Patents by Inventor Devon L. Dawson
Devon L. Dawson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11502902Abstract: Examples disclosed herein relate to a method comprising collecting, by a network monitoring tool, network data from a first device on a network. The method comprises identifying, by the network monitoring tool, a potential issue from the network data, wherein the potential issue corresponds to one aspect of the network and transmitting, by the network monitoring tool, the potential issue to a network management tool. The method also comprises identifying, by the network management tool, a first network configuration that the potential issue relates to and creating, by the network management tool, a second network configuration for the network to fix the potential issue.Type: GrantFiled: October 25, 2018Date of Patent: November 15, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: John A. Powell, David L. Santos, Devon L. Dawson
-
Patent number: 10897397Abstract: A method for network configuration validation includes identifying a target network to configure wherein the target network includes one or more switches; generating, within a network device configuration editor having a superset of configuration syntax and allowable settings values, a target network configuration for the target network; receiving a target network configuration grammar including configuration syntax and allowable settings values from the target network by interrogating the target network; limiting the superset to the received target network configuration grammar to create a limited superset; comparing the limited superset to the syntax and settings values in the target network configuration; and indicating syntax errors and settings value errors in the target network configuration.Type: GrantFiled: May 22, 2019Date of Patent: January 19, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: John A. Powell, David L. Santos, Devon L. Dawson
-
Publication number: 20200374196Abstract: A method for network configuration validation includes identifying a target network to configure wherein the target network includes one or more switches; generating, within a network device configuration editor having a superset of configuration syntax and allowable settings values, a target network configuration for the target network; receiving a target network configuration grammar including configuration syntax and allowable settings values from the target network by interrogating the target network; limiting the superset to the received target network configuration grammar to create a limited superset; comparing the limited superset to the syntax and settings values in the target network configuration; and indicating syntax errors and settings value errors in the target network configuration.Type: ApplicationFiled: May 22, 2019Publication date: November 26, 2020Inventors: John A. Powell, David L. Santos, Devon L. Dawson
-
Publication number: 20200302320Abstract: In one particular example, a fuzzy logic tool includes a computing system fuzzy logic tool, including: an interface through which, in operation, a user may enter a plurality of definitions for management inferencing rules, the management inferencing rules being expressed in fuzzy logic; a knowledge base containing fuzzy logic inferencing rules about computing system management; and inferencing engine that, in operation, applies the fuzzy logic inferencing rules to implement the fuzzy logic computing system management rules and manage the managed devices.Type: ApplicationFiled: March 22, 2019Publication date: September 24, 2020Inventors: Devon L. Dawson, David L. Santos, John A. Powell
-
Publication number: 20200302319Abstract: An administrative tool for use in a computing system includes: an interface through which, in operation, a user may enter a search query for information pertaining to the operation of the computing system; a knowledge base containing fuzzy logic rules about the operation of the computing system; and an inferencing engine that, in operation, applies the fuzzy logic rules to the information responsive to the search query; and return results through the interface.Type: ApplicationFiled: March 22, 2019Publication date: September 24, 2020Inventors: Devon L. Dawson, David L. Santos, John A. Powell
-
Publication number: 20200136904Abstract: Examples disclosed herein relate to a method comprising collecting, by a network monitoring tool, network data from a first device on a network. The method comprises identifying, by the network monitoring tool, a potential issue from the network data, wherein the potential issue corresponds to one aspect of the network and transmitting, by the network monitoring tool, the potential issue to a network management tool. The method also comprises identifying, by the network management tool, a first network configuration that the potential issue relates to and creating, by the network management tool, a second network configuration for the network to fix the potential issue.Type: ApplicationFiled: October 25, 2018Publication date: April 30, 2020Inventors: John A. Powell, David L. Santos, Devon L. Dawson
-
Patent number: 9185122Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.Type: GrantFiled: October 10, 2008Date of Patent: November 10, 2015Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
-
Patent number: 7657491Abstract: A network management station includes a processor, memory coupled to the processor, and computer executable instructions provided to the memory and executable by the processor. The computer executable instructions are configured to transmit a network management message to a network device connected to the network management station over a network, receive response information from the network device based on the network management message, receive unsolicited information from the network device, and apply fuzzy logic to the received information and the unsolicited information to produce information associated with the health of the network device.Type: GrantFiled: October 31, 2006Date of Patent: February 2, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Devon L. Dawson, Steven V. Britt, Adrian Cowham
-
Patent number: 7647530Abstract: Network state information and network topology information associated with a network is retrieved and transformed using a meta-language. The transformed data is compared against known network fault patterns to identify a matching network fault signature. The matching network fault signature is used to diagnose potential cause(s) of network problems that resulted in the matched signature.Type: GrantFiled: October 13, 2006Date of Patent: January 12, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Steven V. Britt, Devon L. Dawson
-
Publication number: 20090300156Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.Type: ApplicationFiled: October 10, 2008Publication date: December 3, 2009Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
-
Publication number: 20080154804Abstract: Embodiments include applying fuzzy based rules to information associated with various metrics from a network device to produce a variable fuzzy based rule expression. The variable fuzzy based rule expression can then be used as an input parameter to a fuzzy rule based heuristic.Type: ApplicationFiled: October 31, 2006Publication date: June 26, 2008Inventors: Devon L. Dawson, Steven V. Britt, Adrian Cowham
-
Publication number: 20080155346Abstract: Network state information and network topology information associated with a network is retrieved and transformed using a meta-language. The transformed data is compared against known network fault patterns to identify a matching network fault signature. The matching network fault signature is used to diagnose potential cause(s) of network problems that resulted in the matched signature.Type: ApplicationFiled: October 13, 2006Publication date: June 26, 2008Inventors: Steven V. Britt, Devon L. Dawson
-
Publication number: 20080148293Abstract: An event broker that receives various types of events in a particular device, and decodes the events to a common meaning form as a generic event that is accessible by various software applications in the device. The event broker includes a plurality of event receivers that receive the events on various ports of the device. The events are then transferred to an event driver loader that accesses a particular event driver depending on how the particular event is formatted. The event driver decodes the event and stores the generic event in an event storage system and/or passes it on to a particular software module that may need to use the event at that particular time.Type: ApplicationFiled: October 17, 2006Publication date: June 19, 2008Inventors: Adrian Cowham, Devon L. Dawson, Daniel E. Ford
-
Publication number: 20080104094Abstract: In one embodiment, a method for managing syslog messages includes identifying a syslog message format that is not currently accepted, composing a syslog message template that corresponds to the syslog message format, the syslog message template comprising a regular expression having a general arrangement the corresponds to the syslog message format such that validity of future syslog messages can be determined through comparison of the future syslog messages to the regular expression, and storing the syslog message template in a location at which the syslog message template will be considered by a syslog daemon in making a message validity determination.Type: ApplicationFiled: October 31, 2006Publication date: May 1, 2008Inventors: Adrian Cowham, Neeshant D. Desai, Devon L. Dawson