International Business Machines Corporation patent applications on 14th August 2025
Patent Applications by International Business Machines Corporation on 14th August 2025
International Business Machines Corporation: 35 patent applications
International Business Machines Corporation has applied for patents in the areas of H10D30/43 (Technology classification, 3), H10D30/6735 (Technology classification, 3), H10D30/6757 (Technology classification, 3), H10D62/121 (Technology classification, 3), H01L23/5256 (SEMICONDUCTOR DEVICES NOT COVERED BY CLASS, 2)
Patent Applications by International Business Machines Corporation
20250256815. Mobile Agricultural Holding Management
Abstract: Aspects of the present disclosure relate to mobile agricultural holding management. Crop data associated with a mobile agricultural holding can be received. Weather data associated with the mobile agricultural holding can be received. The crop data and the weather data can be analyzed to determine w...
20250258221. CO-DEBUG OF PROCESSING CONDITIONS OF LOGIC DEVICES
Abstract: A multiplexer logic device is automatically identified in a hardware definition language of a design. One or more verification properties of the multiplexer logic device are generated to be used in validation of a selected processing condition of the multiplexer logic device. The one or more verific...
20250258468. MAXIMIZING RESUABILITY OF METAL CUTTING PROCESS
Abstract: A method, computer system, and a computer program product are provided for re-using of metal by-products prior to fabrication of a main metal product. A plurality of applications are analyzed metal by-products prior to fabrication of the main metal product. The size and quantity requirements of meta...
20250258636. HUMAN-COMPUTER INTERFACE-DRIVEN DEMAND-AWARE SCREEN SHARING
Abstract: According to one embodiment, a method, computer system, and computer program product for demand-aware screen sharing is provided. The embodiment may include initiating a virtual conference between two or more participants. The embodiment may also include monitoring an audio feed of the virtual confe...
20250258647. OPTIMIZED WEIGHT, ACTIVATION, AND TILE SHUFFLING FOR HYPERDIMENSIONAL COMPUTING IN ANALOG IN-MEMORY COMPUTING
Abstract: A computer-implemented method is provided which includes receiving array information associated with a processing core, the processing core including a plurality of tiles configured for performing one or more multiply-accumulate (MAC) operations. The method includes indexing the tiles, rows of the t...
20250258668. APPLICATION SETTING SHARING
Abstract: A first user device may receive an indication of a set of application settings from a second user device. The application settings may be associated with a user application that is downloaded and installed by the user as an optional application of the first user device. In some implementations, the ...
20250258700. Efficient Container Packing in Host Nodes
Abstract: Host node container packing is provided. A minimum number of host nodes in a container orchestration environment that satisfies software resource dependencies of each respective container is determined using a dependency graph based on a group of containers that each respective host node of the mini...
20250258728. Consumer Efficiency in Messaging Middleware System
Abstract: Processing related messages in different queues in a middleware system is provided. The middleware system receives a first message that comprises a body and a header. The header includes a first message ID and a relationship key, wherein the relationship key denotes a relationship between the first ...
20250258810. IMPLEMENTING MESSAGE ACCESS FOR UNCOMMITTED TRANSACTION MESSAGES
Abstract: A method, computer program product, and computer system are provided for implementing message access for uncommitted transaction messages. The method includes: receiving a put operation of a message as part of a first transaction; permitting a get operation of the put message before the put message ...
20250258826. EFFICIENT LOOK-UP FOR VECTOR SYMBOLIC ARCHITECTURES (VSA)
Abstract: A method for hyperdimensional computing to obtain an answer to a query includes encoding each of an N number of data points related to the query with a first high dimensional vector P and a second high dimensional vector H to generate an encoded N number of data points having a P vector component an...
20250258832. OPTIMIZATION OF TIME-SERIES ANOMALY DETECTION
Abstract: An approach to time-series data point anomaly detection is presented. Data point anomalies in time-series data can cause a cascade of incorrect predictions in a time-series data prediction model. Presented herein is an approach to decompose a time-series training data set into elementary components,...
20250258839. OPTIMIZING JSON STRUCTURE
Abstract: Computer-implemented methods for optimizing the structure of JSON data are provided. Aspects include receiving first JavaScript Object Notation (JSON) data, where the first JSON data includes a plurality of data objects. Aspects also include generating, based on the first JSON data, second JSON data...
20250258923. MEMBERSHIP INFERENCE ATTACKS USING MULTIPLE SPECIALIZED MACHINE LEARNING MODELS
Abstract: A method including: receiving a training dataset and a testing dataset each comprising samples that were used to train and to test, respectively, a certain machine learning model; dividing the training dataset into non-overlapping training subsets, and the testing dataset into non-overlapping testin...
20250258933. PERFORMING COMPUTE FUNCTIONS IN SECURE COMPUTE NODES
Abstract: A computer-implemented method (CIM), according to one approach, includes causing a first compute function to be performed on a first secure compute node that is configured to retrieve data from a storage system. Performing the first compute function includes retrieving encrypted first data from the ...
20250258949. ENCAPSULATING ACCESS ALGORITHMS FOR DATA PROCESSING ENGINES
Abstract: A first data processing engine with an unpublished data format may store data on a shared storage system, where the data is in an unpublished data format. The first data processing engine may generate code, executable by a second data processing engine, where the code is configured to allow the seco...