-
公开(公告)号:US11734086B2
公开(公告)日:2023-08-22
申请号:US16370839
申请日:2019-03-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Naveena Kedlaya , Sharath Karkada Srinivasa , Bindu Loganathan
CPC classification number: G06F9/542 , G06F11/006 , G06F2201/86
Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
-
公开(公告)号:US11733932B2
公开(公告)日:2023-08-22
申请号:US14912681
申请日:2013-09-27
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gregg B Lesartre , Andrew R Wheeler
IPC: G06F3/06 , G06F12/121 , G06F12/1045 , G06F12/08 , G06F12/0802 , G06F12/1009 , G06F12/12
CPC classification number: G06F3/0685 , G06F3/065 , G06F3/0619 , G06F12/08 , G06F12/0802 , G06F12/1054 , G06F12/121 , G06F12/1009 , G06F12/12 , G06F2212/1021 , G06F2212/222 , G06F2212/60
Abstract: Example implementations relate to managing data on a memory module. Data may be transferred between a first NVM and a second NVM on a memory module. The second NVM may have a higher memory capacity and a longer access latency than the first NVM. A mapping between a first address and a second address may be stored in an NVM on the memory module. The first address may refer to a location at which data is stored in the first NVM. The second address may refer to a location, in the second NVM, from which the data was copied.
-
公开(公告)号:US20230262093A1
公开(公告)日:2023-08-17
申请号:US17672262
申请日:2022-02-15
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gopal Gupta , Abhinesh Mishra
CPC classification number: H04L63/20 , H04L63/0245 , H04L63/1425 , H04L63/1441 , H04L63/1433 , G06N20/00
Abstract: A system receives one or more ingress data packets from a client device or a user in a network. The system obtains attributes, via packet inspection, from the one or more ingress data packets, and determines one or more embedding vectors from the attributes. The one or more embedding vectors represent a status of a session during which the ingress data packets are obtained. The system transmits the one or more embedding vectors as inputs to a trained machine learning model. The system infers, using the trained machine learning mode, one or more security policies based on the embedding vectors. The system provides or implementing the one or more security policies.
-
公开(公告)号:US20230261410A1
公开(公告)日:2023-08-17
申请号:US17673233
申请日:2022-02-16
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: See Yun Yow , Tatt Hoong Chow , Foo Luen Wong , Mun Hoong Tai
IPC: H01R13/453
CPC classification number: H01R13/4534
Abstract: Example implementations relate to an insertion key assembly for a pluggable module. The insertion key assembly includes a stopper element having a stopping tab, a biasing element, and a driver element having a driving tab. The biasing element is connected to the stopper element and the driver element. In a relaxed state of the biasing element: i) the stopper element is pushed outwards by the biasing element to protrude the stopping tab into a passageway defined by a plurality of walls of a chassis, to block insertion of the pluggable module inside the passageway, and ii) the driver element is pushed outwards by the biasing element to protrude the driving tab into adjacent passageway. In a biased state of the biasing element, the stopper element is pulled inwards by the biasing element to retract the stopping tab from the passageway to allow insertion of the pluggable module inside the passageway.
-
265.
公开(公告)号:US11729100B2
公开(公告)日:2023-08-15
申请号:US17477505
申请日:2021-09-16
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jonathan Michael Seely , Giuseppe Scaglione , Sergio Jesus Guillen Hernandez , Paymon Ghamami
IPC: H04L47/12 , H04L47/22 , H04L47/10 , H04L47/52 , H04L47/2416
CPC classification number: H04L47/12 , H04L47/22 , H04L47/2416 , H04L47/29 , H04L47/521
Abstract: A system for facilitating an integrated traffic profile for indicating congestion and packet drop is provided. During operation, the system can determine a first traffic profile indicating whether to drop a packet based on the utilization of a queue. The packets from the queue can be forwarded via an egress port reachable via a fabric. The system can also determine a second traffic profile indicating whether to indicate congestion in the packet based on the utilization. The system can then determine a third traffic profile by combining the first and second traffic profiles. The third traffic profile can indicate acceptance at the queue for a subset of packets being selected for dropping based on the utilization. Subsequently, the system can, if the packet is selected for dropping, determine whether to accept the packet at the queue and set a congestion indicator in the packet based on the third traffic profile.
-
公开(公告)号:US11729022B2
公开(公告)日:2023-08-15
申请号:US17644940
申请日:2021-12-17
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Christopher Murray
IPC: H04L12/437 , H04L45/00 , H04L43/10
CPC classification number: H04L12/437 , H04L43/10 , H04L45/26
Abstract: Techniques for uplink connectivity determination are disclosed. In an example, a Frame Link Module (FLM) in a frame, belonging to a group of frames connected in a ring network, may generate an uplink discovery packet. The FLM may determine, based on a Link Layer Discovery Protocol (LLDP) packet received by the standby uplink from a customer network accessing the ring that the standby uplink has a link to the customer network. The FLM may forward the uplink discovery packet to the standby uplink via a Peripheral Component Interconnect (PCI) interface. The FLM may send the uplink discovery packet to the customer network through the standby uplink directed to an owner FLM. The owner FLM may monitor receipt of the uplink discovery packet from the customer network through a current active uplink and on successful receipt may determine that the standby uplink and switches in the customer network are correctly configured.
-
公开(公告)号:US20230251784A1
公开(公告)日:2023-08-10
申请号:US17650167
申请日:2022-02-07
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Xiaokang Sang , Tao Jin
IPC: G06F3/06
CPC classification number: G06F3/0629 , G06F3/0604 , G06F3/0679
Abstract: In some examples, a system causes execution, in each respective storage node of a cluster of storage nodes, of a respective frontend service that provides a frontend to a client over a network for access by the client of a storage volume accessible by the cluster of storage nodes. The system obtains node-specific configuration data portions from a configuration data repository, the node-specific configuration data portions being for respective storage nodes of the cluster of storage nodes, and sends the node-specific configuration data portions to the respective frontend services for configuring the frontend services.
-
公开(公告)号:US11722237B2
公开(公告)日:2023-08-08
申请号:US17495789
申请日:2021-10-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Mir Ashkan Seyedi
CPC classification number: H04J14/0227 , H04B10/25 , H04B10/50 , H04B10/60 , G02B6/12007 , G02B6/2938 , G02B6/29338 , G02B6/29395
Abstract: Systems, methods, and computer-readable media are described for performing link training to enable optical pass-through (OPT) capabilities of a network node. OPT capabilities may refer to on-chip wavelength routing for a multi-wavelength data input, whereby an intermediate node detects wavelengths that are intended for OPT and transparently passes the wavelengths through to downstream nodes. When executed at an intermediate network node, an OPT link training algorithm can result in the creation of one or more wavelength routing maps that associate wavelengths received on particular inputs to the node with particular outputs of the node. An intermediate node may generate a respective wavelength routing map for each transmit node from which it receives input data. The wavelength routing maps may together implement OPT capabilities at the intermediate node as each wavelength routing map may indicate the manner in which wavelengths are passed through the intermediate node for a given transmit node.
-
公开(公告)号:US20230246971A1
公开(公告)日:2023-08-03
申请号:US17661088
申请日:2022-04-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Madhusoodhana Chari Sesha
CPC classification number: H04L47/2441 , H04L41/16 , H04L47/805 , H04L43/16 , H04L63/1425 , H04L63/0236 , G06N5/022
Abstract: Examples described herein relate to selectively forwarding traffic flows based on traffic flow classification. Examples include classifying a traffic flow into a first traffic class by a first machine learning (ML) model based on flow characteristics of the traffic flow. A second traffic class is determined based on a deviation between the flow characteristics of the traffic flow and average flow characteristics of each of the plurality of traffic classes. A quality metric for the first ML model is updated based on whether the first traffic class and the second traffic class match. The traffic flow is selectively forwarded based on the quality metric.
-
公开(公告)号:US20230246827A1
公开(公告)日:2023-08-03
申请号:US17588620
申请日:2022-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Luis E. Luciani, JR. , Douglas R. Hascall , Michael R. Garrett
IPC: H04L9/08 , G06F9/4401
CPC classification number: H04L9/0861 , H04L9/0891 , H04L9/0894 , G06F9/4401
Abstract: A management controller of a computer platform, determines whether an ownership history of management firmware for the management controller represents multiple owners. The management controller includes a set of one-time programmable elements that represent a first secret. The management controller manages use of the first secret based on the ownership history. The management includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, generating, by the management controller, a second secret to replace the first secret. The management further includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, storing, by the management controller, the second secret in a non-volatile memory and generating, by the management controller, cryptographic keys based on the second secret.
-
-
-
-
-
-
-
-
-