Patents by Inventor James R. Hearn

James R. Hearn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180181421
    Abstract: An example computer system for transferring a packet includes a hypervisor to run a first virtual machine and a second virtual machine. The computer system also includes a first memory address space associated with the first virtual machine to store the packet. The computer system further includes a second memory address space associated with the second virtual machine to receive and store the packet. The computer system also includes a virtual switch coupled to the first virtual machine and the second virtual machine to detect that the packet is to be sent from the first virtual machine to the second virtual machine. The computer system further includes a direct memory access device to copy the packet from the first memory address space to the second memory address space via the direct memory access device.
    Type: Application
    Filed: December 27, 2016
    Publication date: June 28, 2018
    Inventors: Patrick Connor, Scott P. Dubal, James R. Hearn, Iosif Gasparakis, Chris Pavlas, Eliezer Tamir
  • Publication number: 20180173580
    Abstract: Methods and apparatus to recover a processor state during a system failure or security event are disclosed. An example apparatus to recover data includes a processor including a local memory and a system monitor in communication with the processor. The system monitor is to copy processor backup data to a non-volatile memory in response to a processor backup event. The processor backup data includes contents of the local memory.
    Type: Application
    Filed: December 19, 2016
    Publication date: June 21, 2018
    Inventors: Chris Pavlas, James R. Hearn, Scott P. Dubal, Patrick Connor
  • Patent number: 9992212
    Abstract: Technologies for handling malicious activity of a virtual network driver include a network computing device on which a virtual machine is being executed and the virtual network driver is managing communication between the physical network interface controller and the virtual function network adapter. The network computing device is configured to monitor events handled by the virtual network driver to detect malicious activity and update one or more malicious event tracking variables corresponding to a type of malicious activity event detected. The network computing device is further configured to compare one or more of the malicious event tracking variables to a corresponding malicious event threshold and perform an action on the virtual function driver in response to a determination that one or more of the malicious event tracking variables indicates that the corresponding malicious event threshold has been violated. Other embodiments are described and claimed herein.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: June 5, 2018
    Assignee: Intel Corporation
    Inventors: James R. Hearn, Matthew Vick
  • Patent number: 9826656
    Abstract: The present disclosure describes embodiments of apparatuses and methods related to a moveable server rack in a data center. The server rack may include a chassis with a plurality of servers and a receptacle to couple with a mobile robot. The mobile robot may move the server rack from a first location to a second location in a data center. The server rack may include indices of alignment to provide an indication of docking alignment of the server rack to at least the second docking location, a power connector system to connect a main power source to the plurality of servers at the second location, and an input/output connector to connect a data center network to the plurality of servers at the second location. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: November 21, 2017
    Assignee: Intel Corporation
    Inventors: Patrick Connor, Scott P. Dubal, James R. Hearn
  • Publication number: 20170134403
    Abstract: Technologies for handling malicious activity of a virtual network driver include a network computing device on which a virtual machine is being executed and the virtual network driver is managing communication between the physical network interface controller and the virtual function network adapter. The network computing device is configured to monitor events handled by the virtual network driver to detect malicious activity and update one or more malicious event tracking variables corresponding to a type of malicious activity event detected. The network computing device is further configured to compare one or more of the malicious event tracking variables to a corresponding malicious event threshold and perform an action on the virtual function driver in response to a determination that one or more of the malicious event tracking variables indicates that the corresponding malicious event threshold has been violated. Other embodiments are described and claimed herein.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: James R. Hearn, Matthew Vick
  • Publication number: 20170094377
    Abstract: Devices and techniques for out-of-band platform tuning and configuration are described herein. A device can include a telemetry interface to a telemetry collection system and a network interface to network adapter hardware. The device can receive platform telemetry metrics from the telemetry collection system, and network adapter silicon hardware statistics over the network interface, to gather collected statistics. The device can apply a heuristic algorithm using the collected statistics to determine processing core workloads generated by operation of a plurality of software systems communicatively coupled to the device. The device can provide a reconfiguration message to instruct at least one software system to switch operations to a different processing core, responsive to detecting an overload state on at least one processing core, based on the processing core workloads. Other embodiments are also described.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: Andrew J. Herdrich, Patrick L. Connor, Dinesh Kumar, Alexander W. Min, Daniel J. Dahle, Kapil Sood, Jeffrey A. Shaw, Edwin Verplanke, Scott P. Dubal, James R. Hearn
  • Publication number: 20170086325
    Abstract: The present disclosure describes embodiments of apparatuses and methods related to a moveable server rack in a data center. The server rack may include a chassis with a plurality of servers and a receptacle to couple with a mobile robot. The mobile robot may move the server rack from a first location to a second location in a data center. The server rack may include indices of alignment to provide an indication of docking alignment of the server rack to at least the second docking location, a power connector system to connect a main power source to the plurality of servers at the second location, and an input/output connector to connect a data center network to the plurality of servers at the second location. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: September 22, 2015
    Publication date: March 23, 2017
    Inventors: Patrick Connor, Scott P. Dubal, James R. Hearn
  • Patent number: 9600309
    Abstract: Methods, apparatus and systems for effecting Virtual Machine (VM) platform communication loopback and enabling user initiated network port failover. Network communications in platforms employing VMs and having multiple network ports accessible to the VMs are configured to be routed such that communications between VMs in the platform are looped back within the platform, thus not require routing through an external switch. This is facilitated via an Intelligent Channel Bonding Driver that dynamically enforces inter-VM traffic to ensure internal loopback within the same physical port. In another aspect, a user is enabled to initiate failover of a network port on a platform employing a Virtual Machine Manager and a plurality of VMs, wherein updated configuration information is sent to disable Virtual Function (VF) drivers associated with the network port.
    Type: Grant
    Filed: June 8, 2012
    Date of Patent: March 21, 2017
    Assignee: Intel Corporation
    Inventors: Jeff Prawer, James R. Hearn, Waseem Ahmad
  • Publication number: 20160380865
    Abstract: Methods and apparatus for collection of Netflow data and export offload using network silicon. In accordance with aspects of the embodiments, the Netflow export and collection functions are offloaded to the network silicon in the chipset, System on a Chip (SoC), backplane switch, disaggregated switch, virtual switch (vSwitch) accelerator, and Network Interface Card/Controller (NIC) level. For apparatus implementing virtualized environments, one or both of the collection and export functions are implemented at the Physical Function (PF) and/or Virtual Function (VF) layers of the apparatus.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 29, 2016
    Applicant: Intel Corporation
    Inventors: Scott P. Dubal, James R. Hearn, Patrick Connor
  • Publication number: 20160191678
    Abstract: Technologies for ensuring data integrity for multi-packet operations include a computing device and a remote computing device communicatively coupled via a network. The computing device is configured to perform a segmentation offload operation on an original network packet, compute a hash value on the payload of each segmented payload of the original network packet, and store the hash value and an indication into the segmented network packet that indicates the hash value is stored in the segmented network packet. The remote computing device is configured to extract the indication and the hash value from a received network packet in response to determining the indication indicates the hash value is stored in the segmented network packet, compute a hash value on the payload of received network packet, and determine an integrity of the payload based on a comparison of the extracted hash value and the computed hash value.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: Jesse C. Brandeburg, Scott P. Dubal, Patrick Connor, James R. Hearn
  • Publication number: 20130339955
    Abstract: Methods, apparatus and systems for effecting Virtual Machine (VM) platform communication loopback and enabling user initiated network port failover. Network communications in platforms employing VMs and having multiple network ports accessible to the VMs are configured to be routed such that communications between VMs in the platform are looped back within the platform, thus not require routing through an external switch. This is facilitated via an Intelligent Channel Bonding Driver that dynamically enforces inter-VM traffic to ensure internal loopback within the same physical port. In another aspect, a user is enabled to initiate failover of a network port on a platform employing a Virtual Machine Manager and a plurality of VMs, wherein updated configuration information is sent to disable Virtual Function (VF) drivers associated with the network port.
    Type: Application
    Filed: June 8, 2012
    Publication date: December 19, 2013
    Inventors: Jeff Prawer, James R. Hearn, Waseem Ahmad