Patents by Inventor Christian Maciocco

Christian Maciocco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230086899
    Abstract: A computing node includes interface circuitry and processing circuitry. To implement a spectrum harvesting entity in a wireless network configured for crowdsource-based unlicensed spectrum harvesting, the processing circuitry is configured to select a set of crowdsourcing nodes from a plurality of crowdsourcing nodes available in the wireless network. A plurality of spectrum occupancy reports (SORs) is received from the set of crowdsourcing. Each of the plurality of SORs indicates a channel occupancy status of a communication channel in the unlicensed spectrum sensed by a corresponding crowdsourcing node of the set and geolocation associated with the corresponding crowdsourcing node. A spectrum occupancy map of the unlicensed spectrum is generated based on the channel occupancy status and the geolocation provided in the plurality of SORs by each crowdsourcing node of the set of crowdsourcing nodes.
    Type: Application
    Filed: September 23, 2021
    Publication date: March 23, 2023
    Inventors: Vesh Raj Sharma Banjade, S M Iftekharul Alam, Kuilin Clark Chen, Kshitij Arun Doshi, Francesc Guim Bernat, Christian Maciocco, Ned M. Smith, Liuyang Lily Yang, Satish Chandra Jha
  • Publication number: 20230022409
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to manage a self-adaptive heterogeneous emergency network. An example apparatus to establish recovery nodes includes failure detection circuitry to determine a node initiated a reset procedure, override circuitry to suppress a native recovery procedure of the node, formation circuitry to initiate a heterogeneous recovery procedure, and trust circuitry to measure a root of trust of the node. Further, the example apparatus instantiates the formation circuitry further to broadcast heterogeneous recovery packets, and activate listener ports for responses to the heterogeneous recovery packets.
    Type: Application
    Filed: September 30, 2022
    Publication date: January 26, 2023
    Inventors: Ned M. Smith, Francesc Guim Bernat, Satish Jha, Vesh Raj Sharma Banjade, Arvind Merwaday, S M Iftekharul Alam, Christian Maciocco, Kshitij Arun Doshi, Wei Mao, Rath Vannithamby, Srikathyayani Srikanteswara, Yi Zhang, Hao Feng, Nageen Himayat, Hosein Nikopour, Liuyang Yang, Kathiravetpillai Sivanesan, Alexander Bachmutsky
  • Publication number: 20230018191
    Abstract: Systems and techniques for service roaming between edge computing platforms are described herein. A service executing on a first edge computing platform may be identified to be migrated to a second edge computing platform. A first service component may be determined that is being executed by the first edge computing platform. Transmission of the service to the second edge platform may be initiated to execute a second service component for execution of the service.
    Type: Application
    Filed: September 27, 2022
    Publication date: January 19, 2023
    Inventors: Hassnaa Moustafa, Francesc Guim Bernat, Kshitij Arun Doshi, Christian Maciocco, Srikathyayani Srikanteswara, Maruti Gupta Hyde, Ned M. Smith, Geng Wu
  • Patent number: 11513957
    Abstract: Methods and apparatus implementing Hardware/Software co-optimization to improve performance and energy for inter-VM communication for NFVs and other producer-consumer workloads. The apparatus include multi-core processors with multi-level cache hierarchies including and L1 and L2 cache for each core and a shared last-level cache (LLC). One or more machine-level instructions are provided for proactively demoting cachelines from lower cache levels to higher cache levels, including demoting cachelines from L1/L2 caches to an LLC. Techniques are also provided for implementing hardware/software co-optimization in multi-socket NUMA architecture system, wherein cachelines may be selectively demoted and pushed to an LLC in a remote socket. In addition, techniques are disclosure for implementing early snooping in multi-socket systems to reduce latency when accessing cachelines on remote sockets.
    Type: Grant
    Filed: September 21, 2020
    Date of Patent: November 29, 2022
    Assignee: Intel Corporation
    Inventors: Ren Wang, Andrew J. Herdrich, Yen-cheng Liu, Herbert H. Hum, Jong Soo Park, Christopher J. Hughes, Namakkal N. Venkatesan, Adrian C. Moga, Aamer Jaleel, Zeshan A. Chishti, Mesut A. Ergin, Jr-shian Tsai, Alexander W. Min, Tsung-yuan C. Tai, Christian Maciocco, Rajesh Sankaran
  • Patent number: 11507643
    Abstract: At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: November 22, 2022
    Assignee: Intel Corporation
    Inventors: Malini K. Bhandaru, Kapil Sood, Christian Maciocco, Isaku Yamahata, Yunhong Jiang
  • Publication number: 20220329433
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to protect distributed data. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of instantiate or execute the machine readable instructions to detect a key identifier combination from a distributed key, identify a match between the key identifier combination and a platform identifier combination, extract a second key from the distributed key, the second key associated with the object, and decrypt the object via the extracted second key.
    Type: Application
    Filed: June 17, 2022
    Publication date: October 13, 2022
    Inventors: Kshitij Arun Doshi, Christian Maciocco, Ned M. Smith, Francesc Guim Bernat, Satish Jha, Vesh Raj Sharma Banjade, Arvind Merwaday, S M Iftekharul Alam, Kuilin Clark Chen
  • Publication number: 20220329499
    Abstract: Various systems and methods for providing opportunistic placement of compute in an edge network are described herein. A node in an edge network may be configured to access a service level agreement related to a workload, the workload to be orchestrated for a user equipment by the node; modify a machine learning model based on the service level agreement; implement the machine learning model to identify resource requirements to execute the workload in a manner to satisfy the service level agreement; initiate resource assignments from a resource provider, the resource assignments to satisfy the resource requirements; construct a resource hierarchy from the resource assignments; initiate execution of the workload using resources from the resource hierarchy; and monitor and adapt execution of the workload based on the resource hierarchy in response to the execution of the workload.
    Type: Application
    Filed: June 28, 2022
    Publication date: October 13, 2022
    Inventors: Ned M. Smith, S M Iftekharul Alam, Satish Chandra Jha, Vesh Raj Sharma Banjade, Christian Maciocco, Kshitij Arun Doshi, Francesc Guim Bernat, Nageen Himayat
  • Publication number: 20220329522
    Abstract: Disclosed are systems and methods for adaptive resilient network communication. A system may monitor network traffic on multiple pathways between user equipment and an application or a service at a network destination, gather network telemetry data from the monitored network traffic, input the network telemetry data into a trained artificial intelligence model, and classify the network telemetry data using the model. The system may further determine, using the model, an anomaly condition in at least a portion of the multiple pathways, and in response to the determination of an anomaly, select a mitigation technique for the at least a portion of the multiple pathways.
    Type: Application
    Filed: June 29, 2022
    Publication date: October 13, 2022
    Inventors: Christian Maciocco, Ren Wang, Kshitij Arun Doshi, Francesc Guim Bernat, Ned M. Smith, Satish Chandra Jha, Vesh Raj Sharma Banjade, S M Iftekharul Alam, Shu-ping Yeh
  • Publication number: 20220272012
    Abstract: Examples described herein relate to dynamically composing an application as a monolithic implementation or two or more microservices based on telemetry data. In some examples, based on composition of an application as two or more microservices, at least one connection between microservices based on telemetry data is adjusted. In some examples, a switch can be configured to perform forwarding of communications between microservices based on the adjusted at least one connection between microservices.
    Type: Application
    Filed: May 13, 2022
    Publication date: August 25, 2022
    Inventors: S M Iftekharul ALAM, Ned SMITH, Vesh Raj SHARMA BANJADE, Satish C. JHA, Christian MACIOCCO, Mona VIJ, Kshitij A. DOSHI, Srikathyayani SRIKANTESWARA, Francesc GUIM BERNAT, Maruti GUPTA HYDE, Alexander BACHMUTSKY
  • Publication number: 20220231964
    Abstract: A resource management framework may be used to improve performance of dominant and non-dominant resources for edge multi-tenant applications. The resource management framework may include an admission control mechanism, which may be used to balance disproportionate resource allocations by controlling allocation of unconstrained resources proportional to the requested dominant resources based on resource availability. The admission control mechanism may provide ongoing monitoring of dominant and non-dominant resource utilization, such as using a hybrid centralized-distributed telemetry collection approach. The resource management framework may also include a lightweight resource monitoring and policy enforcement mechanism on distributed networking elements to reduce or eliminate the exploitations of non-dominant resources.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 21, 2022
    Inventors: S M Iftekharul Alam, Satish Chandra Jha, Ned M. Smith, Vesh Raj Sharma Banjade, Kshitij Arun Doshi, Francesc Guim Bernat, Arvind Merwaday, Kuilin Clark Chen, Christian Maciocco
  • Publication number: 20220222118
    Abstract: Methods, apparatus, and systems for adaptive collaborative memory with the assistance of programmable networking devices. Under one example, the programmable networking device is a switch that is deployed in a system or cluster of servers comprising a plurality of nodes. The switch selects one or more nodes to be remote memory server nodes and allocate one or more portions of memory on those nodes to be used as remote memory for one or more remote memory client nodes. The switch receives memory access request messages originating from remote memory client nodes containing indicia identifying memory to be accessed, determines which remote memory server node is to be used for servicing a given memory access request, and sends a memory access request message containing indicia identifying memory to be accessed to the remote memory server node that is determined. The switch also facilitates return of messages containing remote memory access responses to the client nodes.
    Type: Application
    Filed: March 31, 2022
    Publication date: July 14, 2022
    Inventors: Ren WANG, Christian MACIOCCO, Yipeng WANG, Kshitij A. DOSHI, Vesh Raj SHARMA BANJADE, Satish C. JHA, S M Iftekharul ALAM, Srikathyayani SRIKANTESWARA, Alexander BACHMUTSKY
  • Publication number: 20220225227
    Abstract: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Ned M. Smith, Arvind Merwaday, Kshitij Arun Doshi, Francesc Guim Bernat, Liuyang Lily Yang, Kuilin Clark Chen, Christian Maciocco, Marcio Rogerio Juliato, Maruti Gupta Hyde, Manoj R. Sastry
  • Publication number: 20220224442
    Abstract: System and techniques for semantic network data correction are described herein. Semantic data corresponding to a data stream may be received. Here, the semantic data is based on the data stream. The data stream, including packets, is received. At least one packet has an error due to transmission via a network link. This error introduces an ambiguity for content of the packet. The error is corrected using the semantic data. The semantic data providing a constraint on the ambiguity to eliminate possible corrections for the error.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Amar Srivastava, Kshitij Arun Doshi, Christian Maciocco
  • Publication number: 20220191648
    Abstract: Systems and techniques for digital twin framework for next generation networks are described herein. A digital twin model may be generated for physical nodes of an edge network. The digital twin model may include a digital twin for a physical node of the physical nodes. An error may be identified of the physical node or the digital twin for the physical node. The digital twin model may be updated to halt communication with the physical node or the digital twin of the physical node. A path may be created to another physical node or a digital twin of the another physical node in the digital twin model.
    Type: Application
    Filed: December 20, 2021
    Publication date: June 16, 2022
    Inventors: Ned M. Smith, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Satish Chandra Jha, Liuyang Lily Yang, Christian Maciocco, Nageen Himayat, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi
  • Publication number: 20220171643
    Abstract: In the present disclosure, functions associated with the central office of an evolved packet core network are co-located onto a computer platform or sub-components through virtualized function instances. This reduces and/or eliminates the physical interfaces between equipment and permits functional operation of the evolved packet core to occur at a network edge.
    Type: Application
    Filed: February 14, 2022
    Publication date: June 2, 2022
    Applicant: Intel Corporation
    Inventors: Ashok Sunder Rajan, Richard A. Uhlig, Rajendra S. Yavatkar, Tsung-Yuan C. Tai, Christian Maciocco, Jeffrey R. Jackson, Daniel J. Dahle
  • Publication number: 20220138156
    Abstract: Methods, apparatus, systems, and articles of manufacture providing a tiered elastic cloud storage to increase data resiliency are disclosed.
    Type: Application
    Filed: November 8, 2021
    Publication date: May 5, 2022
    Inventors: Ren Wang, Christian Maciocco, Kshitij Doshi, Francesc Guim Bernat, Ned Smith, Satish Jha, Vesh Raj Sharma Banjade, S M Iftekharul Alam
  • Patent number: 11316946
    Abstract: Generally discussed herein are systems, devices, and methods for populating a cache in an information-centric network. A device of an ICN can include a content store including published content and attributes of the published content stored thereon, the attributes including at least two of a device from which the content originated attribute, a lineage attribute, and a service level agreement attribute, and content processing circuitry coupled to the content store, the content processing circuitry configured to manage the published content based on the attributes.
    Type: Grant
    Filed: August 19, 2020
    Date of Patent: April 26, 2022
    Assignee: Intel Corporation
    Inventors: Sebastian Schoenberg, Andrew Stephen Brown, Srikathyayani Srikanteswara, Jessica C. McCarthy, Eve M. Schooler, Christian Maciocco, Hassnaa Moustafa, Nageen Himayat, Rath Vannithamby, David John Zage
  • Publication number: 20220124548
    Abstract: The present disclosure relates to techniques for determining optimal routing paths for computing devices in a network, including selecting an optimal gateway among a number of available gateways. The techniques include gathering data regarding characteristics of a network, including gateways and network access nodes (NANs) in at least one access network. The characteristics can include, e.g., supported frequency bands, communication protocols, signal-to-noise ratio, power, signal noise and quality, slicing information, and whether a network vender is a standalone network vendor or a non-standalone network vendor. In one aspect, the characteristics are obtained using the Mobile Broadband Interface Model (MBIM). The characteristics can be used by devices in determining routing paths based on requirements of individual flows and/or workflows of individual application instances.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 21, 2022
    Inventors: Amar Srivastava, Kshitij A. Doshi, Cristian Florin Dumitrescu, Christian Maciocco
  • Publication number: 20220111870
    Abstract: Disclosed herein are systems and methods for peer-assisted safety models for autonomous and assisted-driving vehicles. In an embodiment, a safety-model service receives a safety-model request for a safety model from a target vehicle. The safety-model service identifies, responsive to receiving the safety-model request, one or more source vehicles as safety-model input sources. The safety-model service receives safety-model data associated with the identified one or more source vehicles. The safety-model service generates, based on the safety-model request and the received safety-model data, a target-vehicle safety model for the target vehicle. The safety-model service transmits the target-vehicle safety model to the target vehicle for use by the target vehicle.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: Amar Srivastava, Christian Maciocco, Kshitij Arun Doshi, Ignacio J. Alvarez
  • Publication number: 20220116335
    Abstract: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of slice contexts. Each slice context of the plurality includes resource allocations of the available computing resources associated with multiple communication networks. A first portion of the resource allocations is designated as dedicated resources and a second, remaining portion is designated as shared resources. A FAFO event associated with a workload is detected. The workload executes on a network slice instance (NSI) associated with a slice context of a subset of slice contexts. The configuration of the NSI is restored to a pre-FAFO event state based on reconfiguring one or both of the dedicated resources or the shared resources of the slice context based on the resource allocations of at least a second slice context in the subset of slice contexts.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Ned M. Smith, S M Iftekharul Alam, Christian Maciocco, Liuyang Lily Yang, Mona Vij, Kshitij Arun Doshi, Francesc Guim Bernat, Clark Chen