GERMANIUM FIN STRUCTURES FOR FINFET DEVICES - A substrate layer formed of a first semiconductor material includes adjacent first and second regions. Fin structures are formed from the substrate layer in both the first and second regions. At least the side walls of the fin structures in the second region are covered with an epitaxially grown layer of second semiconductor material. A drive in process is performed to convert the fin structures in the second region from the first semiconductor material to the second semiconductor material. The first semiconductor material is, for example, silicon, and the second semiconductor material is, for example, silicon germanium or silicon carbide. The fin structures in the first region are provided for a FinFET of a first (for example, n-channel) conductivity type while the fin structures in the second region are provided for a FinFET of a second (for example, p-channel) conductivity type. | 02-04-2016 |
20160035701 | SEMICONDUCTOR TSV DEVICE PACKAGE FOR CIRCUIT BOARD CONNECTION - An electronic device includes a circuit board and a semiconductor device package. The semiconductor device package includes a laminate layer. The semiconductor device package includes a semiconductor die having an active side, an inactive side opposite the active side, and through-silicon vias (TSVs) conductively connecting the active side to the inactive side and conductively connecting the semiconductor die to one of the laminate layer and the circuit board. The semiconductor device package includes a laminate layer having a side attached to the active side or the inactive side semiconductor die. The semiconductor device package includes solder balls at the side of the laminate layer attached to the semiconductor die, around the semiconductor die, and attached to the circuit board. | 02-04-2016 |
20160035650 | NON-BRIDGING CONTACT VIA STRUCTURES IN PROXIMITY - A first photoresist layer is patterned with a first pattern that includes an opening in a region between areas of two adjacent via holes to be formed. The opening in the first photoresist is transferred into a template layer to form a line trench therein. The lateral dimension of the trench is reduced by depositing a contiguous spacer layer that does not fill the trench completely. An etch-resistant material layer is conformally deposited and fills the trench, and is subsequently recessed to form an etch-resistant material portion filling the trench. A second photoresist layer is applied and patterned with a second pattern, which includes an opening that includes areas of two via holes and an area therebetween. A composite pattern of an intersection of the second pattern and the complement of the pattern of the etch-resistant material portion is transferred through the template layer. | 02-04-2016 |
20160035047 | Managing Energy Meter Usage Feedback - Methods, systems, and computer program products for managing energy meter usage feedback are provided herein. A method includes detecting information generated by a prepaid energy meter that has been authorized for a given user; processing the detected information to determine an amount of energy consumption associated with the prepaid energy meter; generating a code based on said processing comprising encrypting (i) the determined amount of energy consumption, (ii) an identifier corresponding to the prepaid energy meter, and (iii) authentication information for the given user authorized to to use the prepaid energy meter; outputting the generated code for transmission to an energy provider associated with the prepaid energy meter; decrypting a recharge code for the prepaid energy meter received in response to validation of the generated code by the energy provider associated with the prepaid energy meter; and enabling a remote recharge operation of the prepaid energy meter based on said decrypting. | 02-04-2016 |
20160034926 | DETERMINING A MONETARY VALUE FOR AN OUTCOME BASED ON A USER'S ACTIVITY - Determining a monetary value for an outcome based on a user's activity includes monitoring activities of a user utilizing a number of applications associated with a customer relationship management (CRM) system, determining, based on monitoring the activities of the user utilizing the number of applications, outcomes for the activities of the user, the outcomes being associated with opportunities stored in the CRM system, assigning a contribution value to the outcome based on the activities of the user, and determining, based on the contribution value, a monetary value for the outcomes. | 02-04-2016 |
20160034903 | Modifying A Number Of Opportunities In A Customer Relationship Management (CRM) System - A method for modifying a number of opportunities in a customer relationship management (CRM) system includes obtaining, from a CRM system, a number of opportunities, the opportunities representing a complex record structure in the CRM system, in which each of the opportunities captures a number of fields of metadata, comparing the metadata associated with the opportunities with a number of archived opportunity templates to create a comparison, analyzing the comparison to identify a number of patterns for the opportunities, and modifying, based on the number of patterns for the opportunities, the opportunities to create at least one new opportunity. | 02-04-2016 |
20160034833 | REASSIGNING A BUSINESS HIERARCHY OF ROLES ASSOCIATED WITH AN OPPORTUNITY IN A SOCIAL CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM - Reassigning a business hierarchy of roles associated with an opportunity in a social customer relationship management (CRM) system includes receiving modifications, the modifications representing an adjustment to a business hierarchy of roles, identifying, in a social CRM system, an opportunity associated with the business hierarchy of roles, and reassigning, based on the modifications, the opportunity associated with the business hierarchy of roles, in which reassigning, based on the modifications, the business hierarchy of roles associated with the opportunity includes adding or deleting a member or a department from the business hierarchy of roles. | 02-04-2016 |
20160034781 | Method for Accurately Determining the Position and Orientation of Each of a Plurality of Identical Recognition Target Objects in a Search Target Image - Embodiments of the invention relate to detecting the number, position, and orientation of objects when a plurality of recognition target objects are present in a search target image. Dictionary image data is provided, including a recognition target pattern, a plurality of feature points of the recognition target pattern, and an offset (O | 02-04-2016 |
20160034779 | High Speed Searching For Large-Scale Image Databases - Embodiments are provided to search for a dictionary image corresponding to a target image. The method includes detecting keypoints in a set of dictionary images. The set of dictionary images includes at least one dictionary image having a plurality of pixels. At least one random pair of pixels is selected among the detected keypoints of the dictionary image on the basis of candidate coordinates for pixels distributed around the detected keypoints of the dictionary image. A feature vector of each keypoint of the dictionary image is calculated, including calculating a difference in brightness between the selected pairs of pixels of the dictionary image. The calculated difference in brightness is an element of the feature vector. Keypoints of a target image are detected. | 02-04-2016 |
20160034776 | High Speed Searching Method For Large-Scale Image Databases - Embodiments are provided to search for a dictionary image corresponding to a target image. The method includes detecting keypoints in a set of dictionary images. The set of dictionary images includes at least one dictionary image having a plurality of pixels. At least one random pair of pixels is selected among the detected keypoints of the dictionary image on the basis of candidate coordinates for pixels distributed around the detected keypoints of the dictionary image. A feature vector of each keypoint of the dictionary image is calculated, including calculating a difference in brightness between the selected pairs of pixels of the dictionary image. The calculated difference in brightness is an element of the feature vector. Keypoints of a target image are detected. | 02-04-2016 |
20160034760 | Method for Accurately Determining the Position and Orientation of Each of a Plurality of Identical Recognition Target Objects in a Search Target Image - Embodiments of the invention relate to detecting the number, position, and orientation of objects when a plurality of recognition target objects are present in a search target image. Dictionary image data is provided, including a recognition target pattern, a plurality of feature points of the recognition target pattern, and an offset (O | 02-04-2016 |
20160034599 | Automatically Modifying A Tree Structure - A method and system are provided to support automated modification to a multiple node tree structure. Each clause and each logical operator are defined in the tree structure as nodes. In addition, each link emanating from a child node to a parent node is defined as a child link, and each link emanating from a parent node to a child node is defined as a parent link. The selection and location of an operator for placement in the tree structure will be automated in response to the position selected. | 02-04-2016 |
20160034554 | LARGE-SCALE DATA CLUSTERING WITH DYNAMIC SOCIAL CONTEXT - A system and method for dynamic, semi-supervised clustering comprises receiving data attributes, generating a set of ensemble partitions using the data attributes, forming a convex hull using the set of ensemble partitions, generating a simplex vector by performing ensemble clustering on the convex hull, receiving dynamic links, deriving an optimal simplex vector using the simplex vector and the dynamic links, computing a current optimal clustering result using the optimal simplex vector, and outputting the current optimal clustering result. | 02-04-2016 |
20160034527 | ACCURATE PARTITION SIZING FOR MEMORY EFFICIENT REDUCTION OPERATIONS - Embodiments of the invention relate to processing data records, and for a multi-phase partitioned data reduction. The first phase relates to processing data records and partitioning the records into a first partition of records having a common characteristic and a second partition of records that are not members of the first partition. The data records in each partition are subject to intra-partition data reduction responsive to a resource constraint. The data records in each partition are also subject to an inter-partition data reduction, also referred to as an aggregation to reduce a footprint for storing the records. Partitions and/or individual records are logically aggregated and a data reduction operation for the logical aggregation of records takes place in response to available resources. | 02-04-2016 |
20160034523 | SUB-BLOCK PARTITIONING FOR HASH-BASED DEDUPLICATION - Sub-block partitioning for hash-based deduplication is performed by defining a minimal size and maximum size of the sub-block. If one of a plurality of search criteria is satisfied by one of a plurality of hash values, declaring a position of the hash value as a boundary end position of the sub-block. If the maximum size of the sub-block is reached prior to satisfying one of the multiple search criteria, declaring a position of an alternative one of the hash values that is selected based upon another one of the multiple search criteria as the boundary end position of the sub-block. One of the plurality of search criteria is satisfied if n bits at predefined positions of a value calculated by applying an XOR operation on last calculated k hash values are equal to one of an mth predefined different patterns of bits. | 02-04-2016 |
20160034400 | DATA PREFETCH RAMP IMPLEMENATION BASED ON MEMORY UTILIZATION - A technique for data prefetching for a multi-core chip includes determining memory utilization of the multi-core chip. In response to the memory utilization of the multi-core chip exceeding a first level, data prefetching for the multi-core chip is modified from a first data prefetching arrangement to a second data prefetching arrangement to minimize unused prefetched cache lines. In response to the memory utilization of the multi-core chip not exceeding the first level, the first data prefetching arrangement is maintained. The first and second data prefetching arrangements are different. | 02-04-2016 |
20160034201 | MANAGING DE-DUPLICATION USING ESTIMATED BENEFITS - A protocol is employed to estimate duplication of data in a storage system. This estimate is employed as a factor of enabling de-duplication, and if de-duplication is enabled, the data sets which will be subject to the de-duplication. The protocol includes a measurement procedure and an execution procedure. The measurement procedure characterizes data duplication in part of the data on the storage system, and the execution procedure use the characterization to adjust selection of which data sets are subject to de-duplication. | 02-04-2016 |
20160034134 | DISAMBIGUATION OF TOUCH-BASED GESTURES - At an application executing using a processor in a touch-sensitive device, a detection is made that the touch-based gesture does not correspond to a perimeter defining a action, wherein the touch-based gesture is made relative to the touch-sensitive device. A set of possible actions intended by the touch-based gesture is determined. Using a disambiguation rule, an action is selected from the set of possible actions, wherein the selected action matches an action computed using the disambiguation rule. The selected action is caused to occur at the touch-sensitive device. | 02-04-2016 |
20160032692 | INDUCED CONTROL EXCITATION FOR ENHANCED RESERVOIR FLOW CHARACTERIZATION - A system, method and a computer program product may be provided for characterizing natural resource subsurface attributes and compositions. The system prescribes alterations of one or more controls of a natural resource. The system applies the altered controls to the natural resource wells. The system collects measurement data of the natural resource wells that responds to the applied altered controls. The system determines, based on the collected measurement data, the natural resource subsurface attributes and compositions that pertain to the natural resource. | 02-04-2016 |
20160028844 | GENERIC REMOTE CONNECTION TO A COMMAND LINE INTERFACE APPLICATION - A method to establish a generic remote connection to a command line interface (CLI) application is provided. A server is implemented. The server is configured with a data input channel, a data output channel, and an error output channel, each connected to the CLI application. A second socket for routing a dedicated error data stream is configured. The dedicated error stream in the second socket may execute concurrently with data streams being executed in a first socket. At least one client is implemented. The at least one client is configured with the data input channel, data output channel, and the error output channel. | 01-28-2016 |
20160028816 | APPARATUS AND METHOD FOR MANAGING STORAGE COPY SERVICES SYSTEMS - An apparatus for controlling a storage system having a data replication function, comprises: a storage array component being operable to send notification to a replication engine that a write of data to a primary storage location by a host is subject to data replication; the replication engine being operable to receive the notification and in response to instruct the storage array to copy the data to a secondary storage location; wherein the data is copied to the secondary storage location unmediated by the replication engine. | 01-28-2016 |
20160028471 | DEPLOYMENT CRITERIA FOR UNMANNED AERIAL VEHICLES TO IMPROVE CELLULAR PHONE COMMUNICATIONS - System, method and computer program product for extending mobile device cellular carrier network coverage using unmanned aerial vehicles (UAVs) equipped with telecommunications devices to act as temporary mobile device cellular network towers. The system and method extends cellular phone coverage of a land-based cellular phone network by: receiving information for determining a predicted or actual increase in aggregate cellular phone usage demand in an area at a determined time; identifying, based on an said predicted or actual increased aggregate cellular phone usage demand for said area, whether there exists a mismatch of existing usage coverage compared with said determined increased aggregate demand for that area; determining, based on an identified mismatch, a plan for sending signals to and deploying one or more mobile cellular unmanned aerial vehicles (UAV) having telecommunications equipment configured to extend cellular phone network coverage of an existing land-based cellular phone network at the mismatched area. | 01-28-2016 |
20160027686 | METHOD FOR MANUFACTURING INTERCONNECT STRUCTURES INCORPORATING AIR GAP SPACERS - A dual damascene article of manufacture comprises a trench containing a conductive metal column where the trench and the conductive metal column extend down into and are contiguous with a via. The trench and the conductive metal column and the via have a common axis. These articles comprise interconnect structures incorporating air-gap spacers containing metal/insulator structures for Very Large Scale Integrated (VLSI) and Ultra Large Scale Integrated (ULSI) devices and packaging. The trench in this regard comprises a sidewall air-gap immediately adjacent the side walls of the trench and the conductive metal column, the sidewall air-gap extending down to the via to a depth below a line fixed by the bottom of the trench, and continues downward in the via for a distance of from about 1 Angstrom below the line to the full depth of the via. In another aspect, the article of manufacture comprises a capped dual damascene structure. | 01-28-2016 |
20160027018 | MATCHING RESOURCES TO AN OPPORTUNITY IN A CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM - Matching resources to an opportunity in a customer relationship management (CRM) system includes obtaining, from a CRM system, an opportunity, the opportunity representing a complex record structure in the CRM system, in which the opportunity captures a number of fields of metadata, determining, from the metadata, a number of opportunity attributes associated with the opportunity, determining a number of resource attributes for a number of resources, ranking the resource attributes with the opportunity attributes to determine a score for each of the resources, and presenting, based on the score, a list of the resources that are recommended for the opportunity. | 01-28-2016 |
20160026653 | LOOKUP-BASED DATA BLOCK ALIGNMENT FOR DATA DEDUPLICATION - Calculating fingerprints for each one of a multiplicity of alignment combinations of fixed-size deduplication data blocks and comparing each of the fingerprints to stored deduplicated data fingerprints in a lookup database for determining a preferred deduplication data block alignment. A deduplication data block comprises each of the fixed-size deduplication data blocks. | 01-28-2016 |
20160026580 | CACHE LINE CROSSING LOAD TECHNIQUES FOR A CACHING SYSTEM - A technique for handling an unaligned load operation includes detecting a cache line crossing load operation that is associated with a first cache line and a second cache line. In response to an cache including the first cache line but not including the second cache line, the second cache line is reloaded into the cache in a same set as the first cache line. In response to reloading the second cache line in the cache, a cache line crossing link indicator associated with the first cache line is asserted to indicate that both the first and second cache lines include portions of a desired data element. | 01-28-2016 |
20160026578 | USE OF DIFFERING GRANULARITY HEAT MAPS FOR CACHING AND MIGRATION - For data processing in a computing storage environment by a processor device, the computing storage environment incorporating at least high-speed and lower-speed caches, and tiered levels of storage, groups of data segments are migrated between the tiered levels of storage such that if a selected group is cached in the lower-speed cache and is determined to become uniformly hot, migrating the selected group from the lower-speed cache to the SSD portion while refraining from processing data retained in the lower-speed cache until the selected group is fully migrated to the SSD portion. | 01-28-2016 |