Patents by Inventor Stephen G. Low

Stephen G. Low has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10275274
    Abstract: According to an example, configurable workload optimization may include selecting a performance optimized application workload from available performance optimized application workloads. A predetermined combination of removable workload optimized modules may be selected to implement the selected performance optimized application workload. Different combinations of the removable workload optimized modules may be usable to implement different ones of the available performance optimized application workloads. The predetermined combination of the removable workload optimized modules may be managed to implement the selected performance optimized application workload. Data flows directed to the predetermined combination of the removable workload optimized modules may be received.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: April 30, 2019
    Assignee: Trend Micro Incorporated
    Inventors: Stephen G. Low, James Rolette, Edward A. Wartha, Matthew Laswell
  • Patent number: 10243988
    Abstract: According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. A number of IPS data plane modules of the server that are available for inspection of the selected data flows may be determined. The selected data flows may be distributed between the IPS data plane modules based on the determined number of the IPS data plane modules. The distributed data flows may be inspected using the IPS data plane modules to identify malicious and benign data flows, and to determine whether to drop the malicious data flows, direct the malicious data flows to a predetermined destination, or forward the benign data flows to the end node modules.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: March 26, 2019
    Assignee: Trend Micro Incorporated
    Inventors: Stephen G. Low, James Rolette, Matthew Laswell
  • Patent number: 9705756
    Abstract: Embodiments of the present disclosure may include methods, systems, and computer readable media with executable instructions. An example method for network virtualization can include providing, by a datacenter (100) having physical and/or virtual resources, a number of virtual tenant datacenters (tDatacenters), each tDatacenter being isolated from other tDatacenters. A tenant virtual local area network (T-VLAN) (226, 228, 682) is associated to each of the number of tDatacenters, and a value of an end-to-end invariant network virtual local area network (VLAN) identification (VID) label (T-VID) is associated to a particular T-VLAN (226, 228, 682). A network packet associated with the particular T-VLAN (226, 228, 682) is modified at an edge network boundary (561) to include the T-VID. The T-VID is configured to have more than 4096 possible values.
    Type: Grant
    Filed: June 2, 2011
    Date of Patent: July 11, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Stephen G. Low, Paul T. Congdon, Mark A. Pearson, Charles L. Hudson
  • Patent number: 9614777
    Abstract: One example provides a network device including a queue to receive frames from a source, a processor, and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to determine whether a flow control threshold of the queue has been exceeded, and in response to determining that the flow control threshold of the queue has been exceeded, generate a message to be sent to the source of the frame that exceeded the flow control threshold. The message includes a pause duration for which the source is to stop transmitting frames.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: April 4, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Paul Allen Bottorff, Charles L Hudson, Michael Schlansker, Stephen G Low
  • Publication number: 20170034207
    Abstract: According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. A number of IPS data plane modules of the server that are available for inspection of the selected data flows may be determined. The selected data flows may be distributed between the IPS data plane modules based on the determined number of the IPS data plane modules. The distributed data flows may be inspected using the IPS data plane modules to identify malicious and benign data flows, and to determine whether to drop the malicious data flows, direct the malicious data flows to a predetermined destination, or forward the benign data flows to the end node modules.
    Type: Application
    Filed: October 13, 2016
    Publication date: February 2, 2017
    Applicant: Trend Micro Incorporated
    Inventors: Stephen G. LOW, James ROLETTE, Matthew LASWELL
  • Publication number: 20160306653
    Abstract: According to an example, configurable workload optimization may include selecting a performance optimized application workload from available performance optimized application workloads. A predetermined combination of removable workload optimized modules may be selected to implement the selected performance optimized application workload. Different combinations of the removable workload optimized modules may be usable to implement different ones of the available performance optimized application workloads. The predetermined combination of the removable workload optimized modules may be managed to implement the selected performance optimized application workload. Data flows directed to the predetermined combination of the removable workload optimized modules may be received.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Applicant: Trend Micro Incorporated
    Inventors: Stephen G. LOW, James ROLETTE, Edward A. WARTHA, Matthew LASWELL
  • Publication number: 20150236955
    Abstract: One example includes a network device. The network device includes a queue to receive frames from a source, a processor, and a memory coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to deposit tokens into a first token bucket at a first rate, determine whether a frame length of a frame received by the queue is less than the tokens in the first token bucket, remove tokens from the first token bucket in response to the frame length being less than the tokens in the first token bucket, and generate a congestion notification message in response to the frame length not being less than the tokens in the first token bucket. Each token represents a unit of bytes of a predetermined size.
    Type: Application
    Filed: August 21, 2012
    Publication date: August 20, 2015
    Inventors: Paul Allen Bottorff, Mark Allen Gravel, Charles L. Hudson, Stephen G. Low, Frederick Grant Kuhns
  • Publication number: 20150229575
    Abstract: One example provides a network device including a queue to receive frames from a source, a processor, and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to determine whether a flow control threshold of the queue has been exceeded, and in response to determining that the flow control threshold of the queue has been exceeded, generate a message to be sent to the source of the frame that exceeded the flow control threshold. The message includes a pause duration for which the source is to stop transmitting frames.
    Type: Application
    Filed: August 21, 2012
    Publication date: August 13, 2015
    Inventors: Paul Allen Bottorff, Charles L Hudson, Michael Schlansker, Stephen G Low
  • Publication number: 20150195209
    Abstract: One example provides a network device including a queue to receive in profile frames and out of profile frames, a processor, and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to determine whether a predetermined operating point of the queue has been exceeded, and in response to determining that the predetermined operating point of the queue has been exceeded, forward the in profile frames, sample the out of profile frames, and generate a congestion notification message for each sampled out of profile frame to be sent to a source of the out of profile frames to reduce the transmission rate of frames.
    Type: Application
    Filed: August 21, 2012
    Publication date: July 9, 2015
    Inventors: Paul Allen Bottorff, Mark Allen Gravel, Charles L. Hudson, Stephen G. Low, Frederick Grant Kuhns
  • Patent number: 8948180
    Abstract: A system and method are provided to route packets in a data center network. Individual packets are encapsulated at an edge of the data center network, so that each encapsulated packet includes a set of header fields, such as a tenant identifier. For each encapsulated packet, a hash class is determined from the set of header fields. A routing virtual local area network (VLAN) is selected for the packet based on the tenant identifier and the hash class.
    Type: Grant
    Filed: October 18, 2012
    Date of Patent: February 3, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael Schlansker, Jean Tourrilhes, Jose Renato G. Santos, Stephen G. Low, Paul Allen Bottorff
  • Publication number: 20140112137
    Abstract: A system and method are provided to route packets in a data center network. Individual packets are encapsulated at an edge of the data center network, so that each encapsulated packet includes a set of header fields, such as a tenant identifier. For each encapsulated packet, a hash class is determined from the set of header fields. A routing virtual local area network (VLAN) is selected for the packet based on the tenant identifier and the hash class.
    Type: Application
    Filed: October 18, 2012
    Publication date: April 24, 2014
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Michael Schlansker, Jean Tourrilhes, Jose Renato G. Santos, Stephen G. Low, Paul Allen Bottorff
  • Publication number: 20130346583
    Abstract: Embodiments of the present disclosure may include methods, systems, and computer readable media with executable instructions. An example method for network virtualization can include providing, by a datacenter (100) having physical and/or virtual resources, a number of virtual tenant datacenters (tDatacenters), each tDatacenter being isolated from other tDatacenters. A tenant virtual local area network (T-VLAN) (226, 228, 682) is associated to each of the number of tDatacenters, and a value of an end-to-end invariant network virtual local area network (VLAN) identification (VID) label (T-VID) is associated to a particular T-VLAN (226, 228, 682). A network packet associated with the particular T-VLAN (226, 228, 682) is modified at an edge network boundary (561) to include the T-VID. The T-VID is configured to have more than 4096 possible values.
    Type: Application
    Filed: June 2, 2011
    Publication date: December 26, 2013
    Inventors: Stephen G. Low, Paul T. Congdon, Mark A. Pearson, Charles L. Hudson
  • Publication number: 20130107887
    Abstract: In a method for maintaining virtual network context across multiple infrastructures, a data packet having a virtual network identifier in a first routing infrastructure is accessed, wherein the virtual network identifier indicates a tenant network. The data packet is encapsulated for transport of the data packet through a second routing infrastructure. In addition, the virtual network identifier is inserted into the encapsulation of the data packet for routing of the data packet through the second routing infrastructure while maintaining virtual network context and identification between the first routing infrastructure and the second routing infrastructure, wherein the first routing infrastructure operates under a first virtual networking technology and the second routing infrastructure operates under a second virtual networking technology.
    Type: Application
    Filed: October 26, 2011
    Publication date: May 2, 2013
    Inventors: Mark A. Pearson, Stephen G. Low
  • Patent number: 8391174
    Abstract: According to one example of the present invention, there is provided a method of routing data packets to a plurality of packet processors in a computer network. The method comprising obtaining workload data from the packet processors, determining a workload distribution across the packet processors, and updating a balancing table used by a switching element in the network based on the determined workload.
    Type: Grant
    Filed: July 13, 2010
    Date of Patent: March 5, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael Schlansker, Jean Tourrilhes, Dwight L. Barron, Stephen G. Low
  • Publication number: 20120014265
    Abstract: According to one example of the present invention, there is provided a method of routing data packets to a plurality of packet processors in a computer network. The method comprising obtaining workload data from the packet processors, determining a workload distribution across the packet processors, and updating a balancing table used by a switching element in the network based on the determined workload.
    Type: Application
    Filed: July 13, 2010
    Publication date: January 19, 2012
    Inventors: Michael Schlansker, Jean Tourrilhes, Dwight L. Barron, Stephen G. Low
  • Patent number: 6545981
    Abstract: A system and method for facilitating both in-order and out-of-order packet reception in a SAN includes requestor and responder nodes, coupled by a plurality of paths, that maintain the good and bad status of each path and also maintain local copies of a message sequence number. If an error occurs for a transaction over a given path, the requestor informs the responder, over a good path, that the given path has failed and both nodes update their path status to indicate that the given path is bad. A barrier transaction is used by the requestor to determine whether the error is transient or permanent, and, if the error is transient, the requestor retries the transaction.
    Type: Grant
    Filed: December 30, 1998
    Date of Patent: April 8, 2003
    Assignee: Compaq Computer Corporation
    Inventors: David J. Garcia, Richard O. Larson, Stephen G. Low, William J. Watson
  • Patent number: 6157967
    Abstract: A multiprocessor system includes a number of sub-processor systems, each substantially identically constructed, and each comprising a central processing unit (CPU), and at least one I/O device, interconnected by routing apparatus that also interconnects the sub-processor systems. A CPU of any one of the sub-processor systems may communicate, through the routing elements, with any I/O device of the system, or with any CPU of the system.Communications between I/O devices and CPUs is by packetized messages. Interrupts from I/O devices are communicated from the I/O devices to the CPUs (or from one CPU to another CPU) as message packets.CPUs and I/O devices may write to, or read from, memory of a CPU of the system. Memory protection is provided by an access validation method maintained by each CPU in which CPUs and/or I/O devices are provided with a validation to read/write memory of that CPU, without which memory access is denied.
    Type: Grant
    Filed: December 30, 1997
    Date of Patent: December 5, 2000
    Assignee: Tandem Computer Incorporated
    Inventors: Robert W. Horst, William Edward Baker, Linda Ellen Zalzala, William Patterson Bunton, Richard W. Cutts, Jr., David J. Garcia, John C. Krause, Stephen G. Low, David Paul Sonnier, William Joel Watson, Patracia L. Whiteside
  • Patent number: 5751932
    Abstract: A multiprocessor system includes a number of sub-processor systems, each substantially identically constructed, and each comprising a central processing unit (CPU), and at least one I/O device, interconnected by routing apparatus that also interconnects the sub-processor systems. A CPU of any one of the sub-processor systems may communicate, through the routing elements, with any I/O device of the system, or with any CPU of the system. The CPUs are structured to operate in one of two modes: a simplex mode in which the two CPUs operate independently of each other, and a duplex mode in which the CPUs operate in lock-step synchronism to execute each instruction of identical instruction streams at substantially the same time. Communications between I/O devices and CPUs is by packetized messages. Interrupts from I/O devices are communicated from the I/O devices to the CPUs (or from one CPU to another CPU) as message packets. CPUs and I/O devices may write to, or read from, memory of a CPU of the system.
    Type: Grant
    Filed: June 7, 1995
    Date of Patent: May 12, 1998
    Assignee: Tandem Computers Incorporated
    Inventors: Robert W. Horst, William Edward Baker, Randall G. Banton, John Michael Brown, William F. Bruckert, William Patterson Bunton, Gary F. Campbell, John Deane Coddington, Richard W. Cutts, Jr., Barry Lee Drexler, Harry Frank Elrod, Daniel L. Fowler, David J. Garcia, Paul N. Hintikka, Geoffrey I. Iswandhi, Douglas Eugene Jewett, Curtis Willard Jones, Jr., James Stevens Klecka, John C. Krause, Stephen G. Low, Susan Stone Meredith, Steven C. Meyers, David P. Sonnier, William Joel Watson, Patricia L. Whiteside, Frank A. Williams, Linda Ellen Zalzala