1
Jakob C Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus: Restarting a software system. INTERNATIONAL BUSINESS MACHINES CORPORATION, William A Kinnaman Jr Esq, Blanche E Schiller Esq, Heslin Rothenberg Farley & Mesiti P C, October 20, 2015: US09164846 (4 worldwide citation)

In one aspect, a technique for restarting a software system on a computer platform after an unintentional software system shutdown. The technique includes, for instance, generating a core dump file on the computer platform when the software system shuts down unintentionally, restarting the software ...


2
Franziska Geisert, Jakob C Lang, Angel Nunez Mencias, Jochen Schweflinghaus: Memory dump optimization in a system. International Business Machines Corporation, Stephen R Yoder, November 3, 2015: US09176805 (1 worldwide citation)

Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an opti ...


3
Franziska Geisert, Jakob C Lang, Angel Nunez Mencias, Jochen Schweflinghaus: Memory dump optimization in a system. International Business Machines Corporation, Stephen R Yoder, November 3, 2015: US09176804 (1 worldwide citation)

Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an opti ...


4
Christine Axnix, Ute Gaertner, Jakob C Lang, Angel Nunez Mencias, Christoph Raisch, Christopher S Smith: Encrypted data exchange between computer systems. International Business Machines Corporation, Cantor Colburn, Steven Chiu, August 30, 2016: US09432183 (1 worldwide citation)

Aspects include encrypting data exchanged between two computer systems. A method includes accessing content of a memory, via a memory address, by at least one processing unit of one of the computer systems. Based on the accessing being a write operation, the content of the memory is encrypted using ...


5
James R Coon, Richard J Gusefski, Franz Hardt, Roger D Krsnak, Jakob C Lang, Victor M Lourenco, Jan Schneider, Garry J Sullivan, Brian D Valentine: Asset protection based on redundantly associated trusted entitlement verification. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cantor Colburn, William A Kinnaman Jr, August 23, 2016: US09424406 (1 worldwide citation)

A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; ...


6
Jakob C Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus: Managing a virtual computer resource. International Business Machines Corporation, Heslin Rothenberg Farley & Mesiti P C, April 24, 2018: US09952910

Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware f ...


7
Jakob C Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus: Managing a virtual computer resource. INTERNATIONAL BUSINESS MACHINES CORPORATION, Margaret A McNamara Esq, Rachel L Pearlman Esq, Heslin Rothenberg Farley & Mesiti P C, March 22, 2016: US09292325

Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware f ...


8
Volker M Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C Lang, Mareike Lattermann, Angel Nunez Mencias: Task grouping by context. International Business Machines Corporation, Maeve Carpenter, August 23, 2016: US09424102

In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Res ...


9
Volker M Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C Lang, Mareike Lattermann, Angel Nunez Mencias: Task grouping by context. International Business Machines Corporation, Maeve Carpenter, January 10, 2017: US09542234

In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Res ...


10
Christine Axnix, Franz Hardt, Marco Kraemer, Jakob C Lang: Configuring functional capabilities of a computer system. International Business Machines Corporation, Jared L Montanaro, January 1, 2019: US10169252

Provided is a method for configuring the functional capabilities of a computer system. The computer system may include a persistent memory and a replaceable functional unit. The method may include transferring, in response to a repair action for the functional unit, enablement data that is stored on ...