Patent application number | Description | Published |
20100306288 | REBALANCING OPERATION USING A SOLID STATE MEMORY DEVICE - Systems and methods to manage database data are provided. A particular method includes automatically identifying a plurality of storage devices. The storage devices include a first device of a first type and a second device of a second type. The first type includes a solid state memory device. The method may further identify a high priority data set of the database. A rebalancing operation is conducted that includes moving the high priority data set to the solid state memory device and substantially evening distribution of other data of the database among the storage devices. | 12-02-2010 |
20100324751 | APPARATUS, SYSTEM, AND METHOD FOR EFFICIENT USE OF MIRRORED STORAGE CLOUDS - An apparatus, system, and method are disclosed for distributing data requests between data centers. A request module receives a data operation request from a client. The data operation request corresponds to mirrored data stored at a plurality of data centers. A metadata module maintains a set of data center cooling efficiency factors for each of the plurality of data centers. Each data center cooling efficiency factor comprises data relating to operational costs of a data center. A cost reduction module compares sets of data center cooling efficiency factors for each of the plurality of data centers to select the most efficient data center from the plurality of data centers. A response module sends the data operation request to the selected data center. | 12-23-2010 |
20110077797 | COOLING SYSTEM - A method of operating a cooling system for a hardware component is disclosed. The cooling system comprises one or more cooling devices and the method comprising the steps of monitoring commands that result in one or more operations for the hardware component, detecting a command that will result in a processing intensive operation for the hardware component, and operating a cooling device to cool the hardware component, in response to the detected operation. In a preferred embodiment, following the detection of a command that will result in a processing intensive operation for the hardware component, a predefined profile for the specific operation is accessed, and the operation of the cooling device to cool the hardware component, in response to the detected operation, comprises operating the cooling device according to predefined profile. The profile can be created automatically following previous operations. | 03-31-2011 |
20110145241 | Reducing Overheads in Application Processing - A method, a system and a computer program of reducing overheads in multiple applications processing are disclosed. The method includes identifying resources interacting with each of the applications from a set of applications and grouping the applications from the set of applications, resulting in at least one application cluster, in response to the identified resources. The method further includes assigning an agent corresponding to each of the identified resources and initializing the agent corresponding to each of the identified resources. The method further includes identifying parameters associated with the identified resources, pre-processing the identified parameters for each of the identified resources, and also includes selecting a clustering means for the clustering. The method further includes computing the application clusters using the selected clustering means and the identified parameters, and also includes sharing the agents corresponding to each of the identified resources interacting with the applications in the at least one application cluster. Also disclosed are a system and a computer program for reducing overheads in multiple applications processing. | 06-16-2011 |
20110145242 | Intelligent Redistribution of Data in a Database - Embodiments of the present invention include methods, systems and computer program products. The embodiments of the present invention intelligently distribute data files within a database based upon predetermined conditions. In one embodiment, the present invention includes a computer-implemented method including, classifying a data set in response to metadata corresponding to one or more data files located on a single database; and creating a data file topology comprising a data file identifier, a data file location and a data file type. The method may also include receiving a predetermined rule directory comprising a set of features corresponding to one or more file systems; and in response to the data file topology and the predetermined rule directory, reorganizing the data set such that at least a portion of the data set is moved to one of a set of new file systems having a predetermined optimized characteristic. | 06-16-2011 |
20110161712 | COOLING APPLIANCE RATING AWARE DATA PLACEMENT - Physical storage systems dissipate large amounts of heat as a result of operations performed on data stored on the physical storage systems. Existing cooling mechanisms use cooling appliances with different cooling characteristics to dissipate the heat. However, the existing cooling mechanisms do not consider the cooling characteristics of the cooling appliances when moving/storing data, resulting in an inefficient use of the cooling appliances and a waste of power. Functionality can be implemented to identify datasets that cause generation of large amounts of heat in the associated physical storage system(s). These heat-intensive datasets can be moved to cooler physical storage system(s) that are identified based, at least in part, on cooling characteristics of the cooling appliances and a proximity of the physical storage system(s) to the cooling appliances. This can ensure that the cooling appliances with the best cooling characteristics are used to cool the most heat intensive datasets. | 06-30-2011 |
20110215900 | MOBILE DEVICE COMMUNICATIONS MANAGEMENT - Implementation of mobile device communications (MCD) management is provided. A method includes intercepting an input command received on an MCD, the command intercepted in response to detecting a presence of a fixed communications device (FCD), which is embedded in a vehicle within range of the MCD. The method also includes acquiring biometric data from a user of the MCD. The method includes determining an activity status of the vehicle. If the activity status reflects the vehicle is active, the method includes acquiring biometric data for an operator of the vehicle via a biometric scanner of the vehicle and comparing the biometric data from the vehicle with the biometric data for the user of the MCD. If the biometric data from the vehicle matches the biometric data from the MCD, the method includes retrieving an account record for the user and implementing an action specified in the account record. If the activity status reflects the vehicle is inactive, the method includes executing the command. | 09-08-2011 |
20110296183 | AUTHENTICATION IN DATA MANAGEMENT - Systems and methods for authentication in a data management system are provided. In one embodiment, the method comprises identifying a plurality of data ciphers based on a pre-defined set of properties associated with a plurality of data sources; and generating an authentication response having at least a subset of the identified plurality of data ciphers, wherein the authentication response authenticates access to at least some data sources from among the plurality of data sources. | 12-01-2011 |
20120016708 | DYNAMIC MANAGEMENT OF INVITATIONS TO A MEETING UTILIZING A CASCADED TIER OF POTENTIAL INVITEES - A computer implemented method dynamically manages invitations to a meeting. A first tier of potential invitees to a meeting and a second tier of potential invitees to the meeting are defined. Members of the second tier of potential invitees have been predetermined to have a lower need to attend the meeting than members of the first tier of potential invitees. Invitations for the meeting are first transmitted to members of the first tier of potential invitees. Invitation acceptance responses are received, and if they fail to reach a predetermined level such that resources for the meeting will be underutilized, additional invitations for the meeting are transmitted to members of the second tier of potential invitees. | 01-19-2012 |
20120059803 | DISK SCRUBBING - A method, a system, and a computer program product are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. If a mismatch is determined between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison. | 03-08-2012 |
20120078843 | ENHANCING DATA STORE BACKUP TIMES - Provided are techniques for selecting a first group of indexes to form a current generation of indexes, selecting indexes from the first group biased to indexes with higher fitness values from the current generation of indexes, forming sub-groups of indexes using the selected indexes, determining fitness values of each of the sub-groups based on the fitness value of each of the indexes, selecting a subset of the sub-groups; and placing the indexes in the selected sub-groups into a new generation of indexes. | 03-29-2012 |
20120078858 | De-Duplicating Data in a Network with Power Management - A method, computer system, and computer program product for managing copies of data objects in a network data processing system. The computer system identifies copies of a data object stored on storage devices. The computer system places the storage devices into groups. Each storage device in a group has a smallest distance from the storage device to a center location for the group as compared to distances to center locations for other groups within the groups. The computer system selects a portion of the copies of the data object for removal from the storage devices based on a management of power for the storage devices such that remaining set of storage devices in each group is capable of handling concurrent requests that have been made historically for the copies of the data object. The computer system removes the portion of the copies of the data object from the storage devices. | 03-29-2012 |
20120089774 | METHOD AND SYSTEM FOR MITIGATING ADJACENT TRACK ERASURE IN HARD DISK DRIVES - A method, system, and computer program product for mitigating adjacent track erasures in hard disks, includes: determining input/output (I/O) characteristics for a plurality of blocks on a hard disk; assigning the plurality of blocks to a plurality of categories of I/O characteristics by the processor; and clustering content of the blocks assigned to the same category in one or more continuous tracks on the hard disk. Each block is assigned to one category. Blocks with similar I/O characteristics are clustered on one or more continuous tracks. By performing this clustering, blocks with a high number of I/O operations are grouped and stored on fewer tracks than if they were scattered across numerous tracks. This reduces the number of tracks experiencing a high number of I/O operations, and in turn, the amount of refreshing of adjacent tracks is reduced. | 04-12-2012 |
20120110044 | DATA STORAGE IN A CLOUD - Methods and systems for managing storage of data in a cloud by receiving a request, wherein the request includes information to store data within a cloud, environment comprising a plurality of data storages coupled to each other over a network; routing the data to be stored within a specific location of storage within the cloud environment by checking for any regulatory compliance. Other embodiments are also disclosed. | 05-03-2012 |
20120113786 | SMART OPTIMIZATION OF TRACKS FOR CLOUD COMPUTING - Optimization of tracks on a hard disk includes: determining I/O characteristics for data clusters to be stored on the hard disk; generating a set of solutions for each possible placement configuration; for each solution, calculating a plurality of cost functions using the I/O characteristics for the plurality of data clusters; for each solution, calculating a membership value using the cost function values; for each solution, calculating a fitness value using the membership value; retaining the solutions with the fitness value greater than a predetermined threshold; determining whether at least one stopping condition has been met; if not, adding new solutions to the retained solutions to generate the next set of solutions; and repeating the calculating the membership value, the calculating the fitness value, and the retaining the solutions with the fitness value greater than the predetermined threshold until at least one stopping condition has been met. | 05-10-2012 |
20120131159 | METHOD AND SYSTEM FOR REDUCING MESSAGE PASSING FOR CONTENTION DETECTION IN DISTRIBUTED SIP SERVER ENVIRONMENTS - A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved. | 05-24-2012 |
20120150925 | Proactive Method for Improved Reliability for Sustained Persistence of Immutable Files in Storage Clouds - Embodiments are disclosed for storing an immutable file in cloud disk space determined to be suitable for the length of time the file specified to be maintained. This is done by detecting the immutable status of a data file to be saved and determining an expiry date of said immutable file. The available cloud storage space is analyzed to determine suitable storage locations, and the immutable data file is stored in the location determined to be optimal that accommodates the expiry date of the immutable file. | 06-14-2012 |
20120179922 | POWER MANAGEMENT IN LINK AGGREGATION FOR DATA TRANSMISSION - A data query instruction for execution is received, wherein execution of the data query instruction is to cause a data transfer into or from a data warehouse. The data warehouse includes data servers that are communicatively coupled for data transfer through a link aggregation group having at least two data links. Responsive to receiving the data query instruction and prior to or at least partially overlapping with execution of the data query instruction to cause the data transfer, which of the number of data servers are to receive or transmit data as part of the data transfer is identified; for each of the identified data servers, a minimum number of the at least two data links that are needed for the data transfer are identified; and if inactive, the minimum number of the at least two data links for each of the identified data servers are activated. | 07-12-2012 |
20120191701 | DATABASE INDEX PROFILE BASED WEIGHTS FOR COST COMPUTATION - Database tables can have different types of database indices defined for the database tables and different numbers of database indices. The efficiency of reading the indexes can vary with the different profiles of the indexes, which impacts the costs of access plans that use the indexes. Weights can be predefined to reflect the relative efficiencies of the different characteristics. Costs can be computed in accordance with a variety of techniques (e.g., based on edge traversals). The weights can be predefined to reduce costs, increase costs, or a combination thereof. A database management application or associated application or program can also refine or revise these weights based on statistical data gathered about the operation of the database and/or heuristics that are developed based on observations/research. The corresponding weights can be adjusted accordingly. | 07-26-2012 |
20120191702 | INTELLIGENT ADAPTIVE INDEX DENSITY IN A DATABASE MANAGEMENT SYSTEM - Adaptive index density in a database management system is provided, which includes receiving a number of partitions for an index for a database table, the index subject to creation. The adaptive index density also includes selecting a column from the database table, the column selected based upon an estimated frequency of execution of database queries for the column. The adaptive index density further includes calculating an estimated cost of executing each of the database queries for the column, and determining data to reside in each of the partitions of the index responsive to the estimated cost. | 07-26-2012 |
20120200737 | Content Storage Management in Cameras - An embodiment of the invention includes a method for managing media files created by a digital camera. More specifically, a content analyzing module tags a media file with one or more location media tags, event media tags, and/or content media tags. The location media tags are indicative of the geographic location where the media file was created. The event media tags are indicative of an event where the media file was created; and, the content media tags are indicative of individual(s) in the media file. A priority analyzing module connected to the content analyzing module determines a priority of the media file based on priority rules and the location media tags, event media tags, and/or the content media tags. A storage management module connected to the priority analyzing module stores the media file based on the determined priority. | 08-09-2012 |
20120202604 | Smarter Health Conscious Electroshock Device with Medical Implant Detection - An embodiment of the invention includes a device including at least one probe for delivering an electrical shock to a subject when the probe is in physical contact with the subject. A power source is connected to the probe for providing electrical power to the probe upon actuation of a trigger. The device further includes a medical device sensor for detecting signals emitted from a medical device present in the subject. In at least one embodiment, an alarm is connected to the medical device sensor, wherein the alarm provides an audio and/or a visual alert when the medical device sensor detects signals emitted from the medical device. In at least one embodiment, an override mechanism is connected to the medical device sensor, wherein the override mechanism prevents actuation of the trigger when the medical device sensor detects signals emitted from the medical device. | 08-09-2012 |
20120203402 | Intelligent Railway System for Preventing Accidents at Railway Passing Points and Damage to the Rail Track - An embodiment of the invention provides a method for controlling access to content in a social networking website, wherein a connection is established between a first user and a second user on the social networking website. Content on the profile pages of the first user is categorized into a first content category and a second content category. The first content category includes content created before the connection between the first user and the second user was established. The second content category includes content created after the connection between the first user and the second user was established. Content in the first content category is also categorized into a first subcategory and at least one second subcategory. Access by the second user is restricted to the first content category. Specifically, the second user is prevented from viewing content in the first subcategory and permitted to view content in the second subcategory. | 08-09-2012 |
20120203741 | ENHANCING DATA STORE BACKUP TIMES - Provided are techniques for selecting a first group of indexes to form a current generation of indexes, selecting indexes from the first group biased to indexes with higher fitness values from the current generation of indexes, forming sub-groups of indexes using the selected indexes, determining fitness values of each of the sub-groups based on the fitness value of each of the indexes, selecting a subset of the sub-groups; and placing the indexes in the selected sub-groups into a new generation of indexes. | 08-09-2012 |
20120209802 | POWER MANAGEMENT IN LINK AGGREGATION FOR DATA TRANSMISSION - A method includes receiving a data query instruction for execution, wherein execution of the data query instruction is to cause a data transfer into or from a data warehouse. The data warehouse includes data servers that are communicatively coupled for data transfer through a link aggregation group having at least two data links. Responsive to receiving the data query instruction and prior to or at least partially overlapping with execution of the data query instruction to cause the data transfer, the method includes identifying which of the number of data servers are to receive or transmit data as part of the data transfer; identifying, for each of the identified data servers, a minimum number of the at least two data links that are needed for the data transfer; and activating, if inactive, the minimum number of the at least two data links for each of the identified data servers. | 08-16-2012 |
20120215455 | System and Method for Medical Diagnosis Using Geospatial Location Data Integrated with Biomedical Sensor Information - In at least one embodiment, a method and system for accumulating geospatial location data and biomedical data for an individual during his/her travels is provided. In at least one embodiment, a device uses at least one location signal to determine geospatial data and receives a plurality of biomedical signals with both data types being stored for possible later retrieval for providing a diagnosis for the individual if a medical condition arises. An embodiment of the invention provides a method of operation of a device having at least a memory and a communications module where the method includes receiving at least one location signal with the communications module; storing geospatial data obtained at least from the at least one location signal with a time stamp in memory; receiving a plurality of biomedical signals over time from at least one sensor with the communications module; storing biomedical data from the received biomedical signal with a time stamp in memory; and repeating the receiving at least one location signal and storing geospatial data from the at least one location signal in different geographic locations. | 08-23-2012 |
20120221478 | TARGETED INFORMATION DISSEMINATION BASED ON AIRPORT GATE-SPECIFIC UTILIZATION - Implementing targeted information dissemination based on gate-specific utilization includes collecting gate-specific utilization characteristics for an airport gate, the airport gate associated with a display device. Traveler data is collected for the airport gate and is aggregated. The implementation of targeted information dissemination includes identifying a pattern from aggregated traveler data, and disseminating information to the display device. The pattern is designated with an association with the information for dissemination. | 08-30-2012 |
20120239631 | DISK SCRUBBING - A method, a system, and a computer-readable storage medium are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. Upon determining a mismatch between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison. | 09-20-2012 |
20120284314 | JOURNALING AND INTEGRITY IN MOBILE CLOUDED COLLABORATIVE SPACES - Methods and systems for journaling and integrity in mobile clouded collaborative spaces are provided. A method includes receiving input data of a mobile device, caching the input data to a remote device, and receiving information associated with the mobile device. The method further includes sending a journaling mode command to the mobile device which instructs the mobile device to journal the input data, based on the information associated with the mobile device. | 11-08-2012 |
20120284527 | METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING - Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk. | 11-08-2012 |
20120330927 | INTELLIGENT ADAPTIVE INDEX DENSITY IN A DATABASE MANAGEMENT SYSTEM - Adaptive index density in a database management system is provided, which includes receiving a number of partitions for an index for a database table, the index subject to creation. The adaptive index density also includes selecting a column from the database table, the column selected based upon an estimated frequency of execution of database queries for the column. The adaptive index density further includes calculating an estimated cost of executing each of the database queries for the column, and determining data to reside in each of the partitions of the index responsive to the estimated cost. | 12-27-2012 |
20130007044 | RELIANCE ORIENTED DATA STREAM MANAGEMENT SYSTEM - A computer-implemented method comprises receiving a plurality of data streams into a data stream management system, wherein each data stream is obtained from a data streaming source and a reliance level is associated with each of the data streaming sources. When a continuous query is registered that specifies a reliance level attribute, the query is executed over the plurality of data streams using only those data streams obtained from a data streaming source associated with a suitable reliance level. For example, the reliance level attribute may establish a minimum reliance level, such that data stream having a lesser reliance level are not used. CQL may be enhanced with such an extra attribute which allows end users to specify the desired reliance level when submitting a query. | 01-03-2013 |
20130013652 | Proactive Method for Improved Reliability for Sustained Persistence of Immutable Files in Storage Clouds - Embodiments are disclosed for storing an immutable file in cloud disk space determined to be suitable for the length of time the file specified to be maintained. This is done by detecting the immutable status of a data file to be saved and determining an expiry date of said immutable file. The available cloud storage space is analyzed to determine suitable storage locations, and the immutable data file is stored in the location determined to be optimal that accommodates the expiry date of the immutable file. | 01-10-2013 |
20130080621 | HYBRID STORAGE DEVICES - Systems and methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method and system is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution. | 03-28-2013 |
20130120140 | SYSTEM AND METHOD FOR MEDICAL DIAGNOSIS USING GEOSPATIAL LOCATION DATA INTEGRATED WITH BIOMEDICAL SENSOR INFORMATION - In at least one embodiment, a method and system for accumulating geospatial location data and biomedical data for an individual during his/her travels is provided. In at least one embodiment, a device uses at least one location signal to determine geospatial data and receives a plurality of biomedical signals with both data types being stored for possible later retrieval for providing a diagnosis for the individual if a medical condition arises. An embodiment of the invention provides a method of operation of a device having at least a memory and a communications module where the method includes receiving at least one location signal with the communications module; storing geospatial data obtained at least from the at least one location signal with a time stamp in memory; receiving a plurality of biomedical signals over time from at least one sensor with the communications module; storing biomedical data from the received biomedical signal with a time stamp in memory; and repeating the receiving at least one location signal and storing geospatial data from the at least one location signal in different geographic locations. | 05-16-2013 |
20130151701 | METHOD FOR ALLOCATING A SERVER AMONGST A NETWORK OF HYBRID STORAGE DEVICES - Methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution. | 06-13-2013 |
20130211862 | AGGREGATED ADVERTISING - A server may receive a first check-in corresponding to at least one person, wherein a check-in is a indication of presence. The server may receive a second check-in to form an aggregation of people. The server may characterize the aggregation based on the cumulative characteristics selected from at least one of the group consisting of age, marital status, and parental status associated with at least one of the first check-in and second check-in to form an aggregated population characteristic. The server may select at least one advertisement based on the aggregated population characteristic. The server may dispatch the at least one advertisement. | 08-15-2013 |
20130282771 | SYSTEM AND METHOD FOR OPTIMIZING DATA REMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 10-24-2013 |
20130293980 | METHOD AND SYSTEM FOR MITIGATING ADJACENT TRACK ERASURE IN HARD DISK DRIVES - A method, system, and computer program product for mitigating adjacent track erasures in hard disks, includes: determining input/output (I/O) characteristics for a plurality of blocks on a hard disk; assigning the plurality of blocks to a plurality of categories of I/O characteristics by the processor; and clustering content of the blocks assigned to the same category in one or more continuous tracks on the hard disk. Each block is assigned to one category. Blocks with similar I/O characteristics are clustered on one or more continuous tracks. By performing this clustering, blocks with a high number of I/O operations are grouped and stored on fewer tracks than if they were scattered across numerous tracks. This reduces the number of tracks experiencing a high number of I/O operations, and in turn, the amount of refreshing of adjacent tracks is reduced. | 11-07-2013 |
20130293981 | SMART OPTIMIZATION OF TRACKS FOR CLOUD COMPUTING - Optimization of tracks on a hard disk includes: determining I/O characteristics for data clusters to be stored on the hard disk; generating a set of solutions for each possible placement configuration; for each solution, calculating a plurality of cost functions using the I/O characteristics for the plurality of data clusters; for each solution, calculating a membership value using the cost function values; for each solution, calculating a fitness value using the membership value; retaining the solutions with the fitness value greater than a predetermined threshold; determining whether at least one stopping condition has been met; if not, adding new solutions to the retained solutions to generate the next set of solutions; and repeating the calculating the membership value, the calculating the fitness value, and the retaining the solutions with the fitness value greater than the predetermined threshold until at least one stopping condition has been met. | 11-07-2013 |
20130339279 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a data size of a defined retrieval pattern is larger than a permissible memory resource threshold. | 12-19-2013 |
20140019784 | COOLING APPLIANCE RATING AWARE DATA PLACEMENT - A dataset is identified as a heat-intensive dataset based, at least in part, on the dataset being related to heat generation at a source storage device exceeding a heat rise limit. The source storage device hosts the heat-intensive dataset and the heat-intensive dataset comprises non-executable data. A first cooling area of a plurality of cooling areas is selected to accommodate the heat generation based, at least in part, on cooling characteristics of a plurality of cooling appliances of the plurality of cooling areas. The source storage device is associated with a second cooling area. A target storage device associated with the first cooling area is determined. The heat-intensive dataset is moved from the source storage device to the target storage device. | 01-16-2014 |
20140250089 | SYSTEM AND METHOD FOR OPTIMIZING DATA REMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 09-04-2014 |
20140310261 | DATABASE INDEX PROFILE BASED WEIGHTS FOR COST COMPUTATION - Database tables can have different types of database indices defined for the database tables and different numbers of database indices. The efficiency of reading the indexes can vary with the different profiles of the indexes, which impacts the costs of access plans that use the indexes. Weights can be predefined to reflect the relative efficiencies of the different characteristics. Costs can be computed in accordance with a variety techniques (e.g., based on edge traversals). The weights can be predefined to reduce costs, increase costs, or a combination thereof. A database management application or associated application or program can also refine or revise these weights based on statistical data gathered about the operation of the database and/or heuristics that are developed based on observations/research. The corresponding weights can be adjusted accordingly. | 10-16-2014 |
20150032678 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by monitoring usage of a data retrieval point with respect to a defined unit of work. A multilayer feed-forward neural network is used to predict, as a function of training sets composed of historical data generated by the monitored usage of the data retrieval point, a future value of a data size of results from an eager fetch setting for the data retrieval point. The eager fetch is automatically revised to a lazy fetch setting in response to determining that the future data size value of the eager fetch setting results is larger than a permissible memory resource threshold. | 01-29-2015 |
20150193467 | VIRTUAL NODE SUBPOOL MANAGEMENT - Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module. | 07-09-2015 |
20150215341 | METHOD AND SYSTEM FOR REDUCING MESSAGE PASSING FOR CONTENTION DETECTION IN DISTRIBUTED SIP SERVER ENVIRONMENTS - A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved. | 07-30-2015 |
Patent application number | Description | Published |
20110145283 | INTELLIGENT MECHANISM FOR IDENTIFYING ONTOLOGICAL HYPERTEXT AND PRE-FETCHING AND PRESENTING THE TARGET INFORMATION - A computer implemented method for identifying ontological hypertext and pre-fetching and presenting the target information may include receiving an original query by a database server. The method may also include searching the database server to locate an ontological mapping record. The ontological mapping record may represent an association between information responsive to the original query and related information associated by ontological hypertext. The method may further include presenting information responsive to the original query and the related information. | 06-16-2011 |
20110161121 | Method, System, and Article for Management of Travel - A method, system, and article for management of travel and travel related matters. Both a source and a designation are selected, together with the associated departure and arrival information and the mode of transportation. A geographic region affected by a health related event is identified, and then employed to determine if a craft in support of the selected travel has been or is intended to be in the identified region. Exposure to the identified health related event may be mitigated by supporting an amendment to the mode of transportation. | 06-30-2011 |
20110295666 | OPERATIONAL MANAGEMENT OF MULTI-MEDIA GAMING DEVICES - Operational management of a multi-media system includes assessing end user performance with respect to operation of a multi-media device in the multi-media system. Upon determining a performance value derived from assessment of the end user performance exceeds a pre-defined threshold value, the operational management further includes identifying accommodation options that specify modifications to the operation of the multi-media device and/or operations of another multi-media device in the multi-media system that is engaged in a media activity concurrent with the end user of the multi-media device. | 12-01-2011 |
20110320865 | DEDUPLICATION IN A HYBRID STORAGE ENVIRONMENT - Deduplication in a hybrid storage environment includes determining characteristics of a first data set. The first data set is identified as redundant to a second data set and the second data set is stored in a first storage system. The deduplication also includes mapping the characteristics of the first data set to storage preferences, the storage preferences specifying storage system selections for storing data sets based upon attributes of the respective storage systems. The deduplication further includes storing, as a persistent data set, one of the first data set and the second data set in one of the storage systems identified from the mapping. | 12-29-2011 |
20120059937 | BANDWIDTH ALLOCATION MANAGEMENT - Bandwidth allocation management includes determining current available bandwidth of a network within which a computer system is operating. The bandwidth allocation management also includes using the current available bandwidth and applied feature delivery settings to determine an adjustment in feature delivery to the computer system. At least a portion of the feature delivery settings is specified by an end user of the computer system. | 03-08-2012 |
20120072230 | IDENTIFICATION AND NULLIFICATION OF SUBSTANCES - Substance identification and nullification processes are provided. A process includes identifying a substance on an object, the substance determined to be associated with a health risk. The process also includes identifying a treatment plan for nullifying the substance, the treatment plan prescribing a solution and instructions for nullifying the substance using the solution. The process further includes preparing the solution identified in the treatment plan, and implementing the treatment plan with respect to the object. | 03-22-2012 |
20120123984 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Embodiments of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a datasize of a defined retrieval pattern is larger than a permissible memory resource threshold. | 05-17-2012 |
20120136907 | VIRTUAL NODE SUBPOOL MANAGEMENT - Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module. | 05-31-2012 |
20130036100 | DEDUPLICATION IN NETWORK STORAGE WITH DATA RESIDENCE COMPLIANCE - Deduplication in a network storage environment includes, for files stored in a network, determining a location constraint status specified by a compliance agreement for each of the files. Location constraint statuses include a location of persistent residency and no residency restriction. Deduplication also includes selecting a file from the files in the network and identifying corresponding redundant files, the selected file and the corresponding redundant files representing a set. Deduplication further includes determining the location constraint status for each of the files in the set. For the files in the set having a location constraint status specifying a location of persistent residency, the deduplication includes retaining a master copy at the respective location of persistent residency, and removing the corresponding redundant files from the network. | 02-07-2013 |
20130103372 | SPECIFYING REUSABLE PROCESS MODELS - A method and system for specifying a reusable process model. Sub-processes of a base process are identified as having a potential to be modified. By filling in values in a configurable pattern applied to each identified sub-process, dynamic categories are mapped to the identified sub-processes, thereby allowing the sub-processes to be reusable. A change to business requirements occurs, where the base process is based on the business requirements. Based on the change to the business requirements, a change to the values in the configurable pattern applied to a sub-process is received. The change to the values in the configurable pattern does not require a change to the base process. | 04-25-2013 |
20130290387 | VIRTUAL NODE SUBPOOL MANAGEMENT - Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module. | 10-31-2013 |