Patents by Inventor Stephen Gordy
Stephen Gordy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8387034Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program without user interaction and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts or strategies, whereby each strategy is run under a run-time evaluation system and evaluated to determine the optimal decomposition and distribution across the available processing elements.Type: GrantFiled: June 14, 2010Date of Patent: February 26, 2013Assignee: Management Services Group, Inc.Inventors: Robert Stephen Gordy, Terry Spitzer
-
Patent number: 8387033Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts, whereby each distribution is run under a run-time evaluation wrapper and evaluated to determine the optimal distribution across the available processing elements.Type: GrantFiled: July 3, 2009Date of Patent: February 26, 2013Assignee: Management Services Group, Inc.Inventors: Robert Stephen Gordy, Terry Spitzer
-
Publication number: 20100251223Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program without user interaction and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts or strategies, whereby each strategy is run under a run-time evaluation system and evaluated to determine the optimal decomposition and distribution across the available processing elements.Type: ApplicationFiled: June 14, 2010Publication date: September 30, 2010Applicant: MANAGEMENT SERVICES GROUP, INC. d/b/a Global Technical SystemsInventors: Robert Stephen Gordy, Terry Spitzer
-
Patent number: 7765536Abstract: A Veil program analyzes the source code and data of a target program and determines how best to distribute the target program and data among the processors of a multi-processor computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts, whereby each distribution is run under a run-time evaluation wrapper and evaluated to determine the optimal distribution.Type: GrantFiled: December 21, 2005Date of Patent: July 27, 2010Assignee: Management Services Group, Inc.Inventors: Robert Stephen Gordy, Terry Spitzer
-
Publication number: 20090271774Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts, whereby each distribution is run under a run-time evaluation wrapper and evaluated to determine the optimal distribution across the available processing elements.Type: ApplicationFiled: July 3, 2009Publication date: October 29, 2009Applicant: MANAGEMENT SERVICES GROUP, INC. d/b/a Global Technical SystemsInventors: Robert Stephen Gordy, Terry Spitzer
-
Publication number: 20050273837Abstract: An optical signal return path system analog RF signals are sampled using a master clock frequency, and combined with digital data such as Ethernet data at a cable node. The cable node sends the combined signals on a return path over a fiber optic medium to the cable hub. The cable hub extracts an approximate in-frequency replicate of a master clock signal, and can use the replicate master clock signal to desample the digitized RF signals back to analog. The cable hub can further use the replicate of the master clock signal to serialize Ethernet data, and send the Ethernet data back to the cable node via an optical cable in the forward direction. Accordingly, a single master clock signal can be used on a CATV network for encoding/decoding, and transmitting a variety of data signals, which enhances the integrity and reliability of the data signals.Type: ApplicationFiled: August 2, 2004Publication date: December 8, 2005Inventors: Randy Oyadomari, Arthur Lawson, Stephen Gordy
-
Publication number: 20050273836Abstract: A cable node and a cable hub that communicate on a CATV network are configured to switch communication modes without signal loss or degradation due to delays in switching communication modes. In particular, a cable node sends one or more mute commands in an outgoing data stream to the cable hub, causing the cable hub to disable the RF outputs. Afterward, or along with the one or more mute commands, the cable node can send a switch mode command, thereby causing the cable hub to switch to the appropriate next communication mode, such as a communication mode using a new compression rate. When the cable hub has switched to the appropriate next communication mode, the cable hub can then properly receive and decode a corresponding data stream using the next communication mode.Type: ApplicationFiled: May 12, 2004Publication date: December 8, 2005Inventors: Randy Oyadomari, Arthur Lawson, Stephen Gordy
-
Publication number: 20050254523Abstract: A cable node and a cable hub that communicate on a CATV network are configured to switch compression modes without signal noise or degradation due to excessive delays in switching compression modes. In particular, a cable node sends one or more mute commands in an outgoing data stream to the cable hub, causing the cable hub to disable the RF outputs. Afterward, or along with the one or more mute commands, the cable node can send a switch mode command, thereby causing the cable hub to switch to the appropriate next communication mode, such as a communication mode using a new compression rate. When the cable node and the cable hub have switched to the appropriate next communication mode, the cable hub can then properly receive a corresponding data stream from the cable node using the next communication mode.Type: ApplicationFiled: May 12, 2004Publication date: November 17, 2005Inventors: Randy Oyadomari, Arthur Lawson, Stephen Gordy
-
Publication number: 20050168963Abstract: An optical transceiver module that includes an enclosure within which are disposed a transmitter module and a receiver module. A primary and secondary board are disposed as well in the enclosure, and the transmitter module and the receiver module are each connected with one of the boards. The primary and secondary boards each have a ground plane, and a third ground plane is provided by a ground signal plate that disposed within the enclosure and electrically coupled with the primary board and the secondary board.Type: ApplicationFiled: March 30, 2005Publication date: August 4, 2005Inventors: Chris Togami, Stephan Burdick, Stephen Gordy
-
Publication number: 20050129033Abstract: A network tap for enabling attached devices, such as an intrusion detection system, to transmit information into a communication line of the network without disrupting the network traffic on the communication line. When the attached device is an intrusion detection device, the network tap is connected to a firewall. An Ethernet switch or field programmable gate array (FPGA) is incorporated in the network tap to coordinate the transmission of device data to avoid data collisions with data transmissions already existing in the communication line. The network tap may be operated in various modes to accommodate different capabilities of attached devices. In addition, the network tap has various port configurations to allow a user to connect various attached devices through a single cable or dual cables and to connect various combinations of attached devices.Type: ApplicationFiled: December 13, 2003Publication date: June 16, 2005Inventors: Stephen Gordy, Henry Poelstra, Robert Otis, Thomas Gallatin
-
Publication number: 20050114697Abstract: Secure point to point network connections. Secure communications are accomplished between connection points. The first partner sends authentication information to a second partner. The second partner authenticates the authentication information from the first partner to verify the identity of the first partner. If the identity of the first partner is verified, high-speed data maybe streamed to the first partner. A connection between the first and second partners is policed to discover unauthorized devices connected to the connection or to discover the disconnection of a partner from the connection. If an unauthorized device is discovered or if a partner is removed, high-speed data is no longer sent on the connection.Type: ApplicationFiled: November 9, 2004Publication date: May 26, 2005Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
-
Publication number: 20050114663Abstract: Secure point to point network communications. Secure point to point network communications are accomplished by sending data across a secure link. Trusted partners at the link are matched to each other. To ensure that no un-trusted partners are on the link, authentication is performed. One of the points may be a secure tap. The secure tap authenticates a trusted partner by receiving a hardware embedded encryption key or value derived from the hardware embedded encryption key from the trusted partner. Data sent on the trusted link is encrypted to prevent interception of the data. The secure tap polices the link to ensure that no un-trusted partners are attached to the link and that the trusted partner is not removed from the link. If un-trusted partners are added to the link or trusted partners removed from the link, the secure tap ceases sending data.Type: ApplicationFiled: October 28, 2004Publication date: May 26, 2005Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
-
Publication number: 20050114710Abstract: A host bus adapter for use in secure network devices. The host bus adapter includes a network connector for connecting to a network such as a fiber-optic or Ethernet network. The network connector may connect to a physical layer device where the physical layer device is configured to receive high-speed network communications from the network connector. A decryption module is connected to the physical layer device for the decrypting high-speed encrypted network traffic received from the physical layer device. The host bus adapter includes an interface that is configured to connect to the host device. Authentication logic is included in the host bus adapter to authenticate and/or authenticate to a trusted partner.Type: ApplicationFiled: October 28, 2004Publication date: May 26, 2005Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
-
Publication number: 20050050205Abstract: The present invention provides for network taps capable of connecting to a plurality of communication cables. The network taps provide one or more levels of multiplexers which allow network data signals from a particular communication cable to be delivered to an attached device in order to monitor the activity of the communication cable. The network taps also include integrated circuitry which control the various functions and components of the network tap.Type: ApplicationFiled: December 19, 2003Publication date: March 3, 2005Inventors: Stephen Gordy, Arthur Michael Lawson, Timothy Beyers
-
Publication number: 20050005031Abstract: A system and method is presented for analyzing information in a communication line for unwanted intrusions and for allowing information to be transmitted back into the communication line without disrupting the communication traffic when an intrusion is detected. The system and method includes a security tap connected to a firewall. The security tap is also connected to an intrusion detection device. The intrusion detection device analyzes the information in the communication line for indicia of attempts to compromise the network. When such indicia is detected, the intrusion detection device sends a “kill” data packet back through the security tap and directed back to the communication line to the firewall to instruct the firewall to prevent further communications into the network by the intrusive source.Type: ApplicationFiled: April 7, 2003Publication date: January 6, 2005Inventors: Stephen Gordy, Henry Poelstra, Robert Otis, Tom Gallatin