-
公开(公告)号:US10657286B2
公开(公告)日:2020-05-19
申请号:US14994954
申请日:2016-01-13
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US11379712B2
公开(公告)日:2022-07-05
申请号:US16155036
申请日:2018-10-09
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
IPC: G06N3/063
Abstract: Disclosed is a method, system, and computer readable medium to manage (and possibly replace) cycles in graphs for a computer device. The method includes detecting a compound operation including a first tensor, the compound operation resulting from source code represented in a first graph structure as part of a compilation process from source code to binary executable code. To address a detected cycle, an instance of a proxy class may be created to store a pointer to a proxy instance of the first tensor based on the detection. In some examples, using the instance of the proxy class facilitates implementation of a level of indirection to replace a cyclical portion of the graph structure with an acyclical portion such that the second graph structure indicates assignment of a result of the compound operation to the proxy instance of the first tensor. Optimization may reduce a total number of indirection replacements.
-
公开(公告)号:US20210334335A1
公开(公告)日:2021-10-28
申请号:US16860357
申请日:2020-04-28
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Mashood Abdulla Kodavanji , Soumitra Chatterjee , Chinmay Ghosh , Mohan Parthasarathy
Abstract: Repeating patterns are identified in a matrix. Based on the identification of the repeating patterns, instructions are generated, which are executable by processing cores of a dot product engine to allocate analog multiplication crossbars of the dot product engine to perform multiplication of the matrix with a vector.
-
公开(公告)号:US20220164229A1
公开(公告)日:2022-05-26
申请号:US17302012
申请日:2021-04-21
Applicant: Hewlett Packard Enterprise Development LP
IPC: G06F9/50
Abstract: Examples described herein relate to a management node and a method for managing deployment of a workload. The management node may obtain values of resource labels related to platform characteristics of a plurality of worker nodes. Further, the management node may determine values of one or more custom resource labels for each of the plurality of worker nodes, wherein a value of each custom resource label of the one or more custom resource labels is determined based on values of a respective set of resource labels of the resource labels. Furthermore, the management node may receive a workload deployment request including a workload description of a workload. Moreover, the management node may deploy the workload on a worker node of the plurality of worker nodes based on the workload description and the values of the one or more custom resource labels.
-
公开(公告)号:US11048822B2
公开(公告)日:2021-06-29
申请号:US16875965
申请日:2020-05-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US20200279055A1
公开(公告)日:2020-09-03
申请号:US16875965
申请日:2020-05-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Brijesh Nambiar , Mohan Parthasarathy , Prasad Palkar
Abstract: A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or more obfuscated data corresponds to one or more anonymized data. Thereafter, an identifier is generated for each of the one or more anonymized data, and each identifier is substituted for its corresponding anonymized data. The anonymized data and its corresponding identifiers are separately maintained from the stored flow.
-
公开(公告)号:US20250138963A1
公开(公告)日:2025-05-01
申请号:US18589869
申请日:2024-02-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Renganathan Meenakshisundaram , Lavanya Munivenkatappa , Pawan Kumar , Rupa Ramakrishna , Mohan Parthasarathy
Abstract: One aspect of the instant application can provide a system and method for replacing a faulty or failing memory device during runtime. During operation, a host device of a plurality of coupled memory devices can detect an error-containing memory device and select, from a pool of standby memory devices, a replacement memory device. The host device can migrate data from the error-containing memory device to the replacement memory device during runtime of applications executing on the host device, replicate host physical address (HPA) address-mapping from the error-containing memory device to the replacement memory device, and replace the error-containing memory device with the replacement memory device.
-
公开(公告)号:US12124884B2
公开(公告)日:2024-10-22
申请号:US17302012
申请日:2021-04-21
Applicant: Hewlett Packard Enterprise Development LP
IPC: G06F9/50
CPC classification number: G06F9/505 , G06F9/5094
Abstract: Examples described herein relate to a management node and a method for managing deployment of a workload. The management node may obtain values of resource labels related to platform characteristics of a plurality of worker nodes. Further, the management node may determine values of one or more custom resource labels for each of the plurality of worker nodes, wherein a value of each custom resource label of the one or more custom resource labels is determined based on values of a respective set of resource labels of the resource labels. Furthermore, the management node may receive a workload deployment request including a workload description of a workload. Moreover, the management node may deploy the workload on a worker node of the plurality of worker nodes based on the workload description and the values of the one or more custom resource labels.
-
公开(公告)号:US20230269126A1
公开(公告)日:2023-08-24
申请号:US17652335
申请日:2022-02-24
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Mohan Parthasarathy , Matthew James Muggeridge , Vinay Venugopal , Srinivasan Varadarajan Sahasranamam
Abstract: In some examples, a system includes a plurality of electronic devices each comprising a respective management processor and a baseboard management controller (BMC). A management processor of a cluster of management processors is a primary management processor to act as a management controller for the plurality of electronic devices. The management controller interacts with the BMC in a respective electronic device to perform management of the respective electronic device. The cluster of management processors performs failover responsive to a fault of the primary management processor to select another management processor of the cluster of the management processors as the management controller.
-
-
-
-
-
-
-
-