Patents by Inventor Devon L. Dawson

Devon L. Dawson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11502902
    Abstract: Examples disclosed herein relate to a method comprising collecting, by a network monitoring tool, network data from a first device on a network. The method comprises identifying, by the network monitoring tool, a potential issue from the network data, wherein the potential issue corresponds to one aspect of the network and transmitting, by the network monitoring tool, the potential issue to a network management tool. The method also comprises identifying, by the network management tool, a first network configuration that the potential issue relates to and creating, by the network management tool, a second network configuration for the network to fix the potential issue.
    Type: Grant
    Filed: October 25, 2018
    Date of Patent: November 15, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: John A. Powell, David L. Santos, Devon L. Dawson
  • Patent number: 10897397
    Abstract: A method for network configuration validation includes identifying a target network to configure wherein the target network includes one or more switches; generating, within a network device configuration editor having a superset of configuration syntax and allowable settings values, a target network configuration for the target network; receiving a target network configuration grammar including configuration syntax and allowable settings values from the target network by interrogating the target network; limiting the superset to the received target network configuration grammar to create a limited superset; comparing the limited superset to the syntax and settings values in the target network configuration; and indicating syntax errors and settings value errors in the target network configuration.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: January 19, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: John A. Powell, David L. Santos, Devon L. Dawson
  • Publication number: 20200374196
    Abstract: A method for network configuration validation includes identifying a target network to configure wherein the target network includes one or more switches; generating, within a network device configuration editor having a superset of configuration syntax and allowable settings values, a target network configuration for the target network; receiving a target network configuration grammar including configuration syntax and allowable settings values from the target network by interrogating the target network; limiting the superset to the received target network configuration grammar to create a limited superset; comparing the limited superset to the syntax and settings values in the target network configuration; and indicating syntax errors and settings value errors in the target network configuration.
    Type: Application
    Filed: May 22, 2019
    Publication date: November 26, 2020
    Inventors: John A. Powell, David L. Santos, Devon L. Dawson
  • Publication number: 20200302320
    Abstract: In one particular example, a fuzzy logic tool includes a computing system fuzzy logic tool, including: an interface through which, in operation, a user may enter a plurality of definitions for management inferencing rules, the management inferencing rules being expressed in fuzzy logic; a knowledge base containing fuzzy logic inferencing rules about computing system management; and inferencing engine that, in operation, applies the fuzzy logic inferencing rules to implement the fuzzy logic computing system management rules and manage the managed devices.
    Type: Application
    Filed: March 22, 2019
    Publication date: September 24, 2020
    Inventors: Devon L. Dawson, David L. Santos, John A. Powell
  • Publication number: 20200302319
    Abstract: An administrative tool for use in a computing system includes: an interface through which, in operation, a user may enter a search query for information pertaining to the operation of the computing system; a knowledge base containing fuzzy logic rules about the operation of the computing system; and an inferencing engine that, in operation, applies the fuzzy logic rules to the information responsive to the search query; and return results through the interface.
    Type: Application
    Filed: March 22, 2019
    Publication date: September 24, 2020
    Inventors: Devon L. Dawson, David L. Santos, John A. Powell
  • Publication number: 20200136904
    Abstract: Examples disclosed herein relate to a method comprising collecting, by a network monitoring tool, network data from a first device on a network. The method comprises identifying, by the network monitoring tool, a potential issue from the network data, wherein the potential issue corresponds to one aspect of the network and transmitting, by the network monitoring tool, the potential issue to a network management tool. The method also comprises identifying, by the network management tool, a first network configuration that the potential issue relates to and creating, by the network management tool, a second network configuration for the network to fix the potential issue.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: John A. Powell, David L. Santos, Devon L. Dawson
  • Patent number: 9185122
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.
    Type: Grant
    Filed: October 10, 2008
    Date of Patent: November 10, 2015
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
  • Patent number: 7657491
    Abstract: A network management station includes a processor, memory coupled to the processor, and computer executable instructions provided to the memory and executable by the processor. The computer executable instructions are configured to transmit a network management message to a network device connected to the network management station over a network, receive response information from the network device based on the network management message, receive unsolicited information from the network device, and apply fuzzy logic to the received information and the unsolicited information to produce information associated with the health of the network device.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: February 2, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Devon L. Dawson, Steven V. Britt, Adrian Cowham
  • Patent number: 7647530
    Abstract: Network state information and network topology information associated with a network is retrieved and transformed using a meta-language. The transformed data is compared against known network fault patterns to identify a matching network fault signature. The matching network fault signature is used to diagnose potential cause(s) of network problems that resulted in the matched signature.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: January 12, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Steven V. Britt, Devon L. Dawson
  • Publication number: 20090300156
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.
    Type: Application
    Filed: October 10, 2008
    Publication date: December 3, 2009
    Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
  • Publication number: 20080154804
    Abstract: Embodiments include applying fuzzy based rules to information associated with various metrics from a network device to produce a variable fuzzy based rule expression. The variable fuzzy based rule expression can then be used as an input parameter to a fuzzy rule based heuristic.
    Type: Application
    Filed: October 31, 2006
    Publication date: June 26, 2008
    Inventors: Devon L. Dawson, Steven V. Britt, Adrian Cowham
  • Publication number: 20080155346
    Abstract: Network state information and network topology information associated with a network is retrieved and transformed using a meta-language. The transformed data is compared against known network fault patterns to identify a matching network fault signature. The matching network fault signature is used to diagnose potential cause(s) of network problems that resulted in the matched signature.
    Type: Application
    Filed: October 13, 2006
    Publication date: June 26, 2008
    Inventors: Steven V. Britt, Devon L. Dawson
  • Publication number: 20080148293
    Abstract: An event broker that receives various types of events in a particular device, and decodes the events to a common meaning form as a generic event that is accessible by various software applications in the device. The event broker includes a plurality of event receivers that receive the events on various ports of the device. The events are then transferred to an event driver loader that accesses a particular event driver depending on how the particular event is formatted. The event driver decodes the event and stores the generic event in an event storage system and/or passes it on to a particular software module that may need to use the event at that particular time.
    Type: Application
    Filed: October 17, 2006
    Publication date: June 19, 2008
    Inventors: Adrian Cowham, Devon L. Dawson, Daniel E. Ford
  • Publication number: 20080104094
    Abstract: In one embodiment, a method for managing syslog messages includes identifying a syslog message format that is not currently accepted, composing a syslog message template that corresponds to the syslog message format, the syslog message template comprising a regular expression having a general arrangement the corresponds to the syslog message format such that validity of future syslog messages can be determined through comparison of the future syslog messages to the regular expression, and storing the syslog message template in a location at which the syslog message template will be considered by a syslog daemon in making a message validity determination.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Inventors: Adrian Cowham, Neeshant D. Desai, Devon L. Dawson