会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Data de-duplication in computer storage systems
    • 计算机存储系统中的重复数据删除
    • US08781800B2
    • 2014-07-15
    • US13286490
    • 2011-11-01
    • Kavita ChavdaEric W. Davis RozierNagapramod S. MandagereSandeep M. UttamchandaniPin Zhou
    • Kavita ChavdaEric W. Davis RozierNagapramod S. MandagereSandeep M. UttamchandaniPin Zhou
    • G06F17/10
    • G06F7/00G06F17/30159
    • Embodiments of the present invention provide an approach that utilizes discrete event simulation to quantitatively analyze the reliability of a modeled de-duplication system in a computer storage environment. In addition, the approach described herein can perform such an analysis on systems having heterogeneous data stored on heterogeneous storage systems in the presence of primary faults and their secondary effects due to de-duplication. In a typical embodiment, data de-duplication parameters and a hardware configuration are received in a computer storage medium. A data de-duplication model is then applied to a set of data and to the data de-duplication parameters, and a hardware reliability model is applied to the hardware configuration. Then a set (at least one) of discrete events is simulated based on the data de-duplication model as applied to the set of data and the data de-duplication parameters, and the hardware reliability model as applied to the hardware configuration. Based on the simulation, a set of data reliability and availability estimations/estimates can be generated (e.g., and outputted/provided).
    • 本发明的实施例提供一种利用离散事件模拟来定量分析计算机存储环境中的建模的重复数据删除系统的可靠性的方法。 另外,本文描述的方法可以在存在主异构存在的异构存储系统上的具有异构数据的系统上进行这种分析,并且由于重复数据删除而产生其次要效应。 在典型的实施例中,在计算机存储介质中接收数据重复数据删除参数和硬件配置。 然后将数据重复数据删除模型应用于一组数据和重复数据删除参数,并将硬件可靠性模型应用于硬件配置。 然后基于应用于数据集和数据重复数据删除参数的数据重复数据删除模型以及应用于硬件配置的硬件可靠性模型来模拟一组(至少一个)离散事件。 基于该仿真,可以生成(例如和输出/提供)一组数据可靠性和可用性估计/估计。
    • 4. 发明授权
    • Hazard detection for asset management
    • 资产管理危害检测
    • US09105084B2
    • 2015-08-11
    • US14504691
    • 2014-10-02
    • International Business Machines Corporation
    • James R. CulpFrank D. Fenhagen, IVArun HampapurXuan LiuSharathchandra U. Pankanti
    • G06K9/00G06T7/00G06Q90/00G06Q10/06G06T11/60
    • G06K9/00476G06K9/0063G06K9/52G06Q10/06311G06Q90/00G06T7/30G06T11/60G06T2207/10032G06T2207/30184
    • An approach that detects locations of hazardous conditions within an infrastructure is provided. This approach uses satellite imagery, GIS data, automatic image processing, and predictive modeling to determine the location of the hazards automatically, thus optimizing infrastructure management. Specifically, a hazard detection tool provides this capability. The hazard detection tool comprises a detection component configured to: receive visual media containing asset location data about a set of physical assets, and hazard location data about potential hazards within a vicinity of each of the set of physical assets. The detection component further receives graphical information system (GIS) data containing asset location data about each of the set of physical assets. The hazard detection tool further comprises an analysis component configured to: analyze the visual media to determine if a hazardous condition exists for each of the set of physical assets; and apply the GIS data to the visual media to determine a location of hazardous conditions within the infrastructure.
    • 提供了一种检测基础设施内危险状况位置的方法。 这种方法使用卫星图像,GIS数据,自动图像处理和预测建模来自动确定危害位置,从而优化基础设施管理。 具体来说,危害检测工具提供了这一功能。 所述危险检测工具包括检测部件,所述检测部件被配置为:接收包含关于一组物理资产的资产位置数据的视觉媒体,以及关于所述一组物理资产的附近的潜在危险的危险位置数据。 检测组件还接收关于每组物理资产的资产位置数据的图形信息系统(GIS)数据。 所述危险检测工具还包括分析部件,其被配置为:分析所述视觉介质以确定所述一组物理资产中是否存在危险状况; 并将GIS数据应用于视觉媒体,以确定基础设施内危险状况的位置。
    • 5. 发明授权
    • Print services selection in a networked computing environment
    • 在联网计算环境中打印服务选择
    • US08767241B2
    • 2014-07-01
    • US13366666
    • 2012-02-06
    • Tian Ming PanRandy A. Rendahl
    • Tian Ming PanRandy A. Rendahl
    • G06F15/00G06F3/12G06K1/00G06K15/00
    • G06F3/1204G06F3/1226G06F3/126G06F3/1288
    • Embodiments of the present invention provide an approach for selection of print services in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a request (e.g., comprising a print job) is received from a user, and a print template is identified. The print template generally comprises a set of parameters (e.g., paper size, colors, etc.) for printing the print job request. A location of the user will be determined, and a set of printers (e.g., within a predetermined proximity of the location) that is capable of printing the job in accordance with the set of parameters is identified. Thereafter, a particular printer will be identified from the set of printers based on a set of service level commitments (e.g., a desired distance from the location, a queue length, etc.). The job can then be sent to the particular printer for printing.
    • 本发明的实施例提供了一种用于在联网计算环境(例如,云计算环境)中选择打印服务的方法。 具体地,在典型的实施例中,从用户接收到请求(例如,包括打印作业),并且识别打印模板。 打印模板通常包括用于打印打印作业请求的一组参数(例如,纸张尺寸,颜色等)。 将确定用户的位置,并且识别能够根据该组参数打印作业的一组打印机(例如,位于预定的位置附近)。 此后,将基于一组服务级别承诺(例如,距离位置的期望距离,队列长度等)从该组打印机识别特定打印机。 然后可以将作业发送到特定打印机进行打印。
    • 7. 发明授权
    • Virtualization in a multi-core processor (MCP)
    • 多核处理器(MCP)中的虚拟化
    • US08775840B2
    • 2014-07-08
    • US13563160
    • 2012-07-31
    • Karl J. DuvalsaintHarm P. HofsteeDaeik KimMoon J. Kim
    • Karl J. DuvalsaintHarm P. HofsteeDaeik KimMoon J. Kim
    • G06F1/26G06F1/00G06F7/38
    • G06F9/5077Y02D10/22Y02D10/36
    • This invention describes an apparatus, computer architecture, method, operating system, compiler, and application program products for MPEs as well as virtualization in a symmetric MCP. The disclosure is applied to a generic microprocessor architecture with a set (e.g., one or more) of controlling elements (e.g., MPEs) and a set of groups of sub-processing elements (e.g., SPEs). Under this arrangement, MPEs and SPEs are organized in a way that a smaller number MPEs control the behavior of a group of SPEs. The apparatus enables virtualized control threads within MPEs to be assigned to different groups of SPEs for controlling the same. The apparatus further includes a MCP coupled to a power supply coupled with cores to provide a supply voltage to each core (or core group) and controlling-digital elements and multiple instances of sub-processing elements.
    • 本发明描述了用于MPE的设备,计算机体系结构,方法,操作系统,编译器和应用程序产品以及对称MCP中的虚拟化。 本公开应用于具有一组(例如,一个或多个)控制元件(例如,MPE)和一组子处理元件(例如,SPE)的通用微处理器架构。 在这种安排下,MPEs和SPE的组织方式是以较小数量的MPE来控制一组SPE的行为。 该设备使得MPE内的虚拟化控制线程可以分配给不同的SPE组,以便控制它们。 该装置还包括耦合到与核耦合的电源的MCP以向每个核(或核心组)提供电源电压以及控制数字元件和子处理元件的多个实例。
    • 8. 发明授权
    • Optimizing the configuration of virtual machine instances in a networked computing environment
    • 优化联网计算环境中虚拟机实例的配置
    • US08769531B2
    • 2014-07-01
    • US13115399
    • 2011-05-25
    • Jason L. AndersonGregory J. BossTimpthy R. EchtenkampShaun T. Murakami
    • Jason L. AndersonGregory J. BossTimpthy R. EchtenkampShaun T. Murakami
    • G06F9/455
    • G06F9/45533G06F9/5077G06F9/5088
    • Embodiments of the present invention provide an approach for optimizing a configuration of virtual machine (VM) instances. In a typical embodiment, such optimization comprises either the splitting of a single VM instance into multiple VM instances or the consolidation of multiple VM instances into fewer (e.g., a single) VM instance. Along these lines, it will first be determined which VM instances would be good candidates for reconfiguration. Under one approach, VM instances that are candidates for reconfiguration are identified based upon an analysis of applicable/associated service level agreement (SLA) terms versus the performance of the VM instances. For example, VM instances can be reconfigured if such reconfiguration will maximize a benefit provided by the applicable SLA terms (e.g., if the splitting of a single VM instance into multiple VM instances would cause a workload to be processed more efficiently, resulting in a more favorable cost/benefit ratio). In another embodiment, candidate VM instances can be identified based upon a commonality of an entity (e.g., a consumer) associated therewith. For example, if a single entity is utilizing multiple VM instances, such VM instances could be considered candidates for consolidation to avoid unnecessary computing resource consumption.
    • 本发明的实施例提供了一种用于优化虚拟机(VM)实例的配置的方法。 在典型的实施例中,这样的优化包括将单个VM实例划分成多个VM实例或将多个VM实例合并为更少(例如,单个)VM实例。 按照这些方法,首先将确定哪些VM实例将是重新配置的良好候选。 在一种方法下,基于对适用/相关联的服务级别协议(SLA)术语与VM实例的性能的分析来识别作为重新配置候选的VM实例。 例如,如果这种重新配置将最大化由适用的SLA术语提供的好处(例如,如果将单个VM实例拆分为多个VM实例将导致更有效地处理工作负载,则可以重新配置VM实例),从而导致更多 有利的成本/效益比)。 在另一个实施例中,可以基于与其相关联的实体(例如,消费者)的共性来识别候选VM实例。 例如,如果单个实体正在使用多个VM实例,则这样的VM实例可以被认为是合并的候选者,以避免不必要的计算资源消耗。
    • 9. 发明授权
    • Integrated physical access control and information technology (IT) security
    • 综合物理访问控制和信息技术(IT)安全
    • US08756655B2
    • 2014-06-17
    • US13548789
    • 2012-07-13
    • Mark J. Hoesl
    • Mark J. Hoesl
    • H04L9/32
    • G07C9/00571G06F21/62
    • Embodiments described herein provide security for a user integrated technology (IT) account by integrating a facility's physical access controls with its IT security system to provide authorization and access. When a user is granted facility access, his/her accounts are automatically enabled or provisioned via an IT security system. When the user exits the facility, his/her accounts are automatically disabled or de-provisioned via the IT security system. The IT security system maintains the user IT account in a secured state until the user credentials are verified at an access control point to enable access to the user IT account, and returns the user IT account to the secured state after receiving the user credentials at the access control point to disable access to the user IT account. As such, the user IT account is secured when not needed by the user to reduce periods of vulnerability.
    • 本文描述的实施例通过将设施的物理访问控制与其IT安全系统集成以提供授权和访问来为用户集成技术(IT)帐户提供安全性。 当用户获得设施访问权限时,他/她的帐户将通过IT安全系统自动启用或配置。 当用户退出设备时,他/她的帐户将通过IT安全系统自动禁用或取消配置。 IT安全系统将用户IT帐户维护在安全状态,直到用户凭证在访问控制点被验证以允许访问用户IT帐户,并且在接收到用户凭证之后将用户IT帐户返回到安全状态 访问控制点以禁用对用户IT帐户的访问。 因此,用户IT帐户在用户不需要时减少安全漏洞的时间。