2841 patents
Page 6 of 143
Utility
Detection of abnormal transaction loops
28 Nov 23
Examples relate to detecting an abnormality.
Rotem Chen, Hava Babay Adi, Yifat Felder, Ran Biron
Filed: 28 Jul 14
Utility
Systems and Methods for Enhancing Mesh Over Wi-fi 6E
23 Nov 23
Systems and methods are provided for multiple basic service set identifier (MBSSID) beaconing (from an access point (AP) standpoint) and MBSSID/virtual AP (VAP) scanning (from a client device perspective).
Mohd Shahnawaz Siraj, Qiang Zhou, Andre Beaudin
Filed: 7 Aug 23
Utility
Provisioning a Deduplication Data Store
23 Nov 23
Example implementations relate to provisioning a deduplication data store.
Peter Thomas Camble, Andrew Todd
Filed: 23 May 22
Utility
Anomaly Detection and Tuning Recommendation System
23 Nov 23
Systems and methods are provided for detecting anomalies on multiple layers of a computer system, such as a compute server.
Klaus-Dieter Lange, Mukund Kumar, Prateek Bhatnagar, Nalamati Sai Rajesh, Nishant Rawtani, Craig Allan Estepp
Filed: 28 Jul 23
Utility
CABLE BRACKET FOR STACKED HBAs WITH BRACKET-MOUNTED CONNECTORS
23 Nov 23
In one aspect, a bracket assembly comprises a bracket and a pair of rails.
Warren A. Kartadinata, Vance B. Murakami, Neil Jefferson Asmussen
Filed: 23 May 22
Utility
Simplified raid implementation for byte-addressable memory
21 Nov 23
One aspect of the instant application can provide a storage system.
Derek Alan Sherlock
Filed: 21 Dec 21
Utility
Electrically programmable application-specific integrated circuit initialization engine
21 Nov 23
A method of initializing an application-specific integrated circuit (ASIC), the method including reading, by a boot microcode engine integrated with the ASIC, microcode from an electrically programmable non-volatile memory (EP-NVM) integrated on a same die as the ASIC.
Peter David Maroni, John E. Tillema, Erin Hallinan, Michael Joseph Howe
Filed: 31 Jul 19
Utility
Customized code bundle to enable secure communication from internet of things devices at wireless networks
21 Nov 23
Systems and methods are provided for receiving, from an access point, attributes of an Internet of Things (IoT) device connected to the access point, determining a stored device, in a database of a server, sharing a subset of the attributes of the IoT device, and generating a code bundle based on the subset of the shared attributes between the stored device and the IoT device.
Ankur Kamthe, Jian Dong, Berend Dunsbergen
Filed: 8 Feb 21
Utility
System and method for reconfiguring a network using network traffic comparisions
21 Nov 23
Example implementations relate to a method for reconfiguring a network based on network traffic comparison.
Sasindran Devaraj, Nikhil Shrishail Soragavi, Edward Muniswamy Victor Vajravelu
Filed: 6 Apr 21
Utility
Domain name system (DNS) optimization for wide area networks
21 Nov 23
A method including receiving, in a controller, from a client device in a network, a resolution query specifying a host name, is provided.
Sujeeth Padavala, Isaac Theogaraj, Amit Pingale
Filed: 23 Jun 21
Utility
Transfer of secure multicast data traffic over a computing network
21 Nov 23
Disclosed herein are systems and methods for scalable and secure transmission of multicast data over a public communication network.
Manoj Kumar Dutta, Edward Paul Travalia, Gopinath Sikha, Manoj Gopal Kulkarni, Damon John Ennis, Pawan Kumar Singh, Theodore Ernest Tedijanto
Filed: 3 Aug 21
Utility
Connecting application instances to client devices
21 Nov 23
Example implementations relate to passing a cookie between client devices such that, based on the cookie, connections to the application from the client devices are mapped to a given application instance.
Travis Pascoe, Timothy Mosier
Filed: 13 Oct 21
Utility
Method and system for dynamic quota-based congestion management
21 Nov 23
A system for facilitating sender-side congestion control is provided.
Daniel William Dauwe, Ryan Dean Menhusen, Darel Neal Emmot
Filed: 24 Aug 21
Utility
Unauthorized Data Encryption Detection Based on Pattern Matching at a Storage System
16 Nov 23
In some examples, a storage system intercepts a write request communicated over a network from a requester in a host system, the write request to write data of a data volume.
Joseph E. Algieri, Alex Veprinsky
Filed: 10 May 22
Utility
Security-enhanced Auto-configuration of Network Communication Ports for Cloud-managed Devices
16 Nov 23
Systems, methods, and computer-readable media are described for auto-configuring a network communication port such as an Ethernet port to which a network device is connected in a manner that eliminates or otherwise dramatically mitigates the manual effort required for port configuration, while at the same time, ensuring that network security is maintained by authenticating the device during the auto-configuration process.
Mathieu Mercier, Robert Gagnon, Frederic Mouveaux, Guy Letourneau
Filed: 27 Jul 23
Utility
Method and System for Providing Network Egress Fairness Between Applications
16 Nov 23
Methods and systems are provided to facilitate network egress fairness between applications.
David Charles Hewson, Timothy J. Johnson, Abdulla M. Bataineh
Filed: 28 Jul 23
Utility
Reconfiguring Beacon Frames to Minimize Network Outage
16 Nov 23
Examples described herein relate to a method for reconfiguring a beacon by an access point (AP) to minimize or avoid network outages experienced by client devices connected to the AP.
Nitin A. CHANGLANI, Abhiruchi DAKSHINKAR, Qiang ZHOU, Myung Cheol KIM
Filed: 11 May 22
Utility
Preventing malware downloads
14 Nov 23
An example embodiment of the present techniques determines, in response to a byte-serving request to download a portion of a resource, that the resource has previously been determined to comprise malware.
Ramesh Ardeli
Filed: 27 Jan 16
Utility
Switch device for facilitating switching in data-driven intelligent network
14 Nov 23
A switch architecture for a data-driven intelligent networking system is provided.
Abdulla M. Bataineh, Jonathan P. Beecroft, Thomas L. Court, Anthony M. Ford, Edwin L. Froese, David Charles Hewson, Joseph G. Kopnick, Andrew S. Kopser, Duncan Roweth, Gregory Faanes, Michael Higgins, Timothy J. Johnson, Trevor Jones, James Reinhard, Edward J. Turner, Steven L. Scott, Robert L. Alverson
Filed: 23 Mar 20
Utility
Optimizing Application Execution Based on Memory-level Parallelism (Mlp)-based Metrics
9 Nov 23
A process includes determining a memory bandwidth of a processor subsystem corresponding to an execution of an application by the processor subsystem.
Sanyam Mehta
Filed: 6 May 22