INTERNATIONAL BUSINESS MACHINES CORP. Patent applications |
Patent application number | Title | Published |
20140099769 | METHOD TO PROTECT AGAINST CONTACT RELATED SHORTS ON UTBB - Isolation trenches are etched through an active silicon layer overlying a buried oxide on a substrate into the substrate, and through any pad dielectric(s) on the active silicon layer. Lateral epitaxial growth of the active silicon layer forms protrusions into the isolation trenches to a lateral distance of at least about 5 nanometers, and portions of the isolation trenches around the protrusions are filled with dielectric. Raised source/drain regions are formed on portions of the active silicon layer including a dielectric. As a result, misaligned contacts passing around edges of the raised source/drain regions remain spaced apart from sidewalls of the substrate in the isolation trenches. | 04-10-2014 |
20140074872 | Managing Workload Optimized Systems using Relational Database Modeling and Triggers - Relational database modeling and triggers are employed and coordinated to maintain and manage tunable parameters and characteristics of a Workload Optimized System. The database model is initialized with pre-defined values as per definition of Workload Optimized Systems, which models the optimal configuration of the workload-optimized system, capturing various performance configurations, security and other related system and software configuration. The values present the optimal values for the entire solution. A daemon is run to monitor for changes in the tunable configuration settings, which also updates the current values of the configuration parameters on the RDBMS. SQL Triggers are implemented on the database to identify cases where corrective actions are required to the configuration parameters. | 03-13-2014 |
20140019574 | Remote Direct Memory Access Socket Aggregation - Byte utilization is improved in Remote Direct Memory Access (RDMA) communications by detecting a plurality of concurrent messages on a plurality of application sockets which are destined for the same application, client or computer, intercepting those messages and consolidating their payloads into larger payloads, and then transmitting those consolidated messages to the destination, thereby increasing the payload-to-overhead byte utilization of the RDMA transmissions. At the receiving end, multiplexing information is used to unpack the consolidated messages, and to put the original payloads into a plurality of messages which are then fed into the receiving sockets to the destination application, client or computer, thereby making the consolidation process transparent between the initiator and the target. | 01-16-2014 |
20140019572 | Remote Direct Memory Access Socket Aggregation - Byte utilization is improved in Remote Direct Memory Access (RDMA) communications by detecting a plurality of concurrent messages on a plurality of application sockets which are destined for the same application, client or computer, intercepting those messages and consolidating their payloads into larger payloads, and then transmitting those consolidated messages to the destination, thereby increasing the payload-to-overhead byte utilization of the RDMA transmissions. At the receiving end, multiplexing information is used to unpack the consolidated messages, and to put the original payloads into a plurality of messages which are then fed into the receiving sockets to the destination application, client or computer, thereby making the consolidation process transparent between the initiator and the target. | 01-16-2014 |
20140006854 | Resolution of System Hang due to Filesystem Corruption | 01-02-2014 |
20130341937 | RECLAIMING ENERGY FROM WASTE WATER IN TALL BUILDINGS - Electrical power is generated from falling liquids such as captured rain water, gray water and black water in tall buildings using two or more reservoirs. Fill valves for each of the reservoirs are controlled to fill the first reservoir in a raised position while emptying the second reservoir in a lowered position. When full, the first reservoir is dropped to the lowered position while imparting mechanical energy to an electrical generator and while raising the second reservoir. Next, the second reservoir is filled until full while the first reservoir is emptied, followed by dropping the second reservoir to the lowered position while imparting mechanical energy to the electrical generator and while raising the first reservoir. The cycle is repeated so that electrical generation from the falling of the liquid avoids the liquid contacting or passing through a turbine or impeller. | 12-26-2013 |
20130341935 | RECLAIMING ENERGY FROM WASTE WATER IN TALL BUILINGS - Electrical power is generated from falling liquids such as captured rain water, gray water and black water in tall buildings using two or more reservoirs. Fill valves for each of the reservoirs are controlled to fill the first reservoir in a raised position while emptying the second reservoir in a lowered position. When full, the first reservoir is dropped to the lowered position while imparting mechanical energy to an electrical generator and while raising the second reservoir. Next, the second reservoir is filled until full while the first reservoir is emptied, followed by dropping the second reservoir to the lowered position while imparting mechanical energy to the electrical generator and while raising the first reservoir. The cycle is repeated so that electrical generation from the falling of the liquid avoids the liquid contacting or passing through a turbine or impeller. | 12-26-2013 |
20130332913 | Indirect Software Performance Analysis - Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation. | 12-12-2013 |
20130205086 | RAID Array Transformation - Transforming an in-use RAID array from a first array configuration having a first parameter to a second array configuration having a second parameter while preserving the logical data structure. An extent reservation component and data migration component are provided for reading unmigrated data from an area of an array arranged according to the first array configuration and writing the data to an area of the array arranged according to the second array configuration using reserved extents to store first migrated data and using further extents to store second migrated data. A first I/O component for performing I/O according to the first array configuration on unmigrated data prior to its reading by the data migration component is provided along with a second I/O component for performing I/O according to the second array configuration on the first migrated data and the second migrated data after its writing by the data migration component. | 08-08-2013 |
20130133062 | System and Method to Capture and Manage Input Values for Automatic Form Fill - A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File containing sets of records associated with the user, his or her accounts or web sites, and registered values associated with form tags (e.g. username, password, address, email, telephone, etc.). When the user encounters another form, the MCF is automatically searched for matching values and form tags, primarily from the same account or web site, or alternatively from other accounts or sites. A flowing pop-up menu is displayed nearby the form fields from which the user can select values to automatically complete the form. Automatic account information updating, value expiration management, mapping of favorite values, and sharing of values are optional, enhanced functions of the invention. | 05-23-2013 |
20120254947 | Distributed Real-Time Network Protection for Authentication Systems - Information about security events detected by a group of protected web-connected resources is centrally managed in order to detect distributed attacks and slow paced attacks by providing to a plurality of web-connected resources a deployment component which couples to a native authorization service of each web-connected resource; receiving a plurality of security event reports from one or more of the deployment components by a command and control center computer; based on collected information from the plurality of security event reports, determining a threat level indicator across the plurality of web-connected resources using one or more analyses and metrics; and transmitting the threat level indicator to each of the web-connected resources. | 10-04-2012 |
20120185243 | SPEECH FEATURE EXTRACTION APPARATUS, SPEECH FEATURE EXTRACTION METHOD, AND SPEECH FEATURE EXTRACTION PROGRAM - A speech feature extraction apparatus, speech feature extraction method, and speech feature extraction program. A speech feature extraction apparatus includes: first difference calculation module to: (i) receive, as an input, a spectrum of a speech signal segmented into frames for each frequency bin; and (ii) calculate a delta spectrum for each of the frame, where the delta spectrum is a difference of the spectrum within continuous frames for the frequency bin; and first normalization module to normalize the delta spectrum of the frame for the frequency bin by dividing the delta spectrum by a function of an average spectrum; where the average spectrum is an average of spectra through all frames that are overall speech for the frequency bin; and where an output of the first normalization module is defined as a first delta feature. | 07-19-2012 |
20110316565 | SCHOTTKY JUNCTION SI NANOWIRE FIELD-EFFECT BIO-SENSOR/MOLECULE DETECTOR - A Schottky junction silicon nanowire field-effect biosensor/molecule detector with a nanowire thickness of 10 nanometer or less and an aligned source/drain workfunction for increased sensitivity. The nanowire channel is coated with a surface treatment to which a molecule of interest absorbs, which modulates the conductivity of the channel between the Schottky junctions sufficiently to qualitatively and quantitatively measure the presence and amount of the molecule. | 12-29-2011 |
20110312424 | Peer to Peer Video Game Clip Sharing - The present invention provides a method, system, and program product for automatically sharing video clips of video game action. A video capture application sets game action triggers for video clip capture. The video sharing application automatically captures a video clip during a video game in response to triggering actions during playing of a game. The video sharing application automatically tags recipients. Then, the video sharing application automatically sends the captured video clip to the tagged recipients. | 12-22-2011 |
20110311825 | SELECTIVE ETCH BACK PROCESS FOR CARBON NANOTUBES INTERGRATION - The present disclosure relates to a method for selectively etching-back a polymer matrix to expose tips of carbon nanotubes comprising:
| 12-22-2011 |
20110311781 | METHOD OF PATTERNING PHOTOSENSITIVE MATERIAL ON A SUBSTRATE CONTAINING A LATENT ACID GENERATOR - The present disclosure relates to a method of patterning a photosensitive material on a polymeric fill matrix comprising at least one latent photoacid generator; and a structure prepared according to said method. The method comprises:
| 12-22-2011 |
20110310027 | Method, System, and Program Product for No-Look Digit Entry in a Multi-Touch Device - A method, device, and program product are provided for no-look entry of digits in a multi-touch device. A multi-touch screen of the multi-touch device senses an initializing combination of at least one touch. A no-look digit entry application assigns a binary value to each touched location. The multi-touch screen detects at least one combination of at least one touch of the touch screen. The no-look digit entry application determines the locations touched and enters digit inputs corresponding to the sum of the binary values assigned to the locations for each detected combination of touches. | 12-22-2011 |
20110309507 | METHODOLOGY FOR EVALUATION OF ELECTRICAL CHARACTERISTICS OF CARBON NANOTUBES - The present disclosure relates to a structure comprising
| 12-22-2011 |
20110304053 | INTERCONNECT STRUCTURE AND METHOD OF FABRICATING - An interconnect structure is provided which comprises a semiconductor substrate; a patterned and cured photoresist wherein the photoresist contains a low k dielectric substitutent and contains a fortification layer on its top and sidewall surfaces forming vias or trenches; and a conductive fill material in the vias or trenches. Also provided is a method for fabricating an interconnect structure which comprises depositing a photoresist onto a semiconductor substrate, wherein the photoresist contains a low k dielectric constituent; imagewise exposing the photoresist to actinic radiation; then forming a pattern of vias or trenches in the photoresist; surface fortifying the pattern of vias or trenches proving a fortification layer on the top and sidewalls of the vias or trenches; curing the pattern of vias or trenches thereby converting the photoresist into a dielectric; and filling the vias and trenches with a conductive fill material. | 12-15-2011 |
20110214010 | Creation of Highly Available Pseudo-Clone Standby Servers for Rapid Failover Provisioning - Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed. | 09-01-2011 |
20110214009 | Creation of Highly Available Pseudo-Clone Standby Servers for Rapid Failover Provisioning - Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed. | 09-01-2011 |
20110204459 | SIDEWALL COATING FOR NON-UNIFORM SPIN MOMENTUM-TRANSFER MAGNETIC TUNNEL JUNCTION CURRENT FLOW - A magnetic tunnel junction device comprises a substrate including a patterned wiring layer. A magnetic tunnel junction (MTJ) stack is formed over the wiring layer. A low-conductivity layer is formed over the MTJ stack and a conductive hard mask is formed thereon. A spacer material is then deposited that includes a different electrical conductivity than the low conductivity layer. The spacer material is etched from horizontal surfaces so that the spacer material remains only on sidewalls of the hard mask and a stud. A further etch process leaves behind the sidewall-spacer material as a conductive link between a free magnetic layer and the conductive hard mask, around the low-conductivity layer. A difference in electrical conductivity between the stud and the spacer material enhances current flow along the edges of the free layer within the MTJ stack and through the spacer material formed on the sidewalls. | 08-25-2011 |
20110203762 | FILL-HEAD FOR FULL-FIELD SOLDER COVERAGE WITH A ROTATABLE MEMBER - A method and apparatus are provided to deposit conductive bonding material into cavities in a mold. A fill head is placed in substantial contact with a mold that includes cavities. The fill head includes a sealing member that substantially encompasses an entire area to be filled with conductive bonding material. The conductive bonding material is forced out of the fill head toward the mold. The conductive bonding material is provided into at least one cavity of the cavities contemporaneous with the at least one cavity being in proximity to the fill head. | 08-25-2011 |
20110022585 | MULTI-PARTITION QUERY GOVERNOR IN A COMPUTER DATABASE SYSTEM - An apparatus and method for a multi-partition query governor in a partitioned computer database system. In preferred embodiments a query governor uses data of a query governor file that is associated with multiple partitions to determine how the query governor manages access to the database across multiple partitions. Also, in preferred embodiments, the query governor in a local partition that receives a query request communicates with a query governor in a target partition to accumulate the total resource demands of the query on the local and target partitions. In preferred embodiments, a query governor estimates whether resources to execute a query will exceed a threshold over all or a combination of database partitions. | 01-27-2011 |
20100191843 | Method and System for Selection of a Runtime Stack for Deployment of a Web Service - A method and system for selection of a runtime stack for deployment of a Web Service are provided. The method includes: generating policy assertions for a Web Service to be deployed; providing a scoring mechanism for each available runtime stack in which the ability of a stack to support each of a plurality of policy assertions is scored; applying the scoring mechanism for each available runtime stack to the policy assertions for the Web Service ( | 07-29-2010 |
20100161930 | STATISTICS COLLECTION USING PATH-VALUE PAIRS FOR RELATIONAL DATABASES - A method, system, and computer readable medium for collecting statistics associated with data in a database are disclosed. The method comprises determining an amount of memory needed to collect statistics for data associated with a defined data type in a relational database. The defined data type is based upon a mark-up language using a tree structure with one or more root-to-node paths therein. The amount of memory is allocated as determined for collecting the statistics for the data of the defined data type. A statistics collection is performed for the data of the defined data type in a single pass through the database and within the amount of memory which has been allocated. The performing includes at least determining a total number of instances of at least one path-identifier associated with a given value within a given set of documents. | 06-24-2010 |
20100155456 | METHOD AND PROCESS FOR REDUCING UNDERCOOLING IN A LEAD-FREE TIN-RICH SOLDER ALLOY - Briefly, a novel material process is disclosed wherein one or more nucleation modifiers are added, in trace amounts, to a lead-free tin-rich solder alloy to produce a solder composition with reduce or suppressed undercooling temperature characteristics. The modifier being a substance which facilitates the reduction of extreme anisotropic properties associated with body-centered-tetragonal tin based lead-free solder. The addition of the nucleation modifiers to the solder alloy does not materially effect the solder composition's melting point. As such, balls of solder with the nucleated composition freeze while other solder balls within the array remain in the melt. This effectively enables one substrate to be pinned to another substrate by one or more predetermined solder balls to secure the package while the remaining solder joints are in the liquid state. Further, the addition of a trace amount of nucleation sites within the composition facilitates control over the number, size, and orientations of primary intermetallic compounds in tin rich crystallite grains. Moreover, trace amounts of one or more solid and/or insoluble nucleating modifiers within a given volume of solder reduces the size of average crystallites within the composition. | 06-24-2010 |
20100153909 | Method and System for Building and Application - A method and system for building an application are provided. The method includes: generating a user model relating to a new application to be built, the user model including at least one role with one or more associated tasks. A task list is compiled for the tasks in the user model, including removing any duplications of tasks. A task to application component mapping is accessed, wherein the application components to which the tasks are mapped are spread over one or more existing applications. The application components mapped to by the tasks are retrieved and compiled in the new application. | 06-17-2010 |
20100070559 | SERVICE PROCESSING APPARATUS, SYSTEM, AND RECORDING MEDIUM - A service processing apparatus that is realized by a computer is provided. The apparatus forms a service processing system, and transmits and receives information, with at least one other service processing apparatus. The apparatus performs processing to execute at least a service other than services for which processing is complete and that are not idempotent among at least one service corresponding to the services for which re-execution is requested, when re-execution is requested for a service for which execution has been previously requested by receipt of a service request to which the same service ID is added as to a previously received service request, and transmits a response to a transmission origin of the service request, when the processing to execute is completed. | 03-18-2010 |
20100070558 | SERVICE PROCESSING APPARATUS, SYSTEM, AND RECORDING MEDIUM - A service processing apparatus that is realized by a computer is provided. A service ID generating/adding component of the service processing apparatus generates a service ID including a call origin ID and a call destination ID, in each of which an ID element is set, and adds the generated service ID to a service request transmitted when no upper service processing apparatus to the own apparatus exists, and, when an upper service processing apparatus to the own apparatus exists, generates a service ID including a call origin ID in which is set an ID element set as the call destination ID in a service ID added to a service request received from the upper service processing apparatus and a call destination ID in which is set an ID element and adds the generated service ID to the service request. | 03-18-2010 |
20100044725 | DEVICE FOR DEFEATING REVERSE ENGINEERING OF INTEGRATED CIRCUITS BY OPTICAL MEANS - An integrated circuit and method are provided for preventing reverse engineering by monitoring light emissions emitted from transistors and such electrically active devices in the integrated circuit. The method prevents, in an integrated circuit, a pattern of light emitted from at least one active device in the integrated circuit from being detected external to the integrated circuit by fading the light emitted from the at least one active device in the integrated circuit and that is emitted external to the integrated circuit. Bright light emission emitted in substantial close proximity to the at least one active device in the integrated circuit, and emitted external to the integrated circuit, fades a pattern of light emission emitted from the at least one active device. | 02-25-2010 |
20100044724 | DEVICE FOR DEFEATING REVERSE ENGINEERING OF INTEGRATED CIRCUITS BY OPTICAL MEANS - An integrated circuit and method are provided for preventing reverse engineering by monitoring light emissions emitted from transistors and such electrically active devices in the integrated circuit. The method prevents, in an integrated circuit, a pattern of light emitted from at least one active device in the integrated circuit from being detected external to the integrated circuit by reduction of the intensity of light emitted from the at least one active device in the integrated circuit thereby preventing the reduced intensity light emitted from the at least one active device in the integrated circuit from being detected external to the integrated circuit. The intensity of light emitted from the at least one active device in the integrated circuit can be reduced by modification of operational characteristics of the at least one active device during switching transitions. | 02-25-2010 |
20100037157 | PROACTIVE MACHINE-AIDED MASHUP CONSTRUCTION WITH IMPLICIT AND EXPLICIT INPUT FROM USER COMMUNITY - A method, information processing system, and computer program product manage information mashups. A first widget is selected from a plurality of widgets. A widget is an entity that at least one of consumes data and produces data. Metadata associated with the first widget is analyzed. The metadata at least includes compatible input type information, compatible output type information, previous usage information, and user feedback information. A second widget is selected from the plurality of widgets based on the metadata associated with the first widget and metadata associated with the second widget. The first widget and the second widget are coupled together. | 02-11-2010 |
20100036823 | PROVIDING LOCATION BASED INFORMATION IN A VIRTUAL ENVIRONMENT - A method, information processing system, and virtual environment, provide location information to users in the virtual environment. A first user is determined to be communicating with a second user in a virtual environment. One of the first user and the second user is determined to have entered a character set substantially matching a keyword in a database entry. Location information associated with the keyword is identified. The location information indicates a location within the virtual environment. The location information is linked to the character set. The character set is visually changed to indicate to the first user and the second user that location information has been linked to the character set. | 02-11-2010 |
20100030956 | APPARATUS AND METHOD TO STORE ORIGINAL POINT-IN-TIME DATA - A method to store point-in-time data, comprising establishing a block size, providing source data storage comprising (S) blocks, and target data storage comprising (T) blocks. The method configures (B) source storage segments and (B) target storage segments, and receives updated point-in-time data for original point-in-time data written to an (i)th source storage segment. The method then determines if a (j)th target storage segment comprises available storage capacity to store the original point-in-time data. If a (j)th target storage segment comprises available storage capacity to store the original point-in-time data, the method writes the original point-in-time data to that (j)th target storage segment. | 02-04-2010 |
20100027209 | STORAGE SLOT FOR PORTABLE DATA STORAGE CARTRIDGES - A storage slot for multiple data storage cartridges, comprising a planar member having a first end, a second end, a side interconnecting the first end and the second end, and a gate moveably connected to the side at the first end of the planar member, wherein the gate can be moved between a closed position and an open position. The storage slot farther comprises a secondary catch moveably disposed between the first end and the second end. When the gate is disposed in a closed position, the secondary catch is disposed in a retracted orientation, and when the gate is disposed in an open position, the secondary catch is disposed in an extended orientation. | 02-04-2010 |
20100023698 | Enhanced Coherency Tracking with Implementation of Region Victim Hash for Region Coherence Arrays - A method and system for precisely tracking lines evicted from a region coherence array (RCA) without requiring eviction of the lines from a processor's cache hierarchy. The RCA is a set-associative array which contains region entries consisting of a region address tag, a set of bits for the region coherence state, and a line-count for tracking the number of region lines cached by the processor. Tracking of the RCA is facilitated by a non-tagged hash table of counts represented by a Region Victim Hash (RVH). When a region is evicted from the RCA, and lines from the evicted region still reside in the processor's caches (i.e., the region's line-count is non-zero), the RCA line-count is added to the corresponding RVH count. The RVH count is decremented by the value of the region line count following a subsequent processor cache eviction/invalidation of the region previously evicted from the RCA. | 01-28-2010 |
20100017245 | RESERVATION MANAGEMENT - A method, information processing system, and computer program product managing reservations of items. A request to reserve an item is received from a first user. The request includes a specification of at least one of a date and a time for a first reservation of the item. A determination is made that a second user holds a prior reservation for the item that conflicts with the first reservation. A determination is made that the second user is no longer requires the prior reservation. The prior reservation is released in response to determining that the second user no longer requires the prior reservation. The first reservation as specified by the request is allowed in response to the releasing and in response to the receiving from the first user the request. | 01-21-2010 |
20100011030 | STATISTICS COLLECTION USING PATH-IDENTIFIERS FOR RELATIONAL DATABASES - Disclosed are a system, method, and computer readable medium for collecting statistics associated with data in a database. The method comprises determining an amount of memory needed to collect statistics for data associated with a defined data type in a relational database. The defined data type is based upon a mark-up language using a tree structure with one or more root-to-node paths therein. The amount of memory as determined is allocated for collecting the statistics for the data of the defined data type. A statistics collection is performed for the data of the defined data type in a single pass through the database and within the amount of memory which has been allocated. | 01-14-2010 |
20100011000 | MANAGING THE CREATION, DETECTION, AND MAINTENANCE OF SENSITIVE INFORMATION - A method, information processing system, and computer program storage product for managing information within an electronic file are provided. A plurality of information sets within an electronic file is analyzed. At least one of the information sets is compared to at least one statistical classification model. The statistical classification model includes one or more probabilities associated with a plurality of analyzed information sets that indicate a likelihood that a respective analyzed information set is classified sensitive information. The at least one information set is determined to substantially match at least one analyzed information set in the statistical classification model. The probability associated with the at least one analyzed information set is determined whether to be above a threshold. The at least one information set is classified as sensitive information in response to determining that the probability is above the threshold. | 01-14-2010 |
20100008500 | END-USER SYSTEM OF PREVENTING UNAUTHORIZED RERECORDING OF MULTIMEDIA CONTENT - An end-user system for the blocking of recording digital content at during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks the usage of the multimedia interfaces including devices and/or ports that can be used to store un-encrypted content that has been decrypted for the purposes of playing or rendering. The method also includes an exception, which allows recording with permission from the present invention. | 01-14-2010 |
20100005242 | Efficient Processing of Data Requests With The Aid Of A Region Cache - A method and system for configuring a cache memory system in order to efficiently process processor requests. A group of cache elements, which include a Region Cache, a Region Coherence Array, and a lowest level cache, is configured based on a tradeoff of latency and power consumption requirements. A selected cache configuration differs from other feasible configurations in the order in which cache elements are accessed relative to each other. The Region Cache is employed in a number of configurations to reduce the power consumption, latency, and bandwidth requirements of the Region Coherence Array. The Region Cache is accessed by processor requests before (or in parallel with) the larger Region Coherence Array, providing the region coherence state and power efficiently to requests that hit in the Region Cache. | 01-07-2010 |
20090327748 | SYSTEM AND METHOD FOR FAST QUERYING OF ENCRYPTED DATABASES - A system, method, computer program product, and data management service that allows any comparison operation to be applied on encrypted data, without first decrypting the operands. The encryption scheme of the invention allows equality and range queries as well as the aggregation operations of MAX, MIN, and COUNT. The GROUPBY and ORDERBY operations can also be directly applied. Query results produced using the invention are sound and complete, the invention is robust against cryptanalysis, and its security strictly relies on the choice of a private key. Order-preserving encryption allows standard database indexes to be built over encrypted tables. The invention can easily be integrated with existing systems. | 12-31-2009 |
20090313400 | DYNAMIC STABILIZATION FOR A STREAM PROCESSING SYSTEM - Disclosed are a method, upstream processing node, and computer readable medium for dynamically stabilizing a stream processing system. The method includes receiving at least one computing resource allocation target. The method further includes determining that an input data flow rate of at least one upstream processing element varies. The computing resource is dynamically allocated to the upstream processing element in response to the input rate of the upstream processing element varying. Data flow is dynamically controlled between the upstream processing element and at least one downstream processing element. | 12-17-2009 |
20090311836 | EXTREMELY-THIN SILICON-ON-INSULATOR TRANSISTOR WITH RAISED SOURCE/DRAIN - An extremely-thin silicon-on-insulator transistor is provided that includes a buried oxide layer above a substrate, a silicon layer above the buried oxide layer, a gate stack on the silicon layer, a nitride liner on the silicon layer and adjacent to the gate stack, an oxide liner on and adjacent to the nitride liner, and raised source/drain regions. The gate stack includes a high-k oxide layer on the silicon layer and a metal gate on the high-k oxide layer. Each of the raised source/drain regions has a first part comprising a portion of the silicon layer, a second part adjacent to parts of the oxide liner and the nitride liner, and a third part above the second part. Also provided is a method for fabricating an extremely-thin silicon-on-insulator transistor. | 12-17-2009 |
20090307635 | METAL HIGH DIELECTRIC CONSTANT TRANSISTOR WITH REVERSE-T GATE - A transistor is provided. The transistor includes a silicon layer including a source region and a drain region. A gate stack is disposed on the silicon layer between the source region and the drain region. The gate stack comprises a first layer of a high dielectric constant material, a second layer comprising a metal or metal alloy, and a third layer comprising silicon or polysilicon. A lateral extent of the second layer of the gate stack is substantially greater than a lateral extent of the third layer of the gate stack. Also provided are methods for fabricating such a transistor. | 12-10-2009 |
20090302400 | METAL HIGH DIELECTRIC CONSTANT TRANSISTOR WITH REVERSE-T GATE - A transistor is provided. The transistor includes a silicon layer including a source region and a drain region. A gate stack is disposed on the silicon layer between the source region and the drain region. The gate stack comprises a first layer of a high dielectric constant material, a second layer comprising a metal or metal alloy, and a third layer comprising silicon or polysilicon. A lateral extent of the second layer of the gate stack is substantially greater than a lateral extent of the third layer of the gate stack. Also provided are methods for fabricating such a transistor. | 12-10-2009 |
20090296909 | TELECONFERENCE SUBSCRIPTION CONTROL FOR AGENDA SUBSCRIPTION TOOLS - A method, system, and computer program product for autonomously controlling caller access to a teleconference based on specified preferences of a moderator. Using preferences established by the moderator of a teleconference, a conference control system may grant or restrict access of participants of the teleconference. The conference control system may authorize callers of a teleconference based on the current agenda item being discussed or the amount of time a caller has been on the ongoing teleconference. When a specific caller is not authorized to be on a conversation, the conference control system may mute the conversation for a specific caller, or disconnect the caller. The conference control system may autonomously re-connect the caller when an authorized agenda item for the caller is being discussed. | 12-03-2009 |
20090271549 | INTERRUPT HANDLING USING SIMULTANEOUS MULTI-THREADING - Disclosed are a method, information processing system, and computer readable medium for managing interrupts. The method includes placing at least one physical processor of an information processing system in a simultaneous multi-threading mode. At least a first logical processor and a second logical processor associated with the at least one physical processor are partitioned. The first logical processor is assigned to manage interrupts and the second logical processor is assigned to dispatch runnable user threads. | 10-29-2009 |
20090217206 | MODELESS INTERACTION WITH GUI WIDGET APPLICATIONS - A user displayed interactive GUI widget (icon) provides two or more regions. A first region provides widget manipulation function for editing the widget, editing including moving or sizing functions. A second region provides widget interaction function for user interaction with the widget including interaction lists or interaction graphics. The regions may comprise one or more icon border regions and one or more icon internal regions. | 08-27-2009 |
20090216789 | MANAGEMENT OF TIME-VARIANT DATA SCHEMAS IN DATA WAREHOUSES - A system, method, and computer readable medium for preserving information in time variant data schemas are disclosed. The method includes determining if at least one modification request associated with a database schema has been received. In response to the modification request being received, a metadata table associated with the database schema is updated to include at least one entry associated with the modification request. The entry identifies an instance in time when an action associated with the modification request was performed. | 08-27-2009 |
20090209228 | SYSTEM AND METHOD FOR PROVIDING PERSONAL AND EMERGENCY SERVICE HAILING IN WIRELESS NETWORK - A method and system for providing personal and emergency service hailing. A profile database stores profiles with individualized distance thresholds for each of a number of wireless devices. A wireless message proximity request is received from a requesting wireless device. Distances between a location of the requesting wireless device and locations of each of other wireless communications devices is computed and compared to individualized distance thresholds stored for the requesting wireless communications device. A set of wireless devices consisting of wireless devices that satisfy the individualized distance thresholds for the requesting wireless communications device is identified and a wireless message proximity response is sent to the requesting wireless communications device. The wireless message proximity response identifies the set of wireless communications devices that satisfy the at least one individualized distance threshold. | 08-20-2009 |
20090184803 | UTILIZING AN RFID TAG IN MANUFACTURING FOR ENHANCED LIFECYCLE MANAGEMENT - Data associated with supply chain events for a manufactured assembly is automatically stored. In preferred embodiments the supply chain events for the manufactured assembly are stored on an RFID tag attached to the assembly as it travels through the supply chain to insure the data concerning the assembly is readily available and not separated from the assembly. In other embodiments, the supply chain events or characteristic data is stored on the RFID tag in a hierarchical structure beginning with the original state of the assembly and with additional entries for each step in the assembly process. In other embodiments, as the product undergoes rework, conversion to a different assembly, or personalizations, the new state of the assembly is stored in the RFID tag. In other preferred embodiments, other information is also stored on the RFID tag such as country of origin, failure data, cycle times and a quality status indicator. | 07-23-2009 |
20090182968 | VALIDITY OF ADDRESS RANGES USED IN SEMI-SYNCHRONOUS MEMORY COPY OPERATIONS - A system, method, and a computer readable for protecting content of a memory page are disclosed. The method includes determining a start of a semi-synchronous memory copy operation. A range of addresses is determined where the semi-synchronous memory copy operation is being performed. An issued instruction that removes a page table entry is detected. The method further includes determining whether the issued instruction is destined to remove a page table entry associated with at least one address in the range of addresses. In response to the issued instruction being destined to remove the page table entry, the execution of the issued instruction is stalled until the semi-synchronous memory copy operation is completed. | 07-16-2009 |
20090138664 | CACHE INJECTION USING SEMI-SYNCHRONOUS MEMORY COPY OPERATION - A system, method, and a computer readable for inserting data into a cache memory based on information in a semi-synchronous memory copy instruction are disclosed. The method comprises determining a start of a semi-synchronous memory copy operation. The semi-synchronous memory copy operation is checked for a given value in at least one cache injection bit. In response to the given value in the cache injection bit, a predefined number of lines of destination data is copied into at least one level of cache memory. | 05-28-2009 |
20090126021 | SECURE INITIALIZATION OF INTRUSION DETECTION SYSTEM - Secure initialization for detecting intrusions is disclosed. The secure initialization includes storing a behavior profile associated with an application, and reading the stored behavior profile that is cryptographically protected. The method further includes monitoring execution of the application during a bootstrapping phase of an intrusion detection system, according to the stored behavior profile. If the behavior of the application does not conform to the behavior profile, a message is issued indicating that the application is not conforming to the behavior profile. The behavior profile can be generated by a developer of the intrusion detection system, a developer of the application, and/or a third party developer. Additionally, the behavior profile is generated by executing the system on a reference computer system or by heuristic determination. | 05-14-2009 |
20090125991 | SECURE MANAGEMENT OF AUTHENTICATION INFORMATION - A system, method and computer program product are provided for managing authentication information for a user. According to the method, a master digital key is received from the user, and authentication of the user is obtained based on the master digital key. There is received from the user a selection of one identity from among a plurality of identities that are stored for the user. Authentication information for the user is provided into an application or web page based on the one identity selected by the user. In one embodiment, the authentication information is provided by recognizing a web page for which authentication information is stored, and automatically filling the authentication information for the user into appropriate elements of the web page. | 05-14-2009 |
20090113012 | SYSTEM AND METHOD FOR IDENTIFYING SPOOFED EMAIL BY MODIFYING THE SENDER ADDRESS - A system, method and computer program product are provided for identifying spoofed emails. According to the method, an email addressed to a recipient in a first network is received, with the email including a plurality of headers, and at least one of the plurality of headers including a sender address. It is determined whether the sender address indicates a mailbox from within the first network, and the sender address is modified if it indicates a mailbox within the first network. The email with the modified sender address is sent to the recipient. In one embodiment, a second email is received that is from the recipient and that is addressed to the modified sender address, the modified sender address is modified so as to return it to its original form, and the second email is sent. | 04-30-2009 |
20090102538 | ELECTRONICALLY SCANNABLE MULTIPLEXING DEVICE - An electronically scannable multiplexing device is capable of addressing multiple bits within a volatile or non-volatile memory cell. The multiplexing device generates an electronically scannable conducting channel with two oppositely formed depletion regions. The depletion width of each depletion region is controlled by a voltage applied to a respective control gate at each end of the multiplexing device. The present multi-bit addressing technique allows, for example, 10 to 100 bits of data to be accessed or addressed at a single node. The present invention can also be used to build a programmable nanoscale logic array or for randomly accessing a nanoscale sensor array. | 04-23-2009 |
20090037450 | DATA GATHER SCATTER - REDISTRIBUTION MACHINE - A method, system, and computer program product to transfer data between two application data structures by copying a data gather scatter program (DGSP) from an exporting process address space where a first data structure is located, to a location in shared memory visible to an importing process address space; assembling a parameter set identifying the data structure; starting a data gather scatter-redistribution machine (DGS-RM) in an importing process space where a second application data structure is located; passing the first parameter set, the DGSP copy, and a second parameter set identifying a second application data structure and a second DGSP to the DGS-RM; and creating master and worker stack machines. The master stack machine identifies a contiguous chunk of the first data structure. The worker stack machine identifies contiguous chunks of the second data structure representing the same number of bytes as the contiguous chunk of the first data structure and transferring to (from) one or more identified chunks of the second data structure from (to) the single chunk of the first application data structure. | 02-05-2009 |
20090024358 | BENCHMARKING CORRELATED STREAM PROCESSING SYSTEMS - A system, method, and computer program product for benchmarking a stream processing system are disclosed. The method comprises generating a plurality of correlated test streams. A semantically related data set is embedded within each of the test streams in the plurality of correlated test streams. The plurality of correlated test streams is provided to at least one stream processing system. A summary is generated for each of the semantically related embedded data sets. A common identifier, which is transparent to the system being tested, is embedded within each stream in the plurality of correlated test streams. The common identifier is extracted from the output data set generated by the stream processing system. At least one of the stored copies of the summaries and the common identifier are compared to an output data set including a set of zero or more correlation results generated by the stream processing system. | 01-22-2009 |
20090008057 | ROTATIONAL FILL TECHNIQUES FOR INJECTION MOLDING OF SOLDER - A system and method for injection molding conductive bonding material into a plurality of cavities in a non-rectangular mold is disclosed. The method comprises aligning a fill head with a non-rectangular mold. The non-rectangular mold includes a plurality of cavities. The fill head is placed in substantial contact with the non-rectangular mold. Rotational motion is provided to at least one of the non-rectangular mold and the fill head while the fill head is in substantial contact with the non-rectangular mold. Conductive bonding material is forced out of the fill head toward the non-rectangular mold. The conductive bonding material is provided into at least one cavity of the plurality of cavities contemporaneous with the at least one cavity being in proximity to the fill head. | 01-08-2009 |
20090006576 | COOPERATIVE LOCATION BASED TASKS - A method for providing location dependent information to a user for selective colleague assistance. The method on a Client Wireless Component includes the steps of receiving location data from a plurality of Global Positioning System GPS satellites and transmitting the location data to an Active Calendar Component. The method further includes on an Active Calendar Component the steps of receiving Client Wireless Component location data and determining if within a threshold distance a Colleague item list exists for user completion. | 01-01-2009 |
20080307095 | PERSISTENT GROUP MEMBERSHIP IN A DISTRIBUTING COMPUTING SYSTEM - A distributed system has a multiplicity of nodes. A group of the nodes subscribe to a group services process. The group is subject to dissolving. A list of persistent subscribers to the group is maintained. Subscriptions to members and states of the group that are persistent subscribers do not terminate in response to the group being dissolved. The persistent subscribers automatically receive a notice in response to the group being reestablished and do not need to re-subscribe to the group. | 12-11-2008 |
20080302502 | FILL HEAD FOR INJECTION MOLDING OF SOLDER - A system, method, and apparatus for injection molding conductive bonding material into a plurality of cavities in a surface are disclosed. The method comprises aligning a fill head with a surface. The mold includes a plurality of cavities. The method further includes placing the fill head in substantial contact with the surface. At least a first gas is channeled about a first region of the fill head. The at least first gas has a temperature above a melting point of conductive bonding material residing in a reservoir thereby maintaining the conductive bonding material in a molten state. The conductive bonding material is forced out of the fill head toward the surface. The conductive bonding material is provided into at least one cavity of the plurality of cavities contemporaneous with the at least one cavity being in proximity to the fill head. | 12-11-2008 |
20080294413 | PROGRAM PRODUCT SUPPORTING PHASE EVENTS IN A SIMULATION MODEL OF A DIGITAL SYSTEM - According to a method of simulation processing, an instrumented simulation executable model of a design is built by compiling one or more hardware description language (HDL) files specifying one or more design entities within the design and one or more instrumentation entities and instantiating instances of the one or more instrumentation entities within instances of the one or more design entities. Operation of the design is then simulated utilizing the instrumented simulation executable model. Simulating operation includes each of multiple instantiations of the one or more instrumentation entities generating a respective external phase signal representing an occurrence of a particular phase of operation and instrumentation combining logic generating from external phase signals of the multiple instantiations of the one or more instrumentation entities an aggregate phase signal representing an occurrence of the particular phase. | 11-27-2008 |
20080281551 | METHOD AND APPARATUS FOR THREE-DIMENSIONAL MEASUREMENTS - An apparatus and method for measuring the physical quantities of a data center during operation and method for servicing large-scale computing systems is disclosed. The apparatus includes a cart that supports a plurality of sensors. The cart is moveable within the data center. The sensors capture temperature or other physical parameters within the room. The sensor readings, along with position and orientation information pertaining to the cart are transmitted to a computer system where the data is analyzed to select the optimum temperature or other system environmental parameters for the data center. | 11-13-2008 |
20080271055 | PROTOCOL FOR COMMUNICATION OF DATA STRUCTURES - A system and method are provided for communicating information in a data structure between applications. According to the method, a description of a data structure is sent from a first application to a second application, and there is received from the second application an identification of at least one portion of the data structure that is requested by the second application. The first application marshals a subset of the data structure consisting of the at least one portion that was identified, and there is sent from the first application to the second application the marshalled subset of the data structure. | 10-30-2008 |
20080270843 | CONVOLUTION-ENCODED DATA STORAGE ON A REDUNDANT ARRAY OF INDEPENDENT DEVICES - A method, system and article of manufacture for the storing convolution-encoded data on a redundant array of independent storage devices (RAID) is described. The convolution-encoded data comprises error correction coded data to eliminate the need for parity as used in conventional RAID data storage. The number of storage devices may vary to accommodate expansion of storage capacity and provide on demand storage. | 10-30-2008 |
20080270822 | DATA REPLICA SELECTOR - There is provided a method and system for replicating data at another location. The system includes a source node that contains data in a data storage area. The source node is coupled to a network of potential replication nodes. The processor determines at least two eligible nodes in the network of nodes and determines the communication cost associated with a each of the eligible nodes. The processor also determines a probability of a concurrent failure of the source node and each of eligible nodes, and selects at least one of the eligible nodes for replication of the data located on the source node. The selection is based on the determined communication costs and probability of concurrent failure. | 10-30-2008 |
20080270821 | RECOVERING FROM ERRORS IN A DATA PROCESSING SYSTEM - A system and method of recovering from errors in a data processing system. The data processing system includes one or more processor cores coupled to one or more memory controllers. The one or more memory controllers include at least a first memory interface coupled to a first memory and at least a second memory interface coupled to a second memory. In response to determining an error has been detected in the first memory, access to the first memory via the first memory interface is inhibited. Also, the first memory interface is locally restarted without restarting the second memory interface. | 10-30-2008 |
20080266058 | UTILIZING AN RFID TAG IN MANUFACTURING FOR ENHANCED LIFECYCLE MANAGEMENT - Data associated with supply chain events for a manufactured assembly is automatically stored. In preferred embodiments the supply chain events for the manufactured assembly are stored on an RFID tag attached to the assembly as it travels through the supply chain to insure the data concerning the assembly is readily available and not separated from the assembly. In other embodiments, the supply chain events or characteristic data is stored on the RFID tag in a hierarchical structure beginning with the original state of the assembly and with additional entries for each step in the assembly process. In other embodiments, as the product undergoes rework, conversion to a different assembly, or personalizations, the new state of the assembly is stored in the RFID tag. In other preferred embodiments, other information is also stored on the RFID tag such as country of origin, failure data, cycle times and a quality status indicator. | 10-30-2008 |
20080266057 | UTILIZING AN RFID TAG IN MANUFACTURING FOR ENHANCED LIFECYCLE MANAGEMENT - Data associated with supply chain events for a manufactured assembly is automatically stored. In preferred embodiments the supply chain events for the manufactured assembly are stored on an RFID tag attached to the assembly as it travels through the supply chain to insure the data concerning the assembly is readily available and not separated from the assembly. In other embodiments, the supply chain events or characteristic data is stored on the RFID tag in a hierarchical structure beginning with the original state of the assembly and with additional entries for each step in the assembly process. In other embodiments, as the product undergoes rework, conversion to a different assembly, or personalizations, the new state of the assembly is stored in the RFID tag. In other preferred embodiments, other information is also stored on the RFID tag such as country of origin, failure data, cycle times and a quality status indicator. | 10-30-2008 |
20080256499 | USING CONSTRAINTS IN DESIGN VERIFICATION - A method for generating a constraint for generating a constraint for use in the verification of an integrated circuit design includes identifying a target in a netlist (N) of the design and creating an overapproximate abstraction (N′) of the netlist. A space state (S′) is created by enumerating the states of N′ from which the identified target may be asserted. A constraint space C′ is then derived from the state space S′, where C′ is the logical complement of S′. The process is repeated for multiple selected targets and the constraint spaces from each iteration are logically ANDed. Creating an overapproximate abstraction may include replacing a sequential gate with a random gate. Identifying a sequential gate may include selecting a target in the netlist, performing underapproximate verification of the target, and, if a spurious failure occurs, selecting a gate further down the fanin chain of the currently selected gate. | 10-16-2008 |
20080252331 | DEVICE FOR DEFEATING REVERSE ENGINEERING OF INTEGRATED CIRCUITS BY OPTICAL MEANS - A method for an electronic device is provided for preventing reverse engineering by monitoring light emissions emitted from transistors and such electrically active devices in the electronic device. The method emits extraneous randomized light emissions in substantial close proximity to the transistors to hide a pattern of light emissions emitted from the transistors. As one feature, the device can include a source of randomized light emissions in substantial close proximity to the transistors to hide a pattern of the emitted light from the transistors in randomized light emissions emitted by the source. As a second feature, the device can emit the randomized light emissions by randomly delaying an electrical signal that is electrically coupled to the transistors and, in response to the randomly delayed electrical signal, the transistors randomly emitting light emissions thereby hiding a separate pattern of light emission emitted from the transistors. | 10-16-2008 |
20080251840 | ELECTRONICALLY SCANNABLE MULTIPLEXING DEVICE - An electronically scannable multiplexing device is capable of addressing multiple bits within a volatile or non-volatile memory cell. The multiplexing device generates an electronically scannable conducting channel with two oppositely formed depletion regions. The depletion width of each depletion region is controlled by a voltage applied to a respective control gate at each end of the multiplexing device. The present multi-bit addressing technique allows, for example, 10 to 100 bits of data to be accessed or addressed at a single node. The present invention can also be used to build a programmable nanoscale logic array or for randomly accessing a nanoscale sensor array. | 10-16-2008 |
20080251289 | DEVICE FOR REPAIR OF A CONTACT PAD OF A PRINTED CIRCUIT BOARD - Methods and devices are provided for repairing a damaged contact pad that is located on a first surface of a printed circuit board and connected to a via that passes through the circuit board. According to the method, a countersink hole is created in the first surface of the printed circuit board in a location that is substantially centered on an axis passing through the via, and a replacement structure is inserted into the countersink hole. The replacement structure has a stem portion, a head portion, and a shoulder portion that connects the stem and head portions, with the angle of the shoulder portion substantially matching the angle of the shoulder of the countersink hole. The stem portion of the replacement structure is permanently attached to sidewalls of the via so as to electrically couple the head portion of the replacement structure to the via. | 10-16-2008 |
20080243887 | EXCLUSION CONTROL - An exclusion controller which allows an information processing unit to acquire a contended resource to the exclusion of the other information processing units includes a plurality of non-prioritized information processing units mutually exclusively acquiring a non-prioritized exclusion right, which indicates a candidate for acquiring the contended resource, by a first process. The exclusion controller further includes a prioritized information processing unit acquiring the contended resource by a second process, which requires a shorter processing time than the first process, to the exclusion of the non-prioritized information processing unit having acquired the non-prioritized exclusion right. | 10-02-2008 |
20080243691 | PERSONALLY CUSTOMIZABLE CREDIT CARD ACCOUNTS - Account holders may specify vendor-specific charge restrictions for charging transactions against their accounts, where each vendor-specific charge restriction includes a unique identifier for the corresponding vendor to which the charge restriction is applicable. The charge restriction may be an exclusion from approval of all charge authorization requests, an amount limit on charge authorization requests which may be approved, a “rebill” limit on the number of times subsequent charge authorization requests may be approved, or a combination of such restrictions and/or other restrictions. When a charge authorization request is received for a charge against an account having vendor-specific charge restrictions set by the account holder, the vendor identifier is extracted from the charge authorization request and employed to determine whether any charge restrictions are applicable to the requesting vendor. The vendor-specific charge restrictions for a particular vendor may be specified by the account holder either before or after an initial charge transactions involving that vendor, with the vendor identifier either manually entered by the account holder or automatically extracted from an account transaction record. | 10-02-2008 |
20080239539 | METHOD AND APPARATUS FOR THREE-DIMENSIONAL MEASUREMENTS - An apparatus and method for measuring the physical quantities of a data center during operation and method for servicing large-scale computing systems is disclosed. The apparatus includes a cart that supports a plurality of sensors. The cart is moveable within the data center. The sensors capture temperature or other physical parameters within the room. The sensor readings, along with position and orientation information pertaining to the cart are transmitted to a computer system where the data is analyzed to select the optimum temperature or other system environmental parameters for the data center. | 10-02-2008 |
20080231311 | PHYSICALLY HIGHLY SECURE MULTI-CHIP ASSEMBLY - A physically secure processing assembly is provided that includes dies mounted on a substrate so as to sandwich the electrical contacts of the dies between the dies and the substrate. The substrate is provided with substrate contacts and conductive pathways that are electrically coupled to the die contacts and extend through the substrate. Electrical conductors surround the conductive pathways. A monitoring circuit detects a break in continuity of one or more of the electrical conductors, and preferably renders the assembly inoperable. Preferably, an epoxy encapsulation is provided to prevent probing tools from being able to reach the die or substrate contacts. | 09-25-2008 |
20080229263 | PERFORMING UTILIZATION OF TRACES FOR INCREMENTAL REFINEMENT IN COUPLING A STRUCTURAL OVERAPPROXIMATION ALGORITHM AND A SATISFIABILITY SOLVER - A method, system and computer program product for performing verification are disclosed. The method includes creating and designating as a current abstraction a first abstraction of an initial design netlist containing a first target and unfolding the current abstraction by a selectable depth. A composite target is verified, using a satisfiability solver and, in response to determining that the verifying step has hit the composite target, a counterexample is examined to identify one or more reasons for the first target to be asserted. One or more refinement pairs are built by examining the counterexample and a second abstraction is built by composing the refinement pairs. A new target is built over one or more cutpoints in the first abstraction that is asserted when the one or more cutpoints assume values in the counterexample, and the new target is verified with the satisfiability solver. | 09-18-2008 |
20080229260 | STRUCTURE FOR AUTOMATED TRANSISTOR TUNING IN AN INTEGRATED CIRCUIT DESIGN - A design structure for tuning an integrated circuit design holds a reference clock signal constant across the integrated circuit design and, while the reference clock signal is held constant, optimizes transistors forming a register within the integrated circuit design and thereafter optimizes transistors forming one or more clock buffers coupled to the reference clock signal. | 09-18-2008 |
20080229193 | PROGRAM PRODUCT SUPPORTING SPECIFICATION OF SIGNALS FOR SIMULATION RESULT VIEWING - According to a method of data processing, a data set including at least one entry specifying a signal group by a predetermined signal group name is received by a data processing system. In response to receipt of the data set, the entry in the data set is processed to identify the signal group name. Signal group information associated with an event trace file containing simulation results is accessed to determine signal names of multiple signals that are members of the signal group. Simulation results from the event trace file that are associated with instances of said multiple signals are then included within a presentation of simulation results. | 09-18-2008 |
20080229108 | PRIVATE INFORMATION EXCHANGE IN SMART CARD COMMERCE - A method, system and computer program product for private information exchange in smart card commerce is disclosed. The method includes, in response to determining that an item of biometric data received on a biometric reader corresponds to an authorized user, unlocking a communication channel on a communication port, exchanging public keys between the user and authorized point of sale, receiving an information request from an external point of sale machine across the communication channel, decrypting an information request and parsing a data token. In response to determining that private data has been requested in the information request, a user is prompted for authorization to release the private information, and private information exchange in smart card commerce is performed by, in response to the user pressing a yes button on the smart card, placing an encrypted copy of the private data in the public area of the smart card for transmission across the communication channel to the external point of sale machine. | 09-18-2008 |
20080228809 | METHOD AND APPARATUS FOR GENERATNG A DYNAMIC WEB PAGE - A method and apparatus are provided for generating a dynamic web page. A structured data context is generated based on the result of a business logic process performed in response to a request from a browser, and a template associated with the request is loaded. The structured data context includes at least one dynamic data item for the dynamic web page. The template is able to be browsed by the browser and contains associated information that corresponds to the at least one dynamic data item of the structured data context. The at least one dynamic data item of the structured data context is merged into the template so as to produce the dynamic web page. | 09-18-2008 |
20080228694 | PREDICATE SELECTION IN BIT-LEVEL COMPOSITIONAL TRANSFORMATIONS - A method for performing verification includes selecting a first set containing a seed register and adding to a second set a result of a subtraction of a fanout of the first set from a fanin of the first set. A third set is rendered equal to a result of a subtraction of a fanin of the second set from a fanout of the second set, and whether a combination of the first set and the third set is equivalent to the first set is determined. In response to determining that the combination of the first set and the second set is not equivalent to the first set, a min-cut of the first set and the second set containing a minimal set of predicates between a first component and the logic to which the component fans out, wherein the logic is bordered by the second set is returned. | 09-18-2008 |
20080228602 | CREDIT CARD LOST-AND-FOUND NOTIFICATION - A method, system, and computer-usable medium for sending a first notification message to a credit card agency alerting the credit card agency of a misplaced credit card, an identification of a credit card owner, and a location of the misplaced credit card; in response to receiving the first notification message, sending a second notification message to the credit card owner corresponding to the misplaced credit card; and in response to receiving the second notification message, specifying a procedure for returning the misplaced credit card to the credit card owner. | 09-18-2008 |
20080228443 | SYSTEM AND METHOD FOR BENCHMARKING CORRELATED STREAM PROCESSING SYSTEMS - A system, method, and computer program product for benchmarking a stream processing system are disclosed. The method comprises generating a plurality of correlated test streams. A semantically related data set is embedded within each of the test streams in the plurality of correlated test streams. The plurality of correlated test streams is provided to at least one stream processing system. A summary is generated for each of the semantically related embedded data sets. A common identifier, which is transparent to the system being tested, is embedded within each stream in the plurality of correlated test streams. The common identifier is extracted from the output data set generated by the stream processing system. At least one of the stored copies of the summaries and the common identifier are compared to an output data set including a set of zero or more correlation results generated by the stream processing system. | 09-18-2008 |
20080225863 | DATA PROCESSING SYSTEM, METHOD AND INTERCONNECT FABRIC SUPPORTING MULTIPLE PLANES OF PROCESSING NODES - A data processing system includes a first plane including a first plurality of processing nodes, each including multiple processing units, and a second plane including a second plurality of processing nodes, each including multiple processing units. The data processing system also includes a plurality of point-to-point first tier links. Each of the first plurality and second plurality of processing nodes includes one or more first tier links among the plurality of first tier links, where the first tier link(s) within each processing node connect a pair of processing units in the same processing node for communication. The data processing system further includes a plurality of point-to-point second tier links. At least a first of the plurality of second tier links connects processing units in different ones of the first plurality of processing nodes, at least a second of the plurality of second tier links connects processing units in different ones of the second plurality of processing nodes, and at least a third of the plurality of second tier links connects a processing unit in the first plane to a processing unit in the second plane. | 09-18-2008 |
20080225847 | ARTICLE FOR IMPROVED NETWORK PERFORMANCE BY AVOIDING IP-ID WRAP-AROUNDS CAUSING DATA CORRUPTION ON FAST NETWORKS - The reassembly timer in a TCP/IP receiver is dynamically set to avoid data corruption on fast networks caused by IP identification wrap-around. A sender generates IP packets with a special option specifying a reassembly time for fragments based on the subnet of the destination or on the calculated round-trip time of the connection. A receiver sets the reassembly timer to the reassembly time specified in the option. A sender can generate IP packets with an alternative option setting a time stamp for the generated packet. A receiver calculates a traversal time based on the difference between the arrival time of the fragment and this time stamp, and sets the reassembly timer based on this traversal time. A receiver can independently set the reassembly timer to a first reassembly time set by the user for fast networks or to a second reassembly timer set by the user for slow networks based on whether the receiver and sender are on the same subnet. | 09-18-2008 |
20080222648 | DATA PROCESSING SYSTEM AND METHOD OF DATA PROCESSING SUPPORTING TICKET-BASED OPERATION TRACKING - A data processing system includes a plurality of processing units coupled by a plurality of communication links for point-to-point communication such that at least some of the communication between multiple different ones of the processing units is transmitted via intermediate processing units among the plurality of processing units. The communication includes operations having a request and a combined response representing a system response to the request. At least each intermediate processing unit includes one or more masters that initiate first operations, a snooper that receives at least second operations initiated by at least one other of the plurality of processing units, a physical queue that stores master tags of first operations initiated by the one or more masters within that processing unit, and a ticketing mechanism that assigns to second operations observed at the intermediate processing unit a ticket number indicating an order of observation with respect to other second operations observed by the intermediate processing unit. The ticketing mechanism provides the ticket number assigned to an operation to the snooper for processing with a combined response of the operation. | 09-11-2008 |
20080222476 | UTILIZING A NETWORK TO CORRECT FLAWED MEDIA DATA - A system and method of utilizing a network to correct flawed media data. The media device includes a processor, a memory, a network adapter, a removable media interface, an error-correction module, and a communication module. The network device enables the media device to connect to the network and server. The removable media interface enables a user to couple a removable medium to the media device. After a user inserts a removable medium into the removable media interface, the processor and error-correction module examines the removable medium for physical errors. If the number of detected errors exceeds a predetermined threshold, the media device, via the network adapter and the communication module, queries a server for correction data. This correction data may be utilized by the media device to enable successful processing of the data stored on the removable medium. | 09-11-2008 |
20080222164 | METHOD AND APPARATUS TO PROVIDE GUARANTEED DEPLOYMENT OF APPLICATIONS TO NODES IN AN ENTERPRISE - A method, system and computer program product for updating distributed applications in a multiple application-server environment, in which at least one server receives updates later than another server and update delivery is tracked by an update tracker in the form of a message history, is disclosed. In a preferred embodiment, an application will be distributed across multiple servers and will receive updates from a central repository across a network or other communication fabric. Responsive to starting an application server in the data processing system, a messaging system is contacted over a secure connection to determine whether an application update distribution occurred while the application server was unavailable to update applications, and, responsive to a determination that the application update distribution occurred, an application is received. | 09-11-2008 |
20080221956 | PROVIDING AUDIO-GUIDED DEPLOYMENT OF DATA PROCESSING SYSTEMS - A method for providing audio-guided deployment of a data processing system is disclosed. An unpack instruction related to a data processing system in a first container for audio presentation is designated, and one or more position sensors in the first container are queried to determine whether the position sensors are spatially configured for audible presentation of the unpack instruction. In response to determining that the position sensors are not spatially configured for the audible presentation of the unpack instruction, a position sensor error message is audibly presented. One or more radio frequency sensors associated with the first container are queried to determine whether the first container contents are ready for audible presentation of the instruction, and in response to determining that the first container contents are not ready for audible presentation of the unpack instruction, a radio-frequency sensor error message is audibly presented. In response to determining that the first container contents are ready for audible presentation of the unpack instruction, audio-guided deployment of the data processing system is provided by audibly presenting the unpack instruction. | 09-11-2008 |
20080215284 | APPARATUS FOR THERMAL CHARACTERIZATION UNDER NON-UNIFORM HEAT LOAD - A method and apparatus for real-time thermal characterization of a fully operating cooling device ( | 09-04-2008 |
20080214026 | ELECTRONIC ASSEMBLY HAVING AN ELECTRICAL CONNECTOR ATTACHED TO A PRINTED CIRCUIT BOARD, AND A WIRE PASSING THROUGH A THROUGH-HOLE ON THE PRINTED CIRCUIT BOARD - An electronic assembly is provided that that includes a printed circuit board, an electrical connector attached to the printed circuit board, and a wire. A first end of the wire is attached to a signal pathway of one of the wafer modules of the electrical connector so as to electrically connect the wire and the signal pathway. The wire passes through a through-hole on the printed circuit board that corresponds to the signal pathway, and a second end of the wire is electrically connected to the printed circuit board or another of the wafer modules of the electrical connector. | 09-04-2008 |
20080212641 | APPARATUS FOR THERMAL CHARACTERIZATION UNDER NON-UNIFORM HEAT LOAD - What is disclosed is an apparatus for determining the cooling characteristics of a cooling device used for transferring heat from an electronic device. The apparatus comprising a cooling device thermally coupled to a heat pipe. The heat pipe having an exposed surface for the selective application of heat thereon. A localized heat source is selectively applied to at least one region of the exposed surface. The heat source preferably capable of being varied both positionally relative to the exposed surface and in heat intensity. A heat shield is preferably positioned around the exposed surface of the heat pipe to isolate the operational cooling device from the localized heat source. A temperature detector repeatedly measures a temperature distribution across the exposed surface while the cooling device is in a heat transfer mode. The temperature distribution is then used to thermally characterize the cooling device. | 09-04-2008 |