Software licence management in a peer-to-peer network

    公开(公告)号:GB2508645A

    公开(公告)日:2014-06-11

    申请号:GB201222051

    申请日:2012-12-07

    Applicant: IBM

    Abstract: A software license management system for computer applications runs in a peer-to-peer network. At least one server acts as a provider and at least one server acts as a user but each server 201 comprises the same means. The means are suitable for carrying out a method, implemented as a computer program, for the control of program installations according to respective license regulations. Executable programs are distributed to requesting servers from storage means, preferably from an update file server 205. A metafile, comprising license information on licensing conditions for a corresponding executable program code, is generated and stored, preferably on a licence server 204, and dispatched. A request 202 for transmission of a metafile for a corresponding executable program code is sent, a metafile is downloaded 203 and stored and the executable program code is downloaded, installed and executed under control of software license management system.

    Remotely awakening an electronic device

    公开(公告)号:GB2514158A

    公开(公告)日:2014-11-19

    申请号:GB201308786

    申请日:2013-05-16

    Applicant: IBM

    Abstract: An apparatus 10 for remotely awakening an electronic device comprises power supply means 12 to supply external power; a receiver 38, 14 for an electromagnetic signal; a capacitor 18 connected to said receiver; a switching circuit 20 connected to said capacitor and a controller 22, being part of said electronic device, connected to receive power from said switching circuit and to provide a keep awake signal 24 to said switching circuit. Said switching circuit comprises connection means to connect said controller with said capacitor when said capacitor is loaded with a predefined amount of power via said receiver as well as switching means 40 responsive to said keep awake signal to disconnect said controller from said capacitor and to connect said controller with said power supply means afterwards. Herein said controller performs an initialization phase in response to first receiving power and enables said keep awake signal after completing said initialization phase.

    Purchase request approvals for groups of articles

    公开(公告)号:GB2508838A

    公开(公告)日:2014-06-18

    申请号:GB201222330

    申请日:2012-12-12

    Applicant: IBM

    Abstract: Approving a group purchase request for a group of articles, by selecting a sub-group of articles, wherein a unique article approval index is as­signed to each of the articles and a highest article approval index is de­termined. An article is selected into the sub-group following at least one article selection criteria: the unique article approval index is above a predetermined approval index threshold and equal to the highest article approval index. The group purchase request is approved for the group if the group purchase request for the sub­group is approved; and rejected if the group purchase request for the sub-group is rejected. Approval steps may require particular agreement from for example a manager or director within the procurement hierarchy, as part of the workflow. Similarities between articles and alternative additional articles may be considered, using a ratio of shared attributes.

    Controlled use of a hardware security module

    公开(公告)号:GB2531248A

    公开(公告)日:2016-04-20

    申请号:GB201417784

    申请日:2014-10-08

    Applicant: IBM

    Abstract: Disclosed is a method of using a hardware security module 10 that can be connected to computer systems 212, 213. The computer systems being connectable to a server 12 within a common network 14. The hardware security module has a volatile memory 20, and a persistent or non-volatile memory 22, with a network address 18 of the server, an encrypted secret entity 32 and a private key 30. The server has a wrapping key 24 and a public key 26. When the hardware security module is connected to one of the computer systems, a secure connection 16 is established between the module and the server, the wrapping key is then retrieved, via the secure connection, from the server and stored in the volatile memory of the module. The key is then used to decrypt the encrypted secret entity and the decrypted secret entity 28 is stored in the volatile memory of the module. Also disclosed is a method of initialising a server and a connected hardware security module by encrypting and storing the secret entity in the persistent memory of the module.

    Routing communication between computing platforms

    公开(公告)号:GB2528441A

    公开(公告)日:2016-01-27

    申请号:GB201412861

    申请日:2014-07-21

    Applicant: IBM

    Abstract: A computer system comprises a number of machines, each running its own operating system. The machines may be virtual machines or may be physical machines in a multiprocessor system. A first machine is a client system 10, which does not have its own network stack. Second 12 and third 14 machines are communication bridges, each of which has its own network stack 20, 22. One bridge is a master 26 and the other is a slave 28. The client sends outgoing data to the master and slave bridges. The master bridge then sends the data to a network with its stack. The network sends data to the master and slave bridges via their stacks. The master then sends the data to the client. Then master and slave exchange status information. If the slave does not receive information from the master, it becomes the master.

    Data dump method for a memory in a data processing system

    公开(公告)号:GB2520712A

    公开(公告)日:2015-06-03

    申请号:GB201321009

    申请日:2013-11-28

    Applicant: IBM

    Abstract: During memory setup, computer memory is divided into primary 8 and secondary 9 sections, the primary section comprising first and second areas. Before a crash, first area 81 contains an Operating System (OS) and second area 84 contains an emergency OS and a dump program. The emergency OS and dump program are transferred from the second to the first area after the crash. The OS is operable before the crash and the emergency OS and dump program are operable after the crash. The secondary section is only indirectly controlled by the OS (widely out of its control). The first area contains a first SMSMP (Secondary Memory Section Management Program) which transfers first file system data 82 from the primary section to the secondary section before a crash. The second area contains a second SMSMP which directs read access of the dump program to the secondary section after a crash, in order to select second file system data 83 to be dumped using error data for the selection, e.g. an error code. The second SMSMP directs transfer of the emergency OS, dump program and second SMSMP code from the second to the first area.

    Virtual machine image disk usage
    8.
    发明专利

    公开(公告)号:GB2512060A

    公开(公告)日:2014-09-24

    申请号:GB201304912

    申请日:2013-03-18

    Applicant: IBM

    Abstract: A hypervisor uses a disc image emulator 22 to manage a disc image for a virtual machine 20. The emulator provides a first image 26, which is written to by the virtual machine, and a second image 28, which permanently stores the data. A cleaning process 24 copies blocks from the first image to the second image and unused blocks are deleted from the images. The process uses knowledge of the file system metadata on the disc images to determine which blocks are not being used. When the files are copied, the blocks still in use are copied into an allocation area. Once all the blocks that are in use have been copied, the rest of the allocation area may be freed. The copying may be carried out as an asynchronous background process at the hypervisor level.

    Live migration of a virtual machine using a peripheral function

    公开(公告)号:GB2516944A

    公开(公告)日:2015-02-11

    申请号:GB201314184

    申请日:2013-08-08

    Applicant: IBM

    Abstract: A virtual machine is to be migrated. In order to enable the virtual machine to use a peripheral function without a long interruption, a migration assistance unit (1705) is provided, wherein migration assistance unit (1705) is adapted to receive a source write request generated by a peripheral function, and to generate a destination write request comprising the same write data as said source write request and directed to said destination memory area of said virtual machine. The peripheral function may be blocked while the memory data is transferred, and the source virtual machine is paused when nearly all memory data is transferred to the destination. Further write requests are exclusively saved in the destination memory, which may be on the same or different computers.

Patent Agency Ranking