-
公开(公告)号:US10693813B1
公开(公告)日:2020-06-23
申请号:US16278114
申请日:2019-02-17
摘要: An apparatus includes a local compute node and a first networking switch. The first switch determines whether bi-directional communication is established with the compute node via a direct local link. A message received from an additional networking switch through an inter-switch link indicates whether the additional switch has its additional access/uplinks enabled. The first switch enables first access/uplinks in response to determining that the first switch has currently established bi-directional communication with the compute node and that the received message indicates that the additional networking switch has its additional access/uplinks disabled. The first networking switch disables the first access/uplinks on the first switch in response to determining that the first switch is currently unable to establish bi-directional communication with the compute node and/or receiving a message indicating that the additional networking switch has its additional access/uplinks enabled.
-
62.
公开(公告)号:US10681845B2
公开(公告)日:2020-06-09
申请号:US15935481
申请日:2018-03-26
IPC分类号: H05K7/20
摘要: Systems and methods that use thermal energy transfer devices to reduce thermal energy within environments are disclosed. According to an aspect, a method includes using a cool sink to transfer thermal energy from an environment. The method also includes using a thermal energy transfer device to transfer the thermal energy to liquid within a conduit. Further, the method includes transporting the liquid containing the transferred thermal energy away from the environment such that the thermal energy within the environment is reduced.
-
公开(公告)号:US10664364B2
公开(公告)日:2020-05-26
申请号:US15296280
申请日:2016-10-18
发明人: Fred A. Bower, III , Caihong Zhang
摘要: A method includes migrating a workload from a first server to a second server, wherein the first and second servers are within a management network. The method further includes transferring one or more configuration parameter(s) from the first server to the second server, wherein the one or more parameter(s) enables continued performance of the workload on the second server.
-
公开(公告)号:US10592659B2
公开(公告)日:2020-03-17
申请号:US15055075
申请日:2016-02-26
发明人: Gary David Cudak , John Scott Crowe , Jennifer J. Lee-Baron , Nathan J. Peterson , Amy Leigh Rose , Bryan L. Young
摘要: After first installation of an application program on a computing device, the computing devices monitors a behavior of the application program for a period of time and then builds a behavior profile of the application program from the behavior. After the period of time has elapsed, such as specified period of time, the computing device may prevent the application program from deviating from the behavior profile. After the period of time has elapsed, such as when an update or patch to the application program has been applied or installed, the computing device may continue to monitor the behavior of the application program, and in response to determining that the behavior of the application program after the period of time deviates from the behavior profile, perform an action with respect to the application program.
-
公开(公告)号:US10552600B2
公开(公告)日:2020-02-04
申请号:US15342022
申请日:2016-11-02
摘要: In one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to associate a first subset of storage space on the media storage device with a first group of applications executing on a hardware processor. The logic is also configured to cause the processor to receive a request from an application to access the first subset of storage space on the media storage device. Moreover, the logic is configured to cause the processor to prevent any application other than an application from the first group of applications from accessing the first subset of storage space on the media storage device. Other systems, methods, and computer program products for defending against ransomware attacks on devices and systems using application authority assignment are described according to more embodiments.
-
66.
公开(公告)号:US10540180B2
公开(公告)日:2020-01-21
申请号:US14562742
申请日:2014-12-07
IPC分类号: G06F9/30
摘要: Reconfigurable processors and methods for collecting computer program instruction execution statistics are disclosed. According to an aspect, a method includes providing a reconfigurable processor configured to execute a set of central processing unit (CPU) instructions that each have a function. The method also includes modifying the function of one or more of the CPU instructions that identifies an instruction address and a destination address pair of the CPU instruction(s) based on a defined test case. Further, the method includes using the reconfigurable processor to execute the set of CPU instructions. The method also includes identifying an instruction address and destination address pair of the CPU instruction(s) having the modified function when the CPU instruction(s) having the modified function is executed during execution of the set of CPU instructions.
-
公开(公告)号:US10445280B2
公开(公告)日:2019-10-15
申请号:US15291414
申请日:2016-10-12
摘要: An apparatus includes a root port for coupling to a root complex, and a plurality of endpoint ports for coupling to endpoint devices, wherein each endpoint port is associated with a function number. A downstream buffer queues transaction layer packets (TLPs) received from the root port, wherein each TLP in the downstream buffer is directed to an endpoint port associated with the identified function number. An upstream buffer queues TLPs received from each endpoint port, and directs the queued TLPs to the root port. A method includes associating a function number with each endpoint port of a switch, wherein each endpoint port is adapted for coupling to an endpoint device. The method further includes receiving a first TLP from a root complex, identifying a function number within the first TLP, and directing the first TLP to an endpoint device through the endpoint port associated with the identified function number.
-
68.
公开(公告)号:US10419433B2
公开(公告)日:2019-09-17
申请号:US15174342
申请日:2016-06-06
摘要: A computer-implemented method includes: connecting, by a network device, with a user device via an alternate communications network; and providing, by the network device to the user device and via the alternate communications network, network credentials used for wireless access to a primary communications network, wherein the primary communications network and the alternate communications network are different.
-
公开(公告)号:US10419267B2
公开(公告)日:2019-09-17
申请号:US14161238
申请日:2014-01-22
发明人: Claude Basso , Josep Cors , Venkatesh K. Janakiraman , Sze-Wa Lao , Sameer M. Shah , David A. Shedivy , Ethan M. Spiegel , Natarajan Vaidhyanathan , Colin B. Verrilli
IPC分类号: H04L12/24 , H04L12/26 , H04L12/931
摘要: Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch detects packets sent by a new or migrated virtual machine, and sends a copy of a detected packet to the network control software as a notification. The switch further learns the source MAC address, thereby permitting the entry to be used for normal forwarding prior to validation of the entry and the VM associated therewith by the network control software. Until the network control software has validated the VM, the switch may periodically retry the notification to the network control software. “No_Redirect” and “Not_Validated” flags may be used to indicate whether a notification has already been attempted and thus no retry is necessary, and that the VM associated with the VM has not yet been validated, respectively.
-
公开(公告)号:US10394681B2
公开(公告)日:2019-08-27
申请号:US15155980
申请日:2016-05-16
发明人: Shareef F. Alshinnawi , Gary D. Cudak , Joseph F. Herman, Jr. , Jason A. Matteson , J. Mark Weber
摘要: Profiling operating efficiency deviations of a computing system includes: generating a profile of expected operating efficiency for a computing system in an ideal configuration; for each of a plurality of alternative configurations of the computing system, wherein each of the alternative configurations includes a variation of the ideal configuration that introduces a deviation in operating efficiency of the computing system, said variation comprising a root cause of the deviation: monitoring operating efficiency of the computing system identifying, from the monitored operating efficiency, a deviation of operating efficiency from the expected operating efficiency; and recording, in a data structure, an association of the deviation and the root cause of the deviation.
-
-
-
-
-
-
-
-
-