International Buisness Machines Corporation Patent applications |
Patent application number | Title | Published |
20150317273 | PEER-TO-PEER NETWORKING THROUGH UNIVERSAL PORT CONNECTIONS - Embodiments relate to two general purpose computers connected in a peer-to-peer mode by connecting a cable (or wireless connection) between universal ports (e.g., PCIe ports) on each computer. A timing protocol utility runs on each computer to time schedule operations performed by its respective computer. Because the system clocks on each peer computer operate independently (asynchronously), they may vary somewhat from each other. To support time synchronized peer-to-peer operations, paired clock value (one for each peer computer) are generated continually and independently by each peer system. Each peer system periodically supplies the paired clock values to its associated timing protocol utility, which uses the paired clock values to time synchronize peer-to-peer computer operations. The timing protocol utilities may also exchange the paired clock values with each other for integrity checking and other operations. | 11-05-2015 |
20150309823 | ADMINISTERING VIRTUAL MACHINES IN A DISTRIBUTED COMPUTING ENVIRONMENT - In a distributed computing environment that includes hosts that execute a VMM, with each VMM supporting execution of one or more VMs, administering VMs may include: assigning, by a VMM manager, the VMMs of the distributed computing environment to a logical tree topology, including assigning one of the VMMs as a root VMM of the tree topology; and executing, amongst the VMMs of the tree topology, a scatter operation, including: pausing, by the root VMM one or more executing VMs; storing, by the root VMM in a buffer, a plurality of VMs to scatter amongst the other VMMs of the tree topology; and sending, by the root VMM, to each of the other VMMs of the tree topology a different one of the VMs stored in the buffer. | 10-29-2015 |
20150242872 | MANAGING MARKETING IMPRESSIONS WITH CONSUMER REWARDS - A method, apparatus, and computer program product for managing marketing impressions. An apparatus identifies utility of a seller and utility of a user. The apparatus generates an offer of a reward based on the utility of the seller and the utility of the user. The offer of the reward is for performing a social marketing task. The social marketing task is for generating a first number of marketing impressions to achieve a set of objectives of the seller. The apparatus activates the reward for the user when the social marketing task is completed. The social marketing task is completed when the apparatus determines that the user has accepted the offer and the performing of the social marketing task has generated the first number of marketing impressions. | 08-27-2015 |
20130023273 | PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A caller telecommunication device transmits a call to an intended receiving wireless telecommunication device. In response, the caller telecommunication device transmits an instruction to a first proximate telecommunication device, wherein the instruction directs the first proximate telecommunication device to determine if the first proximate telecommunication device is within a predefined proximity of the intended receiving wireless telecommunication device. The predefined proximity is a distance within which the intended receiving wireless telecommunication device and other wireless telecommunication device can directly communicate by local signals. The caller communication device re-routes the call to the first proximate telecommunication device if the first proximate telecommunication device is within the predefined proximity of the intended receiving wireless telecommunication device. | 01-24-2013 |
20120278867 | SYSTEM FOR ONLINE COMPROMISE TOOL - An Activity Access Control (AAC) utility controls access to applications and devices by allowing an administrator to set terms of use/access regarding a applications and/or devices for a group of users, whose activity are monitored. The AAC utility also enables administrator and user access to a compromise facility via a centralized access point to establish or request changes to the terms of use/access. The AAC utility allows the administrator to dynamically update information and set terms based on real-time information collected during activity monitoring. Dynamic updates may also occur based on the monitored user's request, the priority of the requesting user(s), historical data, occurrence of a special event, completion of other internal or/external tasks, and/or pre-set limitations or thresholds. In addition, the AAC utility facilitates the real-time display or publishing of the terms of use, status information, and statistical information to users and the administrator. | 11-01-2012 |
20120219125 | Embedded Biometrics in Telecommunication Devices for Feature Extraction and Context Identification - A method, a system and a computer program product for determining one or more characteristics of a caller, utilizing the biometric characteristics of the caller. One or more biometric characteristics are detected when a request to place an outgoing call to one or more destinations is received at a first telecommunication device. When the request to place an outgoing call is a verbal request, one or more biometric voice samples are obtained. The biometric voice samples comprise the biometric characteristics of the caller. The biometric characteristics are extracted from the biometric voice samples, encoded into a datagram, and transmitted from the first telecommunication device to the outgoing call destination (i.e. a second telecommunication device). When the biometric characteristics are analyzed at the second telecommunication device, a display is generated depicting the mood, gender, age, urgency or other characteristics of the caller associated with the incoming call. | 08-30-2012 |
20120216159 | VERIFICATION TECHNIQUES FOR LIVENESS CHECKING OF LOGIC DESIGNS - A technique for verification of a logic design using a liveness-to-safety conversion includes assigning liveness gates for liveness properties of a netlist and assigning a single loop gate to provide a loop signal for the liveness gates. Assertion of the single loop gate is prevented when none of the liveness gates are asserted. A first state of the netlist is sampled and the sampled first state provides an initial state for a first behavioral loop for at least one of the liveness gates following the assertion of the single loop gate. The sampled first state of the first behavioral loop is compared with a later state of the first behavioral loop to determine if the sampled first state is repeated. A liveness violation is returned when the sampled first state is repeated and an associated one of the liveness gates remains asserted for a duration of the first behavioral loop. | 08-23-2012 |
20120192133 | LOGIC DESIGN VERIFICATION TECHNIQUES FOR LIVENESS CHECKING WITH RETIMING - A technique for verification of a retimed logic design using liveness checking includes assigning a liveness gate to a liveness property for an original netlist and assigning a fairness gate to a fairness constraint for the original netlist. In this case, the fairness gate is associated with the liveness gate and is asserted for at least one time-step during any valid behavioral loop associated with the liveness gate. The original netlist is retimed, using a retiming engine, to provide a retimed netlist. The liveness and fairness gates of the retimed netlist are retimed such that a lag of the fairness gate is no greater than a lag of the liveness gate. Verification analysis is then performed on the retimed netlist. Finally, when the verification analysis yields a valid counter-example trace for the retimed netlist, a liveness violation for the original netlist is returned. | 07-26-2012 |
20120167024 | METHOD AND SYSTEM FOR SCALABLE REDUCTION IN REGISTERS WITH SAT-BASED RESUBSTITUTION - A method, system, and computer program product for reducing the size of a logic network design, prior to verification of the logic network design. The method includes eliminating registers to reduce the size of the logic network design; thereby, increasing the speed and functionality of the verification process, and decreasing the size of the logic network design. The system identifies one or more compatible resubstitutions of a selected register, wherein the compatible resubstitution expresses the selected register as one or more pre-existing registers of fixed initial state. The resubstitutions are refined utilizing design invariants. When one more resubstitutions are preformed, the system eliminates the selected registers to reduce the size of the logic network design. As a result of the resubstitution process, a logic network design of reduced size is generated. | 06-28-2012 |
20110047350 | PARTITION LEVEL POWER MANAGEMENT USING FULLY ASYNCHRONOUS CORES WITH SOFTWARE THAT HAS LIMITED ASYNCHRONOUS SUPPORT - A partition that is executed by multiple processing nodes. Each node includes multiple cores and each of the cores has a frequency that can be set. A first frequency range is provided to the cores. Each core, when executing the identified partition, sets its frequency within the first frequency range. Frequency metrics are gathered from the cores running the partition by the nodes. The gathered frequency metrics are received and analyzed by a hypervisor that determines a second frequency range to use for the partition, with the second frequency range being different from the first frequency range. The second frequency range is provided to the cores at the nodes executing the identified partition. When the cores execute the identified partition, they use a frequencies within the second frequency range. | 02-24-2011 |
20100332871 | CAPPING POWER CONSUMPTION IN A DATA STORAGE SYSTEM - A method for capping power consumption in a data storage system is provided. The method comprises associating a power quota with a first storage medium, wherein the power quota limits amount of power consumed by the first storage medium within a given time interval; receiving a request to perform an input/output (I/O) operation on the first storage medium; and servicing the request within power limits defined by the power quota. | 12-30-2010 |
20100332693 | DIRECT MEMORY ACCESS IN A COMPUTING ENVIRONMENT - A method of address translation in a computing system providing direct memory access (DMA) by way of one or more remote memory management units (MMUs) is provided. The method comprises intercepting a request for a first DMA operation forwarded by a first device to a second device; and translating a guest address included in the request to a first address according to a mapping referencing a memory frame in a memory of the second device. A local MMU increments a first reference count indicating number of active DMA operations directed to the memory frame and a second reference count indicating number of remote MMUs that have mapped the memory frame. | 12-30-2010 |
20100306737 | Techniques for Providing Environmental Impact Information Associated With Code - A technique for providing environmental impact information associated with code includes determining, based on execution of the code on a computer system, an environmental impact of a code execution sequence included in the code. A section of the code that is associated with the code execution sequence is then annotated with environmental impact information associated with the environmental impact of the code execution sequence. | 12-02-2010 |
20100289620 | CONNECTIONLESS LOCATION IDENTIFICATION WITHIN A SERVER SYSTEM - A method, system, and computer program product for determining connectionless location identification information of devices within a server system. A Radio Frequency Identification (RFID) Controller within the server system transmits a location request to a RFID Sensor. The RFID Sensor identifies devices in the server system and returns signal strength and location information of the devices to the Embedded Controller. The Embedded Controller calculates its own current location. Signal strength information is interpreted by the Embedded Controller to calculate location information. After calculating its own current location, the Embedded Controller locally stores the current location. The location information is subsequently transmitted to a Support element. The Support Element calculates a fix IP address for the Embedded Controller based on the location information, and assigns the IP address to the Embedded Controller. The location information is used for later communication with that Embedded Controller. | 11-18-2010 |
20100281224 | PREFETCHING CONTENT FROM INCOMING MESSAGES - A method, system, and computer program product for prefetching content from incoming messages. A computer receives an incoming message containing one or more resource links. The computer may then determine if the resource links contained in the incoming message are likely to be accessed. In response to determining that one or more of the resource links are likely to be accessed, the logic determines if the target content of the resource link has previously been cached, and if any previously cached data is current. In response to determining that the requested content has not previously been cached, or is not current, the logic begins downloading the requested content for local consumption. When the cached content is requested, the cached data is provided to the user. Upon receiving requests for the cached content from other connected client terminals, the cached content may also be served to the other requesting client terminals. | 11-04-2010 |
20100269119 | EVENT-BASED DYNAMIC RESOURCE PROVISIONING - Disclosed are a method, a system and a computer program product for automatically allocating and de-allocating resources for jobs executed or processed by one or more supercomputer systems. In one or more embodiments, a supercomputing system can process multiple jobs with respective supercomputing resources. A global resource manager can automatically allocate additional resources to a first job and de-allocate resources from a second job. In one or more embodiments, the global resource manager can provide the de-allocated resources to the first job as additional supercomputing resources. In one or more embodiments, the first job can use the additional supercomputing resources to perform data analysis at a higher resolution, and the additional resources can compensate for an amount of time the higher resolution analysis would take using originally allocated supercomputing resources. | 10-21-2010 |
20100268896 | TECHNIQUES FOR CACHE INJECTION IN A PROCESSOR SYSTEM FROM A REMOTE NODE - A technique for performing cache injection in a processor system includes monitoring, by a cache, addresses on a bus. Input/output data associated with an address of a data block stored in the cache is then requested from a remote node, via a network controller. Ownership of the input/output data is acquired by the cache when an address on the bus that is associated with the input/output data corresponds to the address of the data block stored in the cache. | 10-21-2010 |
20100268888 | PROCESSING A DATA STREAM BY ACCESSING ONE OR MORE HARDWARE REGISTERS - Disclosed are a method, a system, and a program product for processing a data stream by accessing one or more hardware registers of a processor. In one or more embodiments, a first program instruction or subroutine can associate a hardware register of the processor with a data stream. With this association, the hardware register can be used as a stream head which can be used by multiple program instructions to access the data stream. In one or more embodiments, data from the data stream can be fetched automatically as needed and with one or more patterns which may include one or more start positions, one or more lengths, one or more strides, etc. to allow the cache to be populated with sufficient amounts of data to reduce memory latency and/or external memory bandwidth when executing an application which accesses the data stream through the one or more registers. | 10-21-2010 |
20100268886 | SPECIFYING AN ACCESS HINT FOR PREFETCHING PARTIAL CACHE BLOCK DATA IN A CACHE HIERARCHY - A system and method for specifying an access hint for prefetching only a subsection of cache block data, for more efficient system interconnect usage by the processor core. A processing unit receives a data cache block touch (DCBT) instruction containing an access hint and identifying a specific size portion of data to be prefetched. Both the access hint and a value corresponding to an amount of data to be prefetched are contained in separate subfields of the DCBT instruction. In response to detecting that the code point is set to a specific value, only the specific size of data identified in a sub-field of the DCBT and addressed in the DCBT instruction is prefetched into an entry in the lower level cache. | 10-21-2010 |
20100268880 | Dynamic Runtime Modification of Array Layout for Offset - Disclosed are a method, a system and a computer program product for operating a cache system. The cache system can include multiple cache lines, and a first cache line of the multiple of cache lines can include multiple cache cells, and a bus coupled to the multiple cache cells. In one or more embodiments, the bus can include a switch that is operable to receive a first control signal and to split the bus into first and second portions or aggregate the bus into a whole based on the first control signal. When the bus is split, a first cache cell and a second cache cell of the multiple cache cells are coupled to respective first and second portions of the bus. Data from the first and second cache cells can be selected through respective portions of the bus and outputted through a port of the cache system. | 10-21-2010 |
20100264733 | BULK POWER ASSEMBLY - A bulk power assembly includes a bulk power distribution (BPD) subassembly and a bulk power controller and hub (BPCH) subassembly coupled to the BPD subassembly. The BPD assembly is configured to provide bulk DC power from both AC input power and DC input power. The BPD subassembly is configured to distribute the DC bulk power. The BPCH subassembly is configured to monitor and control the BPD assembly. | 10-21-2010 |
20100264731 | POWER CONVERSION, CONTROL, AND DISTRIBUTION SYSTEM - A power conversion, control, and distribution system includes multiple bulk power regulator (BPR) subassemblies, a bulk power distribution (BPD) subassembly, and a bulk power controller and hub (BPCH) subassembly. The BPR subassemblies are each configured to provide regulated DC power from both AC input power and DC input power. The BPD subassembly is configured to distribute the regulated DC power. The BPCH subassembly is coupled to the multiple BPR subassemblies and the BPD subassembly. The BPCH subassembly is configured to monitor and control the BPR assemblies and the BPD assembly. | 10-21-2010 |
20100262787 | TECHNIQUES FOR CACHE INJECTION IN A PROCESSOR SYSTEM BASED ON A SHARED STATE - A technique for performing cache injection includes monitoring, at a host fabric interface, snoop responses to an address on a bus. When the snoop responses indicate a data block associated with the address is in a shared state, input/output data associated with the address on the bus is directed to a cache that includes the data block in the shared state and is located physically closer to the host fabric interface than one or more other caches that include the data block associated with the address in the shared state. | 10-14-2010 |
20100262735 | TECHNIQUES FOR TRIGGERING A BLOCK MOVE USING A SYSTEM BUS WRITE COMMAND INITIATED BY USER CODE - A technique for triggering a system bus write command with user code includes identifying a specific store-type instruction in a user instruction sequence. The specific store-type instruction is converted into a specific request-type command, which is configured to include core permission controls (that are stored in core configuration registers of a processor core by a trusted kernel) and user created data (stored in a cache memory). Slave devices are configured through register space (that is only accessible by the trusted kernel) with respective slave permission controls. The specific request-type command is then transmitted from the cache memory, via a system bus. In this case, the slave devices that receive the specific request-type command (via the system bus) process the specific request-type command when the core permission controls are the same as the respective slave permission controls. | 10-14-2010 |
20100262720 | TECHNIQUES FOR WRITE-AFTER-WRITE ORDERING IN A COHERENCY MANAGED PROCESSOR SYSTEM THAT EMPLOYS A COMMAND PIPELINE - A technique for maintaining input/output (I/O) command ordering on a bus includes assigning a channel identifier to I/O commands of an I/O stream. In this case, the channel identifier indicates the I/O commands belong to the I/O stream. A command location indicator is assigned to each of the I/O commands. The command location indicator provides an indication of which one of the I/O commands is a start command in the I/O stream and which of the I/O commands are continue commands in the I/O stream. The I/O commands are issued in a desired completion order. When a first one of the I/O commands does not complete successfully, the I/O commands in the I/O stream are reissued on the bus starting at the first one of the I/O commands that did not complete successfully. | 10-14-2010 |
20100254670 | Content Recorder Multi-Angle Viewing and Playback - A method, system, and computer program product for selecting, in real time, a leading view of a multi-angle television program. A video recorder receives a program view selection. The video recorder then transmits a viewer data request for the currently selected program view to a service provider. The video recorder may then receive requested viewer data of the selected program view and one or more alternate views of the selected program. The video recorder may then determine if the selected program view is the leading view of the selected program. When the selected view is not the leading view and the video recorder is configured for automatic view switching, the video recorder may autonomously switch to the leading view of the selected program. Alternatively, the video recorder may present vote totals of all views of the selected program and enable a selection of a desired alternate view. | 10-07-2010 |
20100251199 | Method and system for automated convergence of ternary simulation by saturation of deep gates - A method, system and computer program product for X-Saturated ternary simulation based reduction. An X-Saturated ternary simulation (XSTS) utility, which executes on a computer system, receives design information, where the design information includes a netlist. The XSTS utility initializes one or more data structures and/or variables and simulates, in a ternary fashion, the netlist at a time value by applying logical X values to all RANDOM gates of the netlist and to registers marked X_SATURATED. For each register of the netlist XSTS utility: determines whether or not the register departs from its expected prefix behavior, and if the register departs from its expected prefix behavior, the register is marked as X_SATURATED and the current state is updated with an X value upon the register. XSTS utility can store the current state in a data structure and can use the information from the data structure to simplify the design. | 09-30-2010 |
20100250905 | System and Method of Routing Instructions - Disclosed are a method and system for reducing complexity of routing of instructions from an instruction issue queue to appropriate execution pipelines in a superscalar processor. In one or more embodiments, an instruction steering unit of the superscalar processor receives ordered instructions. The steering unit determines that a first instruction and a subsequent second instruction of the ordered instructions are non-branching instructions, and the steering unit stores the first and second instructions in two non-branching instruction issue queue entries of a shadow queue. The steering unit determines whether or not a third instruction the ordered instructions is a branch instruction, where the third instruction is subsequent to the second instruction. If the third instruction is a branch instruction, the steering unit stores the third instruction in a branch entry of the shadow queue; otherwise, the steering unit stores a no operation instruction in the branch entry of the shadow queue. | 09-30-2010 |
20100228546 | SYSTEM AND METHODS FOR PROVIDING VOICE TRANSCRIPTION - A system and methods is provided for providing SIP based voice transcription services. A computer implemented method includes: transcribing a Session Initiation Protocol (SIP) based conversation between one or more users from voice to text transcription; identifying each of the one or more users that are speaking using a device SIP_ID of the one or more users; marking the identity of the one or more users that are speaking in the text transcription; and providing the text transcription of the speaking user to non-speaking users. | 09-09-2010 |
20100199045 | STORE-TO-LOAD FORWARDING MECHANISM FOR PROCESSOR RUNAHEAD MODE OPERATION - A system and method to optimize runahead operation for a processor without use of a separate explicit runahead cache structure. Rather than simply dropping store instructions in a processor runahead mode, store instructions write their results in an existing processor store queue, although store instructions are not allowed to update processor caches and system memory. Use of the store queue during runahead mode to hold store instruction results allows more recent runahead load instructions to search retired store queue entries in the store queue for matching addresses to utilize data from the retired, but still searchable, store instructions. Retired store instructions could be either runahead store instructions retired, or retired store instructions that executed before entering runahead mode. | 08-05-2010 |
20100153965 | TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON INTER-THREAD COMMUNICATIONS - A technique for operating a high performance computing (HPC) cluster includes monitoring communication between threads assigned to multiple processors included in the HPC cluster. The HPC cluster includes multiple nodes that each include two or more of the multiple processors. One or more of the threads are moved to a different one of the multiple processors based on the communication between the threads. | 06-17-2010 |
20100153541 | TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON PROCESSOR WORKLOAD - A technique for operating a high performance computing (HPC) cluster includes monitoring workloads of multiple processors included in the HPC cluster. The HPC cluster includes multiple nodes that each include two or more of the multiple processors. One or more threads assigned to one or more of the multiple processors are moved to a different one of the multiple processors based on the workloads of the multiple processors. | 06-17-2010 |
20100150320 | HANDLING COMMUNICATION SESSION DISCONNECTION AND RECONNECTION - A method, system and computer program product records missed information that is communicated between one or more connected communication terminals during a disconnection period and replays the missed information when a temporarily-disconnected communication terminal reconnects to the active communication session. The method comprises: detecting disconnection of the communication terminal from the active communication session; in response to detecting the disconnection, automatically recording the missed information exchanged between the one or more connected communication terminals remaining in the active communication session; detecting reconnection of the disconnected terminal to the active communication session; and delivering the recorded information exchange to the reconnected terminal, in response to detecting the reconnection. | 06-17-2010 |
20100110651 | Integrated Circuit Coating For Improved Thermal Isolation - During manufacture of an electronic device, an aerogel coating is applied to a first side of an IC substrate of a first IC. A bonding procedure is initiated, during which IC interconnects are either placed on the coated side of the substrate or on the opposite side of the substrate. The first IC is connected on a carrier to a second IC with the coated side of the first IC facing the second IC to reduce heat transmission to the second IC during operation of the first IC. The aerogel coating reduces thermal stress to the circuit board and surrounding components, reduces the risk of overheating of critical circuit components, provides chemical and mechanical insulation from contamination during subsequent wafer handling operations, and provides a thermal isolator between IC regions of dissimilar power dissipation, which isolator facilitates efficient thermal extraction from localized hotspots. | 05-06-2010 |
20100105426 | Embedded Biometrics in Telecommunication Devices for Feature Extraction and Context Identification - A method, a system and a computer program product for determining one or more characteristics of a caller, such as the mood, gender, age, and urgency of the caller, utilizing the biometric characteristics of the caller. One or more biometric characteristics are detected when a request to place an outgoing call to one or more destinations is received at a first telecommunication device. When the request to place an outgoing call is a verbal request, one or more biometric voice samples are obtained. The biometric voice samples comprise the biometric characteristics of the caller. The biometric characteristics are extracted from the biometric voice samples, encoded into a datagram, and transmitted from the first telecommunication device to the outgoing call destination (i.e. a second telecommunication device). When the biometric characteristics are analyzed at the second telecommunication device, a display is generated depicting the mood, gender, age, urgency or other characteristics of the caller associated with the incoming call. | 04-29-2010 |
20100082645 | SORTING RECORDS BASED ON FREE TEXT FIELD CONTENT - Disclosed are a method, system and computer program product for sorting records based on content in a free text field. A request is received by a sort function to sort a free text field. The sort function request is intercepted. The content in the free text field is analyzed. One or more new focus words are identified by the analysis. The new focus words are used to sort the free text field. The focus words in the free text field are highlighted and sorted alphabetically. Sorted free text field results based on the new focus words are displayed to a user on the user's display. | 04-01-2010 |
20100077332 | TRANSIENT INDICATION OF RECENTLY-CHANGED OBJECT ELEMENTS - An addition of an object or a change to an object is detected within a document. At least one of a time date-stamp or an embellishment of the object is provided, indicative of a relative time at which the change was made to the object. When an embellishment is associated with the object, the object is displayed the object with the embellishment, where the embellishment provides a visual indication of both a location and a change status of the object that was recently changed within the document, relative to a remainder of the document. When a time date-stamp is associated with the object, the object is displayed along with the time date-stamp within the document to provide a visual indication of the time and date at which the change was made to the object relative to a remainder of information within the document. | 03-25-2010 |
20100073184 | TRACKING DEEP CELL GATE/SPRING MECHANICAL SUB ASSEMBLY UTILIZING SIGNED EMPTY CELL BARCODE LABELS - A method, system, and computer program product for sensing the presence and/or misplacement of mechanical sub assemblies (MSAs) within storage slots of automated storage libraries. Each MSA is tracked based on signed empty cell barcode labels. Signed empty cell barcode labels are utilized to uniquely identify the frame, column, and row coordinates of one or more MSAs. The storage library automatically scans all signed empty cell barcode labels utilizing a scanner mounted on a robotic device. The system provides a counter for each MSA, allowing the storage library to track the usage of the MSA. As usage of the MSA reaches a predefined lifecycle, the library automatically generates an alert to replace the MSA. When a MSA is rearranged within the storage library, the library automatically maps the new frame, column, and row coordinates of the MSA. The counter dynamically modifies the usage count of the MSA according to the unique cell barcode label, thereby tracking all current and previous cartridges, and/or other items that may be scanned during MSA activity. | 03-25-2010 |
20100070717 | Techniques for Cache Injection in a Processor System Responsive to a Specific Instruction Sequence - A technique for performing cache injection includes monitoring an instruction stream for a specific instruction sequence. Addresses on a bus are then monitored, at a cache, in response to detecting the specific instruction sequence a determined number of times. Ownership of input/output data on the bus is then acquired by the cache when an address on the bus (that is associated with the input/output data) corresponds to an address of a data block stored in the cache. | 03-18-2010 |
20100056226 | TELEPHONE RING EXTENDER SYSTEM AND METHOD - A system and method to extend a ring of a telephone using presence detection of a user of a telecommunication device, and/or motion detection of a mobile telecommunication device. Presence detection and a ring control system are used to extend the ring of the telecommunication device based on user presence senor detection output signals and user preferences. Device motion detection and a ring control system are used to extend the ring of the mobile telecommunication device based on device motion detection output signals and user preferences. | 03-04-2010 |
20100037219 | PREDICTIVE LOGIC FOR AUTOMATIC WEB FORM COMPLETION - A method, system, and computer program product for autonomously completing a web form based on preferences and conditions established by a user. A predictive logic autonomously completes a web form by determining a requested data type of one or more form objects in the web form. The predictive logic determines a form preference corresponding to an identifier of a selected form object and selects or inserts data of the form preference into the form object. The form preference may be predefined by a user and stored within a form preference database which contains data selections and/or insertions for specific form objects for web forms. The form preference may also specify conditions for triggering events or actions of a web browser. The predictive logic monitors user insertions of a web form and prompts a user to define additional form preferences. | 02-11-2010 |
20100037065 | Method and Apparatus for Transitive Program Verification - A method, apparatus and program storage device for program verification in an information handling system in which an application program runs on an operating system having a signature verification function for verifying a digital signature of the application program. Upon loading of the application program, the signature verification function of the operating system verifies the digital signature of the application program and, if the digital signature is verified, initiates execution of the application program. Upon initiation of execution of the application program, a verification testing function associated with the application program tests the signature verification function of the operating system by presenting to it a sequence of test digital signatures in a specified pattern of true and false signatures. If its test of the signature verification function of the operating system is successful, the application program initiates normal execution. Otherwise, the application program terminates without initiating normal execution. | 02-11-2010 |
20100036687 | MOBILE TRANSPORT SELECTION AND ACQUISITION - A method, system, and computer program product for improving transportation selection and acquisition. A computer transmits historical fare and rating data of one or more public transportation vehicles (PTVs) within range of a user operating a mobile telecommunication device (MTD). The user may, via the MTD, select a PTV based on the provided historical fare or ratings data. Alternatively, the user may select a PTV based on personal preferences. In response to receiving a PTV selection from the MTD, the computer issues instructions to cause the selected PTV to be dispatched to the user's location. The computer may also receive user feedback for the selected PTV from the user in the form of a rating or as a textual comment. Customer feedback and may be used to update historical record information of a corresponding database entry for the selected PTV. This information may then be referenced by future customers. | 02-11-2010 |
20100036604 | ROUTE NAVIGATION FOR OPTIMAL MOBILE COVERAGE - A utility within a mobile device or other device computes and provides an optimal mobile coverage route. The device receives a stating point/location and a destination point/location. The mobile device downloads a provider's mobile coverage information, accesses historical data stored by the mobile device, and obtains user feedback from the provider. The optimal mobile coverage route is then computed at the device, and the optimal mobile coverage route is provided via one of the following: a web site, or a text message (SMS) to, a voice operated feed, or any direct feed to the user of the mobile device. The computed optimal mobile coverage route is then used by the user of the mobile device when communicating with another mobile device while travelling from the starting point to the end point. | 02-11-2010 |
20100035585 | Managing Voicemail Messages Based On Location of Caller's Wireless Communication Device - Disclosed are a method, system and computer program product for processing voicemail messages to a user's wireless communication device based on a location of a caller's wireless communication device. Call answering protocols are assigned for implementation based on the location of the caller's wireless communication device at a time a call is received from the caller's device. Call answering protocol entries are received via a wireless communication device. When a call is received, a location of the caller's wireless communication device is detected. Location information regarding the caller's wireless communication device is received at a call switching component. The call is processed at the call switching component based on the call answering protocol for handling a caller's call received from the location of the caller's wireless communication device. | 02-11-2010 |
20100035584 | Managing Voicemail Greeting Based On Location of Wireless Communication Device - Disclosed are a method, system and computer program product for managing voicemail greetings on a wireless communication device based on the device's location. A user records location-specific voicemail greetings on the user's wireless communication device, and associates the greetings with specific locations. When an authorized caller calls the user's wireless communication device, the location of the user's wireless communication device is detected, and location information of the user's device is sent to a call switching component. The call switching component presents the caller with the voicemail greeting associated with the location of the user's wireless communication device. The date and time the user's wireless communication device entered the location can be provided via a timestamp and presented to the caller along with the location-specific voicemail greeting, to enable the caller to determine when the user may be available to communicate, based on the combination of the information in the greeting and the timestamp information. | 02-11-2010 |
20100035583 | MANAGING WIRELESS TRANSMISSIONS UPON UNINTENTIONAL DISCONNECTION OF SERVICE - Disclosed are a method, system and computer program product for managing unintentional disconnection of a communication device. A system detects a first device to a transmission has been unintentionally disconnected from an ongoing communication with a second communication device. The connected second device is signaled regarding the disconnection. Recording of a disconnection voicemail message for the disconnected first communication device is enabled before disconnecting the second communication device. The second device may set an expiration time on the disconnection voicemail message. Upon resumption of service, the disconnected first device is informed of a new voicemail message left by the second device during the disconnection. A disconnection-specific voicemail greeting may be recorded by a user of the disconnected first device's system for use when a disconnection occurs. The disconnection-specific voicemail greeting is played to the connected second device when disconnection occurs. | 02-11-2010 |
20100034363 | Telephonic Repeat Method - A method, system and computer program product for assigning one or more conditions to a telephonic communication system to enable recording, replaying, and pausing of a telephone conversation. Recording of a telephone conversation may be manually or dynamically initiated during the telephone conversation. Dynamic replay of a telephone conversation is automatically initiated when a conversation experiences insufficient call quality, an interruption to the telephone service is detected, the user is distracted, a displacement of the user's phone is detected, or the user toggles between listening modes. A pause mode is automatically entered into during the telephone conversation when a section of the telephone conversation is replayed. An automated pause alert may be played during repeat of the telephone conversation to inform one or more parties that the user is temporarily unavailable. Real-time access to the telephone conversation is resumed when the replaying of the recorded telephone conversation has ended. | 02-11-2010 |
20100017360 | SYSTEM AND METHOD TO CONTROL EMAIL WHITELISTS - A system and method to control email whitelists by collecting one or more website email addresses parsed from a web page, detecting whether one or more of the user's email addresses are included in a webform of the web page, confirming whether the collected one or more website email addresses are to be added to one or more email whitelists, and updating the configuration of the one or more whitelists in response to a confirmation to add the one or more site email addresses to the one or more email whitelists. | 01-21-2010 |
20090280818 | METHOD AND SYSTEM FOR PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device. These preferences may be stored on the caller telecommunication device or remotely stored on the host carrier network. | 11-12-2009 |
20090280817 | METHOD AND SYSTEM FOR PERFORMING RECIPIENT BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if another wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device based on preferences internal to the intended receiving wireless device. These preferences may be stored on the intended receiving wireless device or remotely stored on the host carrier network. | 11-12-2009 |
20090280787 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL THROUGH A THIRD PARTY DEVICE - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a host carrier initiated query of third party priority of contacts routing preferences of the intended receiving wireless telecommunication device is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If third party routing preferences of the intended receiving wireless telecommunication device have previously been established, then the call is rerouted through one or more alternate telecommunication devices to the intended receiving wireless telecommunication device. The priority of contacts is stored with the host carrier. | 11-12-2009 |
20090280785 | METHOD AND SYSTEM FOR PERFORMING PROXIMITY BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device. | 11-12-2009 |
20090279680 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL BASED ON MUTUAL CONTACTS OF A CONTACT LIST - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device. | 11-12-2009 |
20090279677 | METHOD AND SYSTEM TO PREVENT UNINTENDED USERS FROM ACCESSING A RE-ROUTED COMMUNICATION - A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication. | 11-12-2009 |
20090190847 | ADAPTIVE COMPRESSION QUALITY - Images are captured and are stored (either in compressed or non-compressed form) in non-volatile storage at a predetermined quality or Q level. When the storage fills to a predetermined threshold, some or all of the images are compressed or recompressed to a lower quality, to make room for additional storage; i.e. new images may be captured and compressed at this lower quality or Q level, to minimize the rate at which the remaining storage is consumed; or all of the captured and stored images may be compressed or recompressed to this lower quality or Q level. | 07-30-2009 |
20090113165 | Method and System for Automatically Distributing Real Memory Between Virtual Memory Page Sizes - A method, system and computer program product for allocating real memory to virtual memory page sizes when all real memory is in use is disclosed. In response to a page fault, a page frame for a virtual page is selected. In response to determining that said page does not represent a new page, a page is paged-in into said page frame a repaging rate for a page size of the page is modified in a repaging rates data structure. | 04-30-2009 |
20090072863 | Transmission Gate Multiplexer - A technique for operating a multiplexer includes selecting, from multiple transmission gate groups, a transmission gate group. A transmission gate is selected from the selected transmission gate group. Finally, a data signal associated with the selected transmission gate is provided at an output of the multiplexer. | 03-19-2009 |
20080284030 | ENHANCED MECHANICAL STRENGTH VIA CONTACTS - The present invention provides an enhanced interconnect structure with improved reliability. The inventive interconnect structure has enhanced mechanical strength of via contacts provided by embedded metal liners. The embedded metal liners may be continuous or discontinuous. Discontinuous embedded metal liners are provided by a discontinuous interface at the bottom of the via located within the interlayer dielectric layer. | 11-20-2008 |