-
1.
公开(公告)号:US20240281576A1
公开(公告)日:2024-08-22
申请号:US18169972
申请日:2023-02-16
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Debdipta Ghosh
IPC: G06F30/27
CPC classification number: G06F30/27 , G06F2111/08
Abstract: A process includes accessing data representing a directed graph model state for a computer system. The directed graph includes a plurality of transitions among the model states, and the directed graph includes, for each transition, a transition identifier that is associated with the transition and a probability that is associated with the transition. The process includes characterizing a history of the computer system to reach a current state of the computer system. The current state corresponds to a given model state and the history corresponds to first transitions. Characterizing the history includes, based on the data, identifying first transition identifiers associated with the first transition, and applying a first arithmetic operator to the first transition identifier to provide a history identifier, which corresponds to the history. The process includes, based on the history identifier, determining a likelihood that the computer system will transition from the current state to a given future state; and based on the likelihood, initiating a responsive action in anticipation of the computer system transitioning to the given future state.
-
公开(公告)号:US11645156B1
公开(公告)日:2023-05-09
申请号:US17586909
申请日:2022-01-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Debdipta Ghosh
IPC: G06F11/14
CPC classification number: G06F11/1417
Abstract: Approaches for updating an error policy based on boot-time error information and run-time error information, are described. The error policy maps an error type with a prescribed action. In an example, the error policy is updateable based run-time error information corresponding to a computing device. The updated error policy may then be used for addressing boot-time errors of computing devices.
-
公开(公告)号:US20200344326A1
公开(公告)日:2020-10-29
申请号:US16820469
申请日:2020-03-16
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Debdipta Ghosh
IPC: H04L29/08 , G06F9/455 , G06F9/4401
Abstract: In some examples, a method can include detecting, with a cloud controller, a Central Processing Unit (CPU) architecture for a bare metal server; selecting, based on the detected CPU architecture, a specific bootloader, specific Operating System (“OS”) and specific Virtual Machine (“VM”) for the bare metal server; and installing the selected bootloader, OS, and VM on the bare metal server.
-
公开(公告)号:US12105851B2
公开(公告)日:2024-10-01
申请号:US17486288
申请日:2021-09-27
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Debdipta Ghosh
CPC classification number: G06F21/64 , G06F8/65 , G06F21/552 , G06F21/566 , G06F21/602
Abstract: A system hash for each production system is generated. Each system hash includes a concatenation of a hardware hash and a software hash of each production system in the datacenter. A datacenter hash tree is created based on a combination of the system hashes. A test copy of the software hash of each of the production systems is created in respective test systems in the datacenter. In response to detecting a change in the datacenter hash tree, a modification in a system hash which resulted in the change is identified. The central copy of the software hash is compared with the test copy of the software hash. In response to a mismatch between the central copy and the test copy, occurrence of an unauthorized attack in a software of the production system is detected.
-
公开(公告)号:US11537468B1
公开(公告)日:2022-12-27
申请号:US17457679
申请日:2021-12-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Debdipta Ghosh , Renganathan Meenakshisundaram
Abstract: In some examples, a system records, in a data structure stored in a non-volatile storage, information of memory errors in respective segments of a memory. The system determines whether memory errors of a subset of the segments satisfy a criterion, and in response to determining that the memory errors of the subset of the segments satisfy the criterion, the system groups the memory errors of the subset into a partition having a size greater than a size of a segment. The system records, in the data structure, information of memory errors in the partition, and in response to a restart of the system, retrieves the data structure from the non-volatile storage for use in an operation that addresses memory errors in the system.
-
公开(公告)号:US11934840B2
公开(公告)日:2024-03-19
申请号:US17231554
申请日:2021-04-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Somasundaram Arunachalam , Debdipta Ghosh
IPC: G06F15/177 , G06F9/4401 , G06F9/50 , G06F18/214 , G06N7/01
CPC classification number: G06F9/4403 , G06F9/4411 , G06F9/5044 , G06F18/214 , G06N7/01 , G06F9/4406
Abstract: Approaches for classifying hardware components of a computing device using a classification system are described. In an example, by the classification system, a hardware configuration information of the computing device installed within a networked environment is obtained. The hardware configuration information may thus be processed based on a system classification model. The system classification model is to classify hardware components of the computing device as one of a plurality of hardware types. Once the hardware components are classified, a category of the computing device is determined. Based on the determined category, a target system software is identified and installed onto the computing device.
-
公开(公告)号:US20230026057A1
公开(公告)日:2023-01-26
申请号:US17486288
申请日:2021-09-27
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Debdipta Ghosh
Abstract: SECURE DATA CENTER UPDATE AND MONITORING A system hash for each production system is generated. Each system hash includes a concatenation of a hardware hash and a software hash of each production system in the datacenter. A datacenter hash tree is created based on a combination of the system hashes. A test copy of the software hash of each of the production systems is created in respective test systems in the datacenter. In response to detecting a change in the datacenter hash tree, a modification in a system hash which resulted in the change is identified. The central copy of the software hash is compared with the test copy of the software hash. In response to a mismatch between the central copy and the test copy, occurrence of an unauthorized attack in a software of the production system is detected.
-
-
-
-
-
-