Patent application number | Description | Published |
20100005059 | Cascaded Address Books on Mobile Phones Within a Social Network - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for locating contact information in a mobile phone network within a social network. In one embodiment, the computer implemented method permits reciprocal access between a first user's contact information and a second user's contact information by a first user device and a second user device, and permitting reciprocal access between the second user's contact information and a third user's contact information by the second user device and a third user device. The computer implemented method receives a request from the third user device to contact the first user device, wherein the first user contact information is unknown to the third user and issues a search on the mobile phone network, from the third user device, for the first user contact information. The first user contact information is located at the second user device in the social network, and the first user contact information is returned to the third user device. | 01-07-2010 |
20100161559 | MAINTAINING A NETWORK CONNECTION OF A WORKLOAD DURING TRANSFER - According to one embodiment of the present disclosure, a method and technique is disclosed for maintaining a network connection during transfer of the workload from a global environment of a logical partition to a workload partition of the logical partition and during any subsequent transfer(s). | 06-24-2010 |
20100235449 | DISPLAYING OR HIDING FOLDERS IN AN E-MAIL CLIENT BASED ON USER DEFINED TIMINGS - Techniques for managing electronic mail. Folder rules for associating electronic mail messages with folders are received. The folders are managed by an electronic mail client and stored in a computer usable memory. Electronic mail messages are also received. Each of the electronic mail messages is associated with at least one of the folders according to the folder rules. Furthermore, a visibility condition is received. The visibility condition specifies when a specified folder is visible in a user interface of the electronic mail client. A processor causes the specified folder not to be visible in the user interface when the visibility condition is not satisfied. A visibility condition may instead specify when a specified folder is not visible in the user interface. In this case, the specified folder is caused not to be visible in the user interface when the visibility condition is satisfied. | 09-16-2010 |
20100306288 | REBALANCING OPERATION USING A SOLID STATE MEMORY DEVICE - Systems and methods to manage database data are provided. A particular method includes automatically identifying a plurality of storage devices. The storage devices include a first device of a first type and a second device of a second type. The first type includes a solid state memory device. The method may further identify a high priority data set of the database. A rebalancing operation is conducted that includes moving the high priority data set to the solid state memory device and substantially evening distribution of other data of the database among the storage devices. | 12-02-2010 |
20140032861 | SYSTEMS AND METHODS FOR EFFICIENTLY STORING DATA - One method includes assigning a pointer from multiple logical blocks to the same original physical block if the multiple logical blocks include the same data. The method further includes receiving a command to write data to the first logical block and determining if the first logical block is a frequently accessed logical block. If the first logical block is a frequently accessed logical block, ownership of the original physical block is assigned to the first logical block. If ownership is established, the method includes copying any data stored in the original physical block to a new physical block, assigning a pointer from a second logical block to the new physical block, and performing the write command on the original physical block. A system includes a processor for performing the above method. One computer program product includes computer code for performing the method described above. | 01-30-2014 |
20140046912 | METHODS AND SYSTEMS FOR DATA CLEANUP USING PHYSICAL IMAGE OF FILES ON STORAGE DEVICES - Systems and computer program products are provided for optimizing selection of files for deletion from one or more data storage devices to free up a predetermined amount of space in the one or more data storage devices. A method includes analyzing an effective space occupied by each file of a plurality of files in the one or more data storage devices, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for deletion, based on the identified one or more data blocks, and deleting the one or more candidate files for deletion from the one or more data storage devices. | 02-13-2014 |
20140047207 | METHODS AND SYSTEMS FOR DATA CLEANUP USING PHYSICAL IMAGE OF FILES ON STORAGE DEVICES - Systems and computer program products are provided for optimizing selection of files for eviction from a first storage pool to free up a predetermined amount of space in the first storage pool. A method includes analyzing an effective space occupied by each file of a plurality of files in the first storage pool, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for eviction, based on the identified one or more data blocks, and evicting the one or more candidate files for eviction from the first storage pool to a second storage pool. | 02-13-2014 |
20140052429 | PROACTIVE DATA CENTER COOLING - A mechanism is provided to optimize cooling of a data center having a plurality of computer systems. A dataset is classified into a plurality of data storage regions hosted by at least one of the plurality of computer systems. A plurality of cooling devices is grouped into groups. Each group of the plurality of cooling devices cools at least one of the plurality of data storage regions. The classified dataset is analyzed to identify one of the plurality of data storage regions having heat-intensive data. An operating parameter is selectively adjusted for one of the group of the plurality of cooling devices that corresponds to cooling the identified one of the plurality of data storage regions having the heat-intensive data. | 02-20-2014 |
20140074802 | SECURE DELETION OPERATIONS IN A WIDE AREA NETWORK - Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and performing a secure deletion of the copy at the home site immediately after a reconnection event of the cache site to the home site. | 03-13-2014 |