Abstract:
An approach is provided in which a knowledge manager identifies document command statements in a document that correspond to requests included in the document. The knowledge manager compares the document command statements against promise structures corresponding to promises included in valid documents and generates a suspicion score based on the analysis. In turn, the knowledge manager generates a suspicious document notification corresponding to the document when the suspicion score reaches a suspicion threshold.
Abstract:
An approach is provided in which an RFID reader receives a response signal from an RFID tag affixed to an object. The RFID reader determines a tag charging time of the RFID tag based upon a first point in time that the RFID reader sent a request signal to the RFID tag and a second point in time that the response signal was received by the RFID reader. In turn, the RFID reader identifies a location of the object based on the tag charging time and generates a notification that includes the location of the object.
Abstract:
An approach is provided for creating a digital representation of an analog sound. The approach retrieves a number of digital sound data streams with each of the digital sound data streams corresponding to an orientation angle of the digital sound data streams with respect to one another. The digital representation of the analog sound is generated by processing the digital sound data streams and their corresponding orientation angles.
Abstract:
An approach is provided for evaluating subject matter experts (SMEs) in a question and answering (QA) system. In the approach, a number of responses are received at the QA system with each of the responses being a response to a common question and each of the responses being received from a SME. One of the responses is selected with the selected response being from one of the SMEs that is being evaluated. The approach evaluates the selected response by comparing the selected response to the responses received from the other SMEs. Based on the evaluation, the approach updates a SME confidence score that corresponds to the selected SME.
Abstract:
An approach is provided that collects data from a multi-function adapter that is used by multiple functions. In the approach, a master function is dynamically selected from the group of functions. The approach further allows the master function to perform a disruptive adapter data collection while inhibiting performance of disruptive adapter data collection processes by the other (non-master) functions.
Abstract:
An approach is provided in which a system creates a network application model that includes network policy objects and connection rules corresponding to sending data between the network policy objects. The system converts the network application model to network configuration information, which links the network policy objects to the connection rules. In turn, a network control plane is configured based upon the network configuration information to map the network application model to a physical infrastructure.
Abstract:
A processor recognizes a request from a program executing on a first hardware thread to initiate software code on a second hardware thread. In response, the second hardware thread initiates and commences executing the software code. During execution, the software code uses hardware registers of the second hardware thread to store data. Upon termination of the software code, the second hardware thread invokes a hypervisor program, which extracts data from the hardware registers and stores the extracted data in a shared memory area. In turn, a debug routine executes and retrieves the extracted data from the shared memory area.
Abstract:
An approach is provided by detecting password entries by a user of a system with each of the password entries corresponding to a password entered when invoking a password enabled application on the system. A password strength is calculated corresponding to each of the detected password entries. A strongest password is identified based on the password strength calculations. A device lock request is received from the user of the system, with the device lock request being received at a user interface, such as a GUI control. The system is set into a locked state. The locked state prevents data stored on the information handling system from being accessed while the information handling system is in the locked state. The system is subsequently unlocked by entry of the identified strongest password by the user.
Abstract:
Generating loop code to execute on Single-Instruction Multiple-Datapath (SIMD) architectures, where the loop operates on datatypes having different lengths, is disclosed. Further, a preferred embodiment of the present invention includes a novel technique to efficiently realign or shift arbitrary streams to an arbitrary offset, regardless whether the alignments or offsets are known at the compile time or not. This technique enables the application of advanced alignment optimizations to runtime alignment. Length conversion operations, for packing and unpacking data values, are included in the alignment handling framework. These operations are formally defined in terms of standard SIMD instructions that are readily available on various SIMD platforms. This allows sequential loop code operating on datatypes of disparate length to be transformed (“simdized”) into optimized SIMD code through a fully automated process.
Abstract:
A system, method, and program product are provided that identifies a cache set using Translation LookAside Buffer (TLB) attributes. When a virtual address is requested, the method, system, and program product identifies a cache set using buffer attributes. When a virtual address is received, an attempt is made to load the received virtual address from a cache. When the attempt results in a cache miss, a page is identified within a Translation LookAside Buffer that includes the virtual address. A class identifier is then retrieved from the identified page, with the class identifier identifying a cache set that is selected from the cache.