Patent application number | Description | Published |
20080270716 | METHODS FOR ENHANCED FLIGHT DATA RECORDING - Flight data indicating a history of what has happened in a virtual memory system's programs is recorded. Memory residency of symbolic information associated with the flight data and is determined, and a determination is made whether all items needed to record the symbolic information are available without disk reads in the virtual memory system. If all items needed to record the symbolic information are available in the virtual memory system without disk reads, the symbolic information is recorded in-line at the time of recording flight data. If all items needed to record the symbolic information are not available without disk reads, only the virtual memory handles are recorded in-line at the time of recording flight data. Memory residency and disk reads may be replaced with exceed resource capacity and of excess resource such that a determination is made as to excess resources needed to determine flight data items fully and a determination is made as to whether the excess resources needed are available in the virtual memory system for resolving the flight data items fully at the time of recording flight data. | 10-30-2008 |
20130061096 | ENHANCED DUMP DATA COLLECTION FROM HARDWARE FAIL MODES - A method and system for collecting data for diagnosing a failure of a computer hardware device. After an indication of the failure of the computer hardware device that results in a full system crash is received, an address translation table of a central processing unit (CPU) of the computer hardware device is collected. A format of call stack frames of an operating system (OS) image of the computer hardware device is retrieved. Based on the collected address translation table and the retrieved format of the plurality of call stack frames, the call stack frames are retrieved and output to a computer file. | 03-07-2013 |
20130185050 | CONVERTING DATA INTO NATURAL LANGUAGE FORM - Converting technical data from field oriented electronic data sources into natural language form is disclosed. An approach includes obtaining document data from an input document, wherein the document data is in a non-natural language form. The approach includes determining a data type of the document data from one of a plurality of data types defined in a detection and conversion database. The approach includes translating the document data to a natural language form based on the determined data type. The approach additionally includes outputting the translated document data in natural language form to an output data stream. | 07-18-2013 |
20140214813 | ADJUSTING SEARCH RESULTS BASED ON USER SKILL AND CATEGORY INFORMATION - An approach for adjusting ranked search results based on user data is provided. An approach includes: receiving a search query from a search user; generating a ranked result set based on the search query; generating an adjusted ranked result set by adjusting the ranked result set based on a skill rating of the search user; and providing the adjusted ranked result set to the search user. | 07-31-2014 |
20140214881 | IDENTIFYING MISSING CONTENT USING SEARCHER SKILL RATINGS - An approach for identifying missing content is provided. An approach includes: receiving a search string; determining a skill rating associated with a searcher that generated the search string; and searching a database using the search string. The approach also includes: updating at least one of a first score associated with the search string and a second score associated with the database based on the skill rating; and generating an alert based on one of the first score exceeding a first threshold and the second score exceeding a second threshold. | 07-31-2014 |
20140223129 | KEY-BASED DATA SECURITY MANAGEMENT - Embodiments of the present invention provide an approach for memory protection at a level of granularity above a “page” level (e.g., enhancing the protection provided by a memory key-based system). The approach further provides such a level of protection at a process or task level by associating the physical page key with a virtual key that corresponds to a particular process/task. When access to the data is requested for a particular process or task, it is determined if a protection bit for the data is set, and if the physical page keys and/or virtual keys submitted pursuant to the request match that previously stored for the data and process/task. If so, access to the data is allowed for the particular process/task. | 08-07-2014 |
20140250335 | ENHANCED DUMP DATA COLLECTION FROM HARDWARE FAIL MODES - An approach is provided for collecting data for diagnosing a failure of a computer hardware device. After an indication of the failure of the computer hardware device that results in a full system crash is received, an address translation table of a central processing unit of the computer hardware device is collected. A format of call stack frames of an operating system (OS) image of the computer hardware device is retrieved. A type of the OS image is identified as being a hypervisor program image. Based on the collected address translation table, the retrieved format of the plurality of call stack frames, and the type of the OS image being a hypervisor program image, the call stack frames are retrieved and output to a computer file. | 09-04-2014 |
20140281582 | PROTECTING VISIBLE DATA DURING COMPUTERIZED PROCESS USAGE - Embodiments of the present invention provide an approach for protecting visible data during computerized process usage. Specifically, in a typical embodiment, when a computerized process is identified, a physical page key (PPK) is generated (e.g., a unique PPK may be generated for each page of data) and stored in at least one table. Based on the PPK a virtual page key (VPK) is generated and stored in at least one register. When the process is later implemented, and a request to access a set of data associated the process is received, it will be determined whether the VPK is valid (based on the PPK). Based on the results of this determination, a data access determination is made. | 09-18-2014 |
20140359628 | DYNAMICALLY ALTERING SELECTION OF ALREADY-UTILIZED RESOURCES - An approach to control workflow so that a relatively high priority work item can sometimes be automatically controlled by software to interrupt work being performed, by one or more resource unit(s), on a relatively lower priority work item. The analysis for deciding whether or not an interruption occurs depends upon interruptibility scalars (that is, interruptibility quotients and/or factors) and interruptibility threshold(s). | 12-04-2014 |
20150089332 | ERROR DETECTION AND ISOLATION - An approach to determine whether errors associated with transmitted data are associated with a transmitting device, a receiving device, and/or a connecting device that connects the transmitting device to the receiving device. The approach includes a method that includes receiving transmitted data with a buffer. The approach further includes analyzing the transmitted data which includes an error correcting process to detect errors and determine that the transmitted data has an error that requires additional analysis. The approach further includes determining that the error is associated with a receiving device, the transmitting device, or a connecting device that connects the receiving device and the transmitting device. | 03-26-2015 |