-
公开(公告)号:US20180121372A1
公开(公告)日:2018-05-03
申请号:US15570767
申请日:2015-05-01
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Geoff M. Lyon , Amip J. Shah , Henry Sang , Henri J. Suermondt
IPC: G06F12/14
CPC classification number: G06F12/1466 , G06F9/52 , G06F12/1408 , G06F12/1425 , G06F13/16 , G06F21/00 , G06F21/85 , G06F2212/1052
Abstract: Examples relate to providing throttled data memory access. In some examples, a locking mechanism is used to activate a corresponding memory lock after receiving a first read access cycle. While the corresponding memory lock is active, responses to subsequent read access cycles are prevented. After the corresponding memory lock deactivates, a second read access cycle is responded to with access to the memory.
-
公开(公告)号:US20180114027A1
公开(公告)日:2018-04-26
申请号:US15298724
申请日:2016-10-20
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Gowtham Bellala , Bernardo Huberman , Amip J. Shah
CPC classification number: G06F21/602 , G06F16/27 , G06F21/6218 , H04L9/3218 , H04L2209/046 , H04L2209/34 , H04L2209/88
Abstract: Techniques for secure linking of attributes between a first node and a plurality of nodes are provided. In one aspect, the first node and the plurality of nodes maintain a distributed data set. The techniques may include encoding the attributes as integer values at the first node. The nodes of the plurality of nodes that include matching attributes may be determined using a secure list matching protocol.
-
公开(公告)号:US20180165464A1
公开(公告)日:2018-06-14
申请号:US15571053
申请日:2015-07-24
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Geoff M. Lyon , Amip J. Shah , Henry W. Sang, JR. , Jaap Suermondt
CPC classification number: G06F21/62 , G06F3/062 , G06F3/0656 , G06F3/0659 , G06F3/067 , G06F21/606 , G06F21/78 , G06F21/85 , H04L63/10
Abstract: Examples relate to throttling data access using a data porch. In some examples, an analysis engine is used to access memory and prepare a data response for a data request that is obtained from the data porch via a throttled data buffer. The data response is sent to the data porch via the throttled data buffer, where the throttled data buffer has a throttled data bandwidth that limits a data flow of data requests and data responses between the analysis engine and the data porch. In response to receiving the data response from the analysis engine via the throttled data buffer, the data porch is used to provide the data response to a networked device.
-
公开(公告)号:US20160217378A1
公开(公告)日:2016-07-28
申请号:US14914141
申请日:2013-08-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gowtham Bellala , Manish Marwah , Martin Arlitt , Amip J. Shah
CPC classification number: G06N5/04 , G05B15/02 , G05B23/024 , G06N20/00
Abstract: Described herein are techniques for identifying anomalous behavior of a monitored entity. Features can be extracted from data related to operation of an entity. The features can be mapped to a plurality of states to generate a state sequence. An observed value of a metric can be compared to an expected value of the metric based on the state sequence.
Abstract translation: 这里描述的是用于识别受监视实体的异常行为的技术。 可以从与实体的操作相关的数据中提取特征。 可以将特征映射到多个状态以生成状态序列。 可以将度量的观察值与基于状态序列的度量的期望值进行比较。
-
公开(公告)号:US11042656B2
公开(公告)日:2021-06-22
申请号:US15571053
申请日:2015-07-24
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Geoff M. Lyon , Amip J. Shah , Henry W. Sang, Jr. , Henri J. Suermondt
Abstract: Examples relate to throttling data access using a data porch. In some examples, an analysis engine is used to access memory and prepare a data response for a data request that is obtained from the data porch via a throttled data buffer. The data response is sent to the data porch via the throttled data buffer, where the throttled data buffer has a throttled data bandwidth that limits a data flow of data requests and data responses between the analysis engine and the data porch. In response to receiving the data response from the analysis engine via the throttled data buffer, the data porch is used to provide the data response to a networked device.
-
-
-
-