International Business Machine Corporation Patent applications |
Patent application number | Title | Published |
20150129970 | METHODS AND STRUCTURES FOR ELIMINATING OR REDUCING LINE END EPI MATERIAL GROWTH ON GATE STRUCTURES - One method disclosed herein includes, among other things, forming a line-end protection layer in an opening on an entirety of each opposing, spaced-apart first and second end face surfaces of first and second spaced-apart gate electrode structures, respectively, and forming a sidewall spacer adjacent opposing sidewall surfaces of each of the gate electrode structures but not adjacent the opposing first and second end face surfaces having the line-end protection layer positioned thereon. | 05-14-2015 |
20150028491 | Improved SiCOH Hardmask with Graded Transition Layers - A structure and method for fabricating an improved SiCOH hardmask with graded transition layers having an improved profile for forming sub-20 nm back end of the line (BEOL) metallized interconnects are provided. In one embodiment, the improved hardmask may be comprised of five layers: an oxide adhesion layer, a graded transition layer, a dielectric layer, an inverse graded transition layer, and an oxide layer. In another embodiment, the improved hardmask may be comprised of four layers; an oxide adhesion layer, a graded transition layer, a dielectric layer, and an oxide layer. In another embodiment, a method of forming an improved hardmask may comprise a continuous five step plasma enhanced chemical vapor deposition (PECVD) process utilizing a silicon precursor, a porogen, and oxygen. In yet another embodiment, a method of forming an improved hardmask may comprise a continuous four step PECVD process utilizing a silicon precursor, a porogen, and oxygen. | 01-29-2015 |
20140351345 | GENERATING INSTANT MESSAGING CONTACTS FOR CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS - A computer-implemented method, computer program product, and computing system is provided for the interaction between a CRM system and a instant messaging system. According to an implementation, a computer-implemented method may include identifying, by one or more processors, one or more individuals associated with an opportunity included within a CRM system. The method may also include creating, by the one or more processors, an instant message buddy list group associated with the opportunity. The method may also include populating, by the one or more processors, the instant message buddy list group with at least a portion of the one or more individuals. | 11-27-2014 |
20140324825 | GENERATION OF MULTI-FACETED SEARCH RESULTS IN RESPONSE TO QUERY - Aspects retrieve, organize and display different classifications of sets of search results in different, respective tabbed sheets that are nested on top of one another in a web-based interface dashboard. A text string search query is classified into constituent primary search terms that are likely to return satisfactory search results as indicated by retrieved search history data as a function of search resources and language classification rules associated with the user identity indicia. Secondary search terms related to the primary search terms and including synonyms and antonyms are determined as substitutes for the primary search terms in response to search history indicating follow-up searches immediately subsequent to searches of the primary search terms at less than a specified threshold of frequency. The set of peripheral knowledge article results is generated by searching knowledge article resources for background information on the primary search terms or the secondary search terms. | 10-30-2014 |
20140215632 | PREVENTING THE DETECTION AND THEFT OF USER ENTRY ALPHANUMERIC SECURITY CODES ON COMPUTER TOUCH SCREEN KEYPADS - Preventing, discernible patterns of surface marks resulting from the repetitive entry of security codes to computer device touch screen alphanumeric keypads. There is predetermined the number of security code entries after which the positions of the representative keys in the keypad array should be reconfigured. This predetermined number should be the number of security code entries estimated to produce a pattern of distinguishable display surface marks coincident with a users repetitive entry alphanumeric character security code. The number of security code entries is counted. When the count of the predetermined number of security code entries has been reached, the representative keys in the displayed keypad array are reconfigured. This implementation is equally effective against thieves who are visually stealing the security codes over the user's shoulder. | 07-31-2014 |
20140089422 | DYNAMICALLY CREATING A SOCIAL NETWORKING CHECK-IN LOCATION - In a method for creating a social networking check-in location for social networking applications, a computer receives a geographic location for each user computing device in a plurality of user computing devices. The computer determines a portion of the plurality of user computing devices that exhibit an area density exceeding a threshold. The area density is defined as a number of user computing devices per unit area. The computer receives two or more social networking messages from the portion of the plurality of user computing devices. The computer determines a common subject between the two or more social networking messages. The computer creates a social networking check-in location. | 03-27-2014 |
20130326078 | Access to a Computer Network - A method of mediating access to a computer network comprises the steps of identifying a user who wishes to access the computer network, obtaining quality of service data specific to the user, generating a token comprising the quality of service data and providing an output derived from the token to the user. Optionally, the method can further comprise receiving a request from the user for access to the computer network and providing access to the computer network to the user according to the token. | 12-05-2013 |
20130247001 | DYNAMIC SYNTHESIS OF PROGRAM SYNCHRONIZATION - Dynamic synthesis includes receiving a program P and a specification S that describes desired properties of P. The dynamic synthesis also includes initializing a constraint C to true, enumerating schedules up to a defined limit that satisfy C, and executing a schedule of P. The dynamic synthesis further includes determining whether execution of the schedule violates S. In response to determining that the execution violates S, the dynamic synthesis includes determining whether to avoid future executions of the schedule. In response to determining that future executions of the schedule should be avoided, the dynamic synthesis includes computing a constraint that avoids the future execution, and adding the constraint to C; otherwise, the dynamic synthesis includes selecting another schedule for execution. In response to determining that the execution of the schedule does not violate S, the dynamic synthesis includes selecting another schedule for execution. | 09-19-2013 |
20130247000 | DYNAMIC SYNTHESIS OF PROGRAM SYNCHRONIZATION - Dynamic synthesis includes receiving a program P and a specification S that describes desired properties of P. The dynamic synthesis also includes initializing a constraint C to true, enumerating schedules up to a defined limit that satisfy C, and executing a schedule of P. The dynamic synthesis further includes determining whether execution of the schedule violates S. In response to determining that the execution violates S, the dynamic synthesis includes determining whether to avoid future executions of the schedule. In response to determining that future executions of the schedule should be avoided, the dynamic synthesis includes computing a constraint that avoids the future execution, and adding the constraint to C; otherwise, the dynamic synthesis includes selecting another schedule for execution. In response to determining that the execution of the schedule does not violate S, the dynamic synthesis includes selecting another schedule for execution. | 09-19-2013 |
20130232511 | SERVICE RESOLUTION WITHIN DISPARATE PROGRAMMING MODELS - Some embodiments include a computer-implemented method for identifying equivalent services. The computer-implemented method can include operations for procuring, by a computer system, a first service description and a second service description, wherein the first and second service descriptions identify characteristics of services available for use by application programs. The computer-implemented method can also include operations for identifying, in the first and second service descriptions, first and second interfaces by which the application programs can call the services, wherein the first and second interfaces define input variables for the service and results returned from the service. The computer-implemented method can also include operations for determining that the first and second interfaces are equivalent, and identifying, in the first and second service descriptions, first and second quality of service types that indicate qualities of service provided by the services. | 09-05-2013 |
20130103669 | Search Engine Indexing - Exemplary embodiments include a search engine indexing method, including finding a page on a server that includes keywords, scanning the page for a tag designating a portion of the page from which to index the keywords and in response to a presence of the tag within the page, indexing the portion of the page that is designated by the tag. | 04-25-2013 |
20130046901 | SYSTEM AND METHOD FOR STREAM PROCESSING - A method, computer program product, and system for de-centralized stream processing is provided. The method may include providing a plurality of processing nodes each of said processing nodes configured to transmit and receive a stream of data. The method may further include adding one or more new processing nodes to the computing system. The method may also include determining a source node based upon, at least in part, an activation level being above or below a particular threshold. The method may additionally include, for each of the one or more added processing nodes, automatically determining an appropriate role, based upon, at least in part, a neighboring processing node. | 02-21-2013 |
20120310905 | DATA VALIDATION AND SERVICE - A data validation service includes providing a user interface to a subscriber of the service via a computer device of the subscriber, receiving, via the user interface, a data validation rule specified by the subscriber and an address of a database subject to the data validation, and generating a configuration file that includes the address of the database and an address of a location of executable code corresponding to the data validation rule. The data validation service also includes transmitting the configuration file and remote methods to the computer device over the network. The remote methods are configured to execute the data validation rule with respect to the data and compile results of the execution. | 12-06-2012 |
20120310904 | DATA VALIDATION AND SERVICE - A data validation service includes providing a user interface to a subscriber of the service via a computer device of the subscriber, receiving a data validation rule specified by the subscriber and an address of a database subject to the data validation, and generating a configuration file that includes the address of the database. The service also includes transmitting the configuration file and a thin client application to the computer device over a network, the thin client application configured to read the configuration file and pull data from the database. The service further includes receiving the data from the computer device via the network, performing the data validation by executing the data validation rule with respect to the data, and compiling results of the data validation and providing the results to the computer device. | 12-06-2012 |
20120290928 | Management of Presentation Timing in a Distributed Presentation Environment - A data processing system invokes presentation of a presentation element of a distributed presentation by a plurality of devices. The data processing system receives progress reports from the plurality of devices, where the progress reports indicate progress in presenting the presentation element. The data processing system determines whether a quorum threshold of presentation progress has been achieved based upon the progress reports. In response to determining that the quorum threshold of presentation of presentation progress has been achieved, the data processing system presents an indication that a spoken presentation associated with the presentation element can commence. The notification is presented prior to completion of presentation of the presentation element by at least one of the plurality of devices. | 11-15-2012 |
20120284512 | RURAL SERVICES PLATFORM - A middleware platform is executable by a computer to receive a request for a service, the service provided by a service application in communication with the middleware platform. The middleware platform determines, via a device adaptation component of the middleware platform, capabilities of a device subject to the request. The middleware platform selects an interface having a format that is compatible with the capabilities of the device, and provides the interface to the device in a format corresponding to the capabilities, accesses the service application responsive to the request, processes the request, and returns a response, via the interface, to the device responsive to the processing. | 11-08-2012 |
20120257917 | Print Quality Verification System - A method, programmed medium and system are disclosed which provide for an in-line scanner used to dynamically scan a document or image, real-time as it is being printed within a printer unit and before the printed document exits the printer. The scanned image is compared to a stored electronically-generated image of the file being printed. When the comparison is determinative that there is a printing problem, the printing operation may be stopped quickly before the partially printed document or image has exited the printer. An error message may then be displayed, and the user is enabled to take appropriate action. A resume function enables a user to resume a print job at exactly the place where it had left off before detecting a print problem. In another embodiment, when the system detects a problem with a print job, the entire print job of the remainder of the print job is sent from the faulting printer to another printer where either the remainder of the print job or the entire print job is completed. | 10-11-2012 |
20120254429 | Non-Intrusive Single Sign-On Mechanism in Cloud Services - A method and apparatus for Single Sign-on, wherein the user accesses a platform server and at least one service provider on the platform server. The method includes intercepting a request sent by the user via a client browser and extracting a domain name included in the request. If the domain name is an original domain name of the platform server, a global session ID is generated for uniquely identifying a session between the user and the platform server. A new domain name of the platform server associated with the global session ID is generated and the URL in the request is redirected to a new URL including the new domain name of the platform server. The request, including the new URL of the platform server, is forwarded to the platform server. | 10-04-2012 |
20120191947 | COMPUTER OPERATION CONTROL METHOD, PROGRAM AND SYSTEM - A computer implemented control method, article of manufacture, and computer implemented system for determining whether stack allocation is possible. The method includes: allocating an object created by a method frame to a stack. The allocation is performed in response to: calling a first and second instruction in the method frame; the first instruction causes an escape of the object, and the second instruction cancels the escape of the object; the object does not escape to a thread other than a thread to which the object has escaped, at the point in time when the escape is cancelled; the first instruction has been called before the second instruction is called; and the object does not escape in accordance with an instruction other than the first instruction in the method frame, regardless of whether the object escapes in accordance with the first instruction. | 07-26-2012 |
20120184458 | METHODS FOR SCREENING AND ARRAYING MICRORGANISMS SUCH AS VIRUSES USING SUBTRACTIVE CONTACT PRINTING BACKGROUND - Methods for screening and arranging microorganisms such as viruses in an array using subtractive contact printing are provided. In one embodiment, a method for forming an array of receptors for microorganisms comprises: patterning an array of structures on a first substrate to form a template on a surface of the first substrate; applying a receptor material to a face of a second substrate; and contacting the face of the second substrate with the template to remove a portion of the receptor material from the second substrate, thereby forming an array of receptors on the second substrate. | 07-19-2012 |
20120173669 | Adjusting Software Settings - An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices. | 07-05-2012 |
20120167053 | TARGETING CODE SECTIONS FOR CORRECTING COMPUTER PROGRAM PRODUCT DEFECTS USING RECORDS OF A DEFECT TRACKING SYSTEM - An unresolved defect can be identified in a computer program product. It may not be initially known which of a plurality of different code segments of the computer program product are able to be modified to correct to repair the unresolved defect. A subset of the different code segments can be predicted utilizing information contained within a database of previously reported defects. The predicting can be determined based on a set of code segments that were previously modified to correct or repair the previously reported defects as detailed within the database. | 06-28-2012 |
20120159610 | MEMORY PROTECTION AND SECURITY USING CREDENTIALS - A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory. | 06-21-2012 |
20120140355 | Reliability-Aware Disk Power Management - A token value is maintained based on an allowable number of low power transitions of a hard disk drive without adversely affecting reliability, compared to an actual number of low power transitions of said hard disk drive. The allowable number of low power transitions increases over the hard disk drive's lifetime. Before the hard disk drive performs a low power transition, the token is evaluated to determine if the hard disk drive is allowed to perform a low power transition. Low power transitions discussed include parking the head and spinning-down the hard disk drive. | 06-07-2012 |
20120139009 | SOI SiGe-Base Lateral Bipolar Junction Transistor - A lateral heterojunction bipolar transistor (HBT) is formed on a semiconductor-on-insulator substrate. The HBT includes a base including a doped silicon-germanium alloy base region, an emitter including doped silicon and laterally contacting the base, and a collector including doped silicon and laterally contacting the base. Because the collector current is channeled through the doped silicon-germanium base region, the HBT can accommodate a greater current density than a comparable bipolar transistor employing a silicon channel. The base may also include an upper silicon base region and/or a lower silicon base region. In this case, the collector current is concentrated in the doped silicon-germanium base region, thereby minimizing noise introduced to carrier scattering at the periphery of the base. Further, parasitic capacitance is minimized because the emitter-base junction area is the same as the collector-base junction area. | 06-07-2012 |
20120078874 | Search Engine Indexing - Exemplary embodiments include a search engine indexing method, including finding a page on a server that includes keywords, scanning the page for a tag designating a portion of the page from which to index the keywords and in response to a presence of the tag within the page, indexing the portion of the page that is designated by the tag. | 03-29-2012 |
20120005598 | AUTOMATIC CO-BROWSING INVITATIONS - Embodiments can include instructions or steps, which when carried out, detect that copy operations are being performed on website data displayed to a user. Further to this detection, a co-browsing query for display to a user may be generated, an instruction to associate a co-browsing invitation with website data copied by the user may also be generated and a co-browsing invitation and pasted website data may be sent to an invitee. | 01-05-2012 |
20110302292 | SYSTEMS AND METHODS FOR SERVICE ASSURANCE USING VIRTUALIZED FEDERATED PRESENCE INFRASTRUCTURE - Systems, methods, apparatuses and program products configured to provide a topology-service tool are described. A presence-federation solution asset is leveraged to address topology-federation problems. A network topology tool takes as input network endpoints, for example caller and callee telephone numbers, determines a network service flow used to connect the network endpoints, and develops a network topology view of the service flow along with associated network device related information. | 12-08-2011 |
20110295635 | SYSTEMS AND METHODS FOR SCHEDULING POWER SOURCES AND JOBS IN AN INTEGRATED POWER SYSTEM - Methods and systems for managing energy sources and energy consumers in an integrated system are provided. Certain subject matter presented herein relates to automatically scheduling jobs and their sub-tasks to maximize profit by comparing power source configurations and determining the best job schedule for the power source configurations. This system broadly involves two sub-problems: determining the best power source configuration and determining the best job schedule for the given power source configuration. | 12-01-2011 |
20110126200 | Scheduling for functional units on simultaneous multi-threaded processors - A method and system for scheduling threads on simultaneous multithreaded processors are disclosed. Hardware and operating system communicate with one another providing information relating to thread attributes for threads executing on processing elements. The operating system determines thread scheduling based on the information. | 05-26-2011 |
20110111596 | Sidewall Image Transfer Using the Lithographic Stack as the Mandrel - In one non-limiting exemplary embodiment, a method includes: providing a structure having at least one lithographic layer on a substrate, where the at least one lithographic layer includes a planarization layer (PL); forming a sacrificial mandrel by patterning at least a portion of the at least one lithographic layer using a photolithographic process, where the sacrificial mandrel includes at least a portion of the PL; and producing at least one microstructure by using the sacrificial mandrel in a sidewall image transfer process. | 05-12-2011 |
20100305991 | Complexity Reduction of User Tasks - An exemplary method for reducing complexity of at least one user task includes steps of calculating a complexity metric for the at least one user task; identifying one or more usability issues having a measurable impact on the complexity metric for the at least one user task; determining one or more recommendations for addressing at least one of the one or more usability issues; and displaying a representation of at least one of the one or more usability issues and of at least one of the one or more recommendations. In an illustrative embodiment, implementing any one of the one or more recommendations reduces the impact of the usability issue on the complexity metric of the at least one user task and thereby reduces a complexity of the at least one user task. | 12-02-2010 |
20100252358 | Airflow Optimization and Noise Reduction in Computer Systems - In one embodiment, a fan is used to generate airflow through a computer chassis to a fan air inlet. An audible frequency component of the airflow is identified and selected. A sound wave is generated having a generated frequency equal to the selected audible frequency component of the airflow. The generated sound wave is introduced into the airflow with the generated frequency out of phase with the audible frequency component of the airflow. The magnitude of the generated frequency may be selected as a function of fan speed and/or air sensed pressure within the airflow. The frequency, phase, and magnitude of the generated sound wave may be selected and enforced by a baseboard management controller. | 10-07-2010 |
20100248432 | METHODS OF FORMING A HYPER-ABRUPT P-N JUNCTION AND DESIGN STRUCTURES FOR AN INTEGRATED CIRCUIT - Methods of forming hyper-abrupt p-n junctions and design structures for an integrated circuit containing devices structures with hyper-abrupt p-n junctions. The hyper-abrupt p-n junction is defined in a SOI substrate by implanting a portion of a device layer to have one conductivity type and then implanting a portion of this doped region to have an opposite conductivity type. The counterdoping defines the hyper-abrupt p-n junction. A gate structure carried on a top surface of the device layer operates as a hard mask during the ion implantations to assist in defining a lateral boundary for the hyper-abrupt p-n junction. | 09-30-2010 |
20100241842 | Method for Command Line Interface Restore Points with Support for an Atomic Sets of Commands - The present invention introduces methods for controlling and configuring systems using a new command line interface (CLI) command. The CLI command allows a user to set a save point or a restore point of the configuration (e.g., setsavepoint). After the CLI command is executed, the user can continue issuing configuration commands. In addition, if at some point the user wants to go back to the restore point, the user can issue an additional command which generates a CLI script containing all of the commands that need to be executed in order to modify the configuration such that it goes back to its state at the point at which the restore point was set. | 09-23-2010 |
20100176482 | LOW COST FABRICATION OF DOUBLE BOX BACK GATE SILICON-ON-INSULATOR WAFERS WITH SUBSEQUENT SELF ALIGNED SHALLOW TRENCH ISOLATION - A semiconductor substrate structure for manufacturing integrated circuit devices includes a bulk substrate; a lower insulating layer formed on the bulk substrate, the lower insulating layer formed from a pair of separate insulation layers having a bonding interface therebetween; an electrically conductive layer formed on the lower insulating layer; an insulator with etch stop characteristics formed on the electrically conductive layer; an upper insulating layer formed on the etch stop layer; and a semiconductor layer formed on the upper insulating layer. A scheme of subsequently building a dual-depth shallow trench isolation with the deeper STI in the back gate layer self-aligned to the shallower STI in the active region in such a semiconductor substrate is also disclosed. | 07-15-2010 |
20100175113 | Secure System Access Without Password Sharing - A mechanism is provided for performing secure system access by a requesting user without sharing a password of a credential owner. A database stores system information for resources. The owner of super user authority for a resource provides system information to the database including a credential for accessing the resource. When a user wishes to access the system, client software of the requestor sends an access request to client software of the owner. The client software of the owner prompts the owner to authorize or deny access. Responsive to the owner authorizing the access, the client software of the owner returns authorization to the client software of the requestor, which then uses the credential in the system information database to access the resource. The client software of the requestor does not cache or store the credential or present the credential to the user. | 07-08-2010 |
20100125835 | HIGH EFFICIENCY COMPILATION FRAMEWORK - A method and system for reducing processing overhead during execution of a code block in a high efficiency compilation framework. The method identifies second code blocks within the code block and separates them out from the first code block during compilation. Further, during compilation, the system converts the second code blocks to kernel program modules, in a form recognizable by the system kernel. The compilation is followed by execution of the first code block, with the compiled object code of the first code block being executed in user mode and the kernel program modules being executed in kernel mode. | 05-20-2010 |
20090296796 | METHOD AND APPARATUS FOR IMPROVED STORAGE AREA NETWORK LINK INTEGRITY TESTING - A method and apparatus that is configured to issue an echo extended link service with a payload of data patterns that are known in the art of fibre channel to produce jitter. The inventive apparatus is configured to use an echo extended link service to send data with a specified data pattern. Failing data patterns are compared against data patterns that are known in the art of fibre channel to create jitter and the results may be presented to the user. | 12-03-2009 |
20090235018 | Increased Magnetic Damping for Toggle MRAM - Magnetic random access memory (MRAM) devices and techniques for use thereof are provided. In one aspect, a magnetic memory cell is provided. The magnetic memory cell comprises at least one fixed magnetic layer; at least one first free magnetic layer separated from the fixed magnetic layer by at least one barrier layer; at least one second free magnetic layer separated from the first free magnetic layer by at least one spacer layer; and at least one capping layer over a side of the second free magnetic layer opposite the spacer layer. One or more of the first free magnetic layer and the second free magnetic layer comprise at least one rare earth element, such that the at least one rare earth element makes up between about one percent and about 10 percent of one or more of the first free magnetic layer and the second free magnetic layer. | 09-17-2009 |
20090210190 | HEAT SINK METHOD, SYSTEM, AND PROGRAM PRODUCT - Where an attachment means connects a heat sink to a system component, heat is thereby conducted to the heat sink from the component, a temperature sensor is located on the heat sink and another on the component or the attachment means, a portion of the attachment means is disposed between the sensors. Temperature readings from the sensors are compared to identify a failing one of the heat sink, the attachment means portion, and the component, with respect to heat conduction. Corrective action may be identified, and self-power means may also be provided to supply operative power. A wireless output circuit may be provided. Multiple heat sink sensors may be provided in any element. Rate-of-rise temperature readings may be observed and compared, including to historical values. | 08-20-2009 |
20090205780 | BONDING PAD FOR ELECTRONIC SUBASSEMBLIES - A method for installing a bonding pad as a gasket for an electronic subassembly includes providing a bonding pad comprising an expandable foam; an air-tight bladder covering at least one side of the expandable foam; a layer of conductive material covering the air-tight bladder and comprising at least one contact point; and an open port; removing air from the air-tight bladder, thereby compressing the expandable foam; installing the bonding pad into a gap between two surfaces; allowing the compressed foam to expand under atmospheric pressure; and electrically bonding the two surfaces with the bonding pad. | 08-20-2009 |
20090204875 | Method, System And Computer Program Product For Diagnosing Communications - A method for diagnosing communications includes sending a message from a sending node to a receiving node. The sending node detects an error in the receiving node receiving the message. A force log request is sent from the sending node to the receiving node, the force log request including a request for the receiving node to log information. A force log response is received from the receiving node at the sending node, the force log response including the logged information. The sending node diagnoses the communications error in response to the force log response. | 08-13-2009 |
20090187552 | System and Methods for Generating Data Analysis Queries from Modeling Constructs - A method for automatically generating data analysis queries from at least one modeling construct includes selecting a preconfigured template identifying at least one metric or dimension; retrieving dashboard model data comprising the preconfigured template; filtering to the dashboard model data using at least one user-specific access control; and automatically generating a query for at least one database. | 07-23-2009 |
20090177634 | Method and System for an Application Domain - Data processing comprising requesting a semantic description from each manageable resource of a plurality of manageable resources. An application domain comprises the plurality of manageable resources. The semantic description of a manageable resource comprises semantic information about a plurality of aspects of a manageable resource. The semantic information is specified by use of an ontology. The semantic descriptions and a conceptualization of the application domain is stored in a knowledge base. The conceptualization of the application domain is provided by the ontology. The conceptualization comprises semantic information about the application domain. A request from a client of the application domain to provide a manageable resource with specific properties is received. The specific properties are specified in the request. The semantic information of the conceptualization and the semantic descriptions is used for selecting the manageable resource with the specific properties from the plurality of manageable resources. | 07-09-2009 |
20090145247 | SAMPLE HOLDER FOR HOLDING SAMPLES AT PRE-DETERMINED ANGLES - The invention generally relates to atomic resolution imaging, and, more particularly, to systems and methods for calibrating an atomic resolution measurement tool. A sample holder for holding test samples used in measuring linearity of an atomic force microscope is provided. The holder includes a body having a top surface, and a plurality of inclined regions formed in the body and spaced apart along the top surface. Each of the inclined regions is structured and arranged to hold a test sample used to measure linearity of an atomic force microscope at one of a plurality of predefined angles. | 06-11-2009 |
20090083249 | METHOD FOR INTELLIGENT CONSUMER EARCONS - A method for utilizing earcons, includes: forming a database of earcons; forming a user profile and preferences database; monitoring user audio content; monitoring the user environment; playing a series of earcons from the database of earcons on a user's communication device; wherein the series of earcons are chosen from the database of earcons based on the user profile and preferences database; and wherein the playing of individual earcons from the series of earcons is based on the monitored user audio content and environment. | 03-26-2009 |
20090081995 | SYSTEM FOR INTELLIGENT CONSUMER EARCONS - A system for implementing intelligent consumer earcons, includes: one or more communication devices for carrying out conversations between users and for playing of earcons; one or more tracking and monitoring devices; one or more servers configured with software for implementing the earcons; one or more storage devices for storing a database of earcons, and for storing user profile and preference databases; one or more networks configured for signal communication between the communication devices, the tracking and monitoring devices, the servers, and the storage devices; wherein the monitoring devices are configured to monitor the user, user audio content, and the user's environment; wherein the earcons are chosen from the database of earcons based on the user profile and preferences database; and wherein the playing of individual earcons from the database of earcons is based on the monitored user audio content and environment. | 03-26-2009 |
20090080656 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR PERFORMING CRYPTOGRAPHIC PROVIDER FAILOVER - Performing cryptographic provider failover utilizing an integrated cryptographic provider to register for each of a plurality of service type—algorithm pairs already registered by each of a plurality of underlying cryptographic providers, such that the integrated cryptographic provider specifies failover support for all registered service type—algorithm pairs using the one or more underlying cryptographic providers. Upon receipt of a first security request, the integrated cryptographic provider constructs a table including a list of cryptographic providers for each of the plurality of service type—algorithm pairs, wherein the table identifies a temporal order in which two or more of the plurality of underlying cryptographic providers were registered for each of the plurality of service type—algorithm pairs. In response to a subsequent security request received from an application, the list of cryptographic providers is used to identify a second cryptographic provider to which the request will be routed if a first cryptographic provider fails. | 03-26-2009 |
20090068859 | Fail-Safe Lockout for Blind Mate Card - A lockout mechanism for a card assembly having a blind connection to an electronic component includes a card disposed in a housing and articulable in the housing in a direction substantially perpendicular to a direction of insertion of the card assembly into the electronic component, the card including a connector having connection fingers extending substantially in said direction. A lockout is disposed in the housing, the lockout movable in a direction perpendicular to the card between a first or locked position and a second or unlocked position, and preventing articulation of the card unless the one or more connection fingers are aligned with one or more corresponding component fingers in the electronic component. An alignment feature is included, that when brought into contact with a corresponding portion of the electronic component ensures proper alignment between the one or more connection fingers and one or more corresponding component fingers. | 03-12-2009 |
20090065761 | PROGRAMMABLE FUSE/NON-VOLATILE MEMORY STRUCTURES IN BEOL REGIONS USING EXTERNALLY HEATED PHASE CHANGE MATERIAL - A programmable phase change material (PCM) structure includes a heater element formed at a BEOL level of a semiconductor device, the BEOL level including a low-K dielectric material therein; a first via in electrical contact with a first end of the heater element and a second via in electrical contact with a second end of the heater element, thereby defining a programming current path which passes through the first via, the heater element, and the second via; a PCM element disposed above the heater element, the PCM element configured to be programmed between a lower resistance crystalline state and a higher resistance amorphous state through the use of programming currents through the heater element; and a third via in electrical contact with the PCM element, thereby defining a sense current path which passes through the third via, the PCM element, the heater element, and the second via. | 03-12-2009 |
20090063806 | METHOD FOR DISTRIBUTING HYPERVISOR MEMORY REQUIREMENTS ACROSS LOGICAL PARTITIONS - A method of reallocating memory to a hypervisor in a virtualized computing system, includes: assigning priorities to a plurality of logical partitions configured within the virtualized computing system; determining a memory requirement for the hypervisor, the hypervisor configured to manage the plurality of logical partitions; determining minimum levels of memory required for each of the plurality of logical partitions; determining the amount of available memory in the virtualized computing system; and in the event that the amount of available memory is less than the determined memory requirement of the hypervisor, removing portions of memory from one or more of the plurality of logical partitions based on the assigned priorities until the determined memory requirement for the hypervisor is obtained. | 03-05-2009 |
20090063759 | SYSTEM AND METHOD FOR PROVIDING CONSTRAINED TRANSMISSION AND STORAGE IN A RANDOM ACCESS MEMORY - A system and method for providing constrained transmission and storage in a random access memory. A system includes a memory device for providing constrained transmission and storage. The memory device includes an interface to a data bus, the data bus having a previous state. The memory device also includes an interface to an address and command bus for receiving a request to read data at an address, and a mechanism for initiating a programmable mode. The programmable mode facilitates retrieving data at the address, and executing an exclusive or (XOR) using the retrieved data and the previous state of the data bus as input. The result of the XOR operation is transmitted to the requester via the data bus. | 03-05-2009 |
20090060095 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR CLASSIFYING UNCERTAIN DATA - Uncertain data is classified by constructing an error adjusted probability density estimate for the data, and applying a subspace exploration process to the probability density estimate to classify the data. | 03-05-2009 |
20090056350 | BIMETALLIC HEAT SINK AIR DEFLECTORS FOR DIRECTED AIRFLOW FOR IMPROVED THERMAL TRANSFER AND DISSIPATION - A cooling apparatus, includes: one or more bimetallic deflectors attached to a mounting post, the mounting post configured for mating engagement with a protrusion of a heat sink, such that the one or more bimetallic deflectors are in thermal contact with the protrusion when the mounting post is engaged therewith; wherein the bimetallic deflectors are configured to deflect in response to thermal energy conducted from the protrusions so as to change a direction of airflow incident thereupon. | 03-05-2009 |
20090055839 | SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR DATA ORIENTED ASPECT PROGRAMMING IN MESSAGE FLOW - Systems, methods and computer products for data oriented aspect programming in message flows. Exemplary embodiments include a method including defining a set of static and dynamic rules to identify a plurality of data-oriented join points in a message flow, wherein each of the plurality of join points is a specific point in the message flow at runtime, defining a set of actions for each of the plurality of data-oriented join points, the set of actions executing once a respective join point condition of a set of static and dynamic conditions are met, inserting the set of static and dynamic rules into the message flow at each of the plurality of data-oriented join points and executing the set of actions for each one of the inserted set of static and dynamic rules in response to a respective static and dynamic condition being met. | 02-26-2009 |
20090055628 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR REDUCING LOAD-HIT-STORE DELAYS BY ASSIGNING MEMORY FETCH UNITS TO CANDIDATE VARIABLES - Assigning each of a plurality of memory fetch units to any of a plurality of candidate variables to reduce load-hit-store delays, wherein a total number of required memory fetch units is minimized. A plurality of store/load pairs are identified. A dependency graph is generated by creating a node Nx for each store to variable X and a node Ny for each load of variable Y and, unless X=Y, for each store/load pair, creating an edge between a respective node Nx and a corresponding node Ny; for each created edge, labeling the edge with a heuristic weight; labeling each node Nx with a node weight Wx that combines a plurality of respective edge weights of a plurality of corresponding nodes Nx such that Wx=Σω | 02-26-2009 |
20090055424 | XML Based Object-Relationship Mapping for Different Object Type - A method for XML based object-relationship mapping for different object types in a computer system is provided. The method includes creating a database schema in a database layer including a single table with specific database columns for storing known properties as well as customizable database columns for storing extended properties. The method also includes creating an object in an object layer that has specific methods for known properties and dynamic methods for extended properties, where the object types are variations of the object, the object includes fields for the properties, and the object supports reading and writing the properties to corresponding database columns in the table. The method further includes creating an XML file containing definitions for new object types and new properties, where the property definitions include database column names, and the XML file contains display information for GUI management. The method additionally includes outputting display information a GUI. | 02-26-2009 |
20090049485 | Method For Context-Based Channel Switching in Bandwidth Limited Television Systems - A method for switching channels on a video playback device, the device receiving content from a plurality of channels transmitted by a digital video distribution network, the method including establishing a context for selecting additional channels; receiving a selection for another channel; updating the context with the selection; and transmitting the selection to the device and providing the additional channels for fast channel switching. | 02-19-2009 |
20090044176 | Method and Computer Program Product for Dynamically and Precisely Discovering Deliquent Memory Operations - A method and computer product for dynamically and precisely discovering delinquent memory operations through integration of compilers, performance monitoring tools, and analysis tools are provided. The method includes compiling an application, and linking the application with a tracing library to generate executable, compiler annotated information and linker mapping information. The application is executed to obtain runtime trace information that includes hardware performance counters and tracing library instrumentation events. The trace information, the compiler annotated information, and the linker mapping information are analyzed to produce a delinquent memory operation file containing delinquent memory operation information. The delinquent memory operation information of the delinquent memory operation file is read by the compiler to perform memory reference mapping to guide static analysis and memory hierarchy optimization. The memory reference mapping maps delinquent memory operations precisely, both externally in a user source code and internally in a compiler intermediate representation. | 02-12-2009 |
20090014856 | MICROBUMP SEAL - A sealable microelectronic device providing mechanical stress endurance which includes a semiconductor substrate. A substantially continuous sealing element is positioned adjacent an outer periphery and between a microelectronic component and the semiconductor substrate, or another microelectronic component. The sealing element seals the microelectronic component to the substrate or another microelectronic component, and provides structural support to the microelectronic device. | 01-15-2009 |
20080312982 | Dynamic Creation of a Service Model - A service model of resources is dynamically created from a selected service model template. A user-input or incoming event selects one of multiple pre-defined service model templates for construction of a selected service model. The selected service model represents real-time characteristics of resources for an enterprise. External data sources, which are used to describe the real-time characteristics of the depicted resources, are then identified, and the service model is constructed using the identified external data sources. | 12-18-2008 |
20080288926 | Computer Implemented Method and System for Accurate, Efficient and Adaptive Calling Context Profiling - Computer implemented method, system and computer usable program code for profiling the execution of an application that is both space-and time-efficient and highly accurate. A computer implemented method for profiling the execution of an application includes sampling execution characteristics of the application at a plurality of sampling points to provide samples, and deriving a calling context of the samples. The application is continuously executed between sampling points while additional profiling data is gathered. | 11-20-2008 |
20080273456 | Port Trunking Between Switches - A computer implemented method, data processing system, and a computer program product are provided for processing packets in switches. A first switch receives a packet from a network that is to be directed to a host. A determination is made as to whether all of the ports connected from the first switch to the host have failed. If all of the ports from the first switch to the host have failed, the packet is sent through a backup port connected to a second switch, which sends the packet to the host. | 11-06-2008 |
20080250112 | Method and Apparatus for Determining Whether an Email Message is Ready for Transmission - A computer implemented method, apparatus, and computer usable program code to analyze an email message using a policy to form a result in response to detecting a request to send an email message. A determination is made as to whether the result indicates that the email message is complete. An alert is generated if a determination is present that indicates that the email message is incomplete. | 10-09-2008 |
20080247415 | Method for Indirect Access to a Support Interface for Memory-Mapped Resources to Reduce System Connectivity From Out-of-Band Support Processor - A method and apparatus are provided for a support interface for memory-mapped resources. A support processor sends a sequence of commands over and FSI interface to a memory-mapped support interface on a processor chip. The memory-mapped support interface updates memory, memory-mapped registers or memory-mapped resources. The interface uses fabric packet generation logic to generate a single command packet in a protocol for the coherency fabric which consists of an address, command and/or data. Fabric commands are converted to FSI protocol and forwarded to attached support chips to access the memory-mapped resource, and responses from the support chips are converted back to fabric response packets. Fabric snoop logic monitors the coherency fabric and decodes responses for packets previously sent by fabric packet generation logic. The fabric snoop logic updates status register and/or writes response data to a read data register. The system also reports any errors that are encountered. | 10-09-2008 |
20080244084 | Method for improved network performance using smart maximum segment size - A method, system, and computer program product for negotiating a smart maximum segment size of a network connection for a data transfer. A client request to initiate a network connection, which includes a first maximum segment size, is received at a server. The server calculates a second maximum segment size, wherein at least one of the first maximum segment size or the second maximum segment size is a cache line size aligned Ethernet frame size, or smart maximum segment size. The server determines the smaller of the first and second maximum segment sizes and sends the second maximum segment size to the client. The client then selects the smaller of the first and second maximum segment sizes, and sends an acknowledgement to the server to complete the connection. The smaller of the first and second maximum segment sizes is used for the network connection and subsequent data transfer. | 10-02-2008 |