Abstract: Methods, apparatuses and systems facilitating enhanced classification of network traffic based on observed flow-based and/or host-based behaviors.
Type:
Grant
Filed:
June 1, 2011
Date of Patent:
January 22, 2019
Assignee:
SYMANTEC CORPORATION
Inventors:
Suresh Babu Muppala, Guy Riddle, Scott Andrew Hankins
Abstract: Programmable hardware devices are re-programmed without system downtime. To re-program the device, the device is quiesced, state associated with the device is saved, updates are loaded, the state is restored and operations are resumed, all transparent to the system, except for a possible delay in the system.
Type:
Grant
Filed:
April 28, 2012
Date of Patent:
December 9, 2014
Assignee:
International Business Machines Corporation
Inventors:
Carl A. Bender, Nihad Hadzic, Jeffrey C. Hanscom, Howard M. Haynie, Jeffrey M. Turner
Abstract: Programmable hardware devices are re-programmed without system downtime. To re-program the device, the device is quiesced, state associated with the device is saved, updates are loaded, the state is restored and operations are resumed, all transparent to the system, except for a possible delay in the system.
Type:
Grant
Filed:
June 1, 2011
Date of Patent:
December 2, 2014
Assignee:
International Business Machines Corporation
Inventors:
Carl A. Bender, Nihad Hadzic, Jeffrey C. Hanscom, Howard M. Haynie, Jeffrey M. Turner
Abstract: A method of processing data includes receiving a request for an operand from a second processor at a first processor, encrypting the operand that has been requested using the first processor responsive to receiving the request for the operand, sending the operand that has been encrypted from the first processor to the second processor, receiving a result from the second processor at the first processor, the result generated from a single homomorphic operation being performed using the operand sent to the second processor, decrypting the result received from the second processor at the first processor, and receiving a request for the result that has been decrypted from the second processor at the first processor.