Patents by Inventor William Price Dawkins

William Price Dawkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220179695
    Abstract: A system for providing computer implemented services using information handling systems includes persistent storage and a system control processor manager. The system control processor manager instantiates composed information handling systems using the information handling systems; monitors, using system control processors of the composed information handling systems, operation of the composed information handling systems to obtain operation information; makes a determination, based on the operation information, that the computing implemented services provided by the composed information handling systems are substandard; and in response to the determination: manages operation of the composed information handling systems to provide standards compliant computer implemented services by modifying a composition of at least one of the composed information handling systems using a system control processor of the system control processors.
    Type: Application
    Filed: December 9, 2020
    Publication date: June 9, 2022
    Inventors: William Price Dawkins, Mark Steven Sanders, Jimmy Doyle Pike, Elie Antoun Jreij, Robert Wayne Hormuth, Walter A. O'Brien, III, Mukund P. Khatri, Gaurav Chawla, Yossef Saad
  • Publication number: 20220179672
    Abstract: A device for managing composition of composed information handling includes persistent storage and a computer processor that obtains a composition request for a composed information handling system; makes a determination that the composition request is an intent based request; in response to the determination: matches an application specified by the composition request to computing resource requirements for the application; identifies, based on the computing resource requirements, at least one compute resource set having resources meeting the computing resources requirement; identifies, based on the computing resource requirements, at least one hardware resource set having resources meeting the computing resource requirements; sets up management services for the at least one hardware resource set using at least one control resource set to obtain logical hardware resources; and presents the logical hardware resources to the at least one compute resource set as bare metal resources.
    Type: Application
    Filed: December 9, 2020
    Publication date: June 9, 2022
    Inventors: Gaurav Chawla, Mark Steven Sanders, William Price Dawkins, Jimmy Doyle Pike, Elie Antoun Jreij, Robert Wayne Hormuth, Walter A. O'Brien, III, Mukund P. Khatri, Yossef Saad
  • Publication number: 20220179576
    Abstract: A method for managing composed information handling systems includes receiving, by a system control processor, a mirroring policy from a system control processor manager, receiving an application write request from a first application instance, based on the application write request and the mirroring policy: initiating servicing of the application write request by a first composed information handling system, initiating servicing of an SCP write request by a second composed information handling system, wherein the SCP write request is based on the application write request, receiving a SCP response from the SCP write request from a second system control processor, wherein a second composed information handling system comprises the second system control processor and is executing a second application instance of the cluster application, and sending a write response to the first application instance, wherein the write response is based, at least in part, on the SCP response.
    Type: Application
    Filed: December 9, 2020
    Publication date: June 9, 2022
    Inventors: Yossef Saad, William Price Dawkins
  • Publication number: 20220179699
    Abstract: A method includes after being allocated to a composed information handling system of the composed information handling systems: monitoring, by a system control processor manager, health of computing resources of the composed information handling system, making a determination that a computing resource of the computing resources is in a compromised state, based on the determination, identifying a second computing resource currently allocated to a second composed information handling system, wherein the composed information handling system is associated with a first priority and the second composed information handling system is associated with a second priority, wherein the first priority is higher than the second priority, and replacing, after the deallocating, the compute resource with the second compute resource in the composed information handling system.
    Type: Application
    Filed: December 9, 2020
    Publication date: June 9, 2022
    Inventors: Walter A. O'Brien, III, Mark Steven Sanders, Robert Wayne Hormuth, Mukund P. Khatri, Yossef Saad, Elie Antoun Jreij, Jimmy Doyle Pike, William Price Dawkins, Gaurav Chawla, John S. Harwood
  • Patent number: 11327852
    Abstract: A live migration/high availability system includes a first computing system having a first SCP subsystem coupled to first computing system components and a first hypervisor subsystem that provides a first virtual machine. Each time the first SCP subsystem receives snapshot commands from the hypervisor subsystem, it retrieves respective SCP component state information that was not retrieved in response to a previous snapshot command from each first SCP component included in the first SCP subsystem, and uses the respective SCP component state information to generate a respective SCP subsystem snapshot based on that snapshot command. The first SCP subsystem then transmits the SCP subsystem snapshots to a second SCP subsystem in a second computing system, and the second SCP subsystem uses the SCP subsystem snapshots to allow a second hypervisor subsystem on the second computing system to provide a second virtual machine that operates the same as the first virtual machine.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: May 10, 2022
    Assignee: Dell Products L.P.
    Inventors: William Price Dawkins, Robert W. Hormuth, Elie Jreij, Gaurav Chawla, Mark Steven Sanders, Jimmy D. Pike
  • Publication number: 20220138013
    Abstract: A workload compliance governor system includes a management system coupled to a computing system. A workload compliance governor subsystem in the computing system receives a workload performance request associated with a workload, exchanges hardware compose communications with the management system to compose hardware components for the workload, and receives back an identification of hardware components. The workload compliance governor subsystem then determines that the identified hardware components satisfy hardware compliance requirements for the workload, and configures the identified hardware components in the computing system based on the software compliance requirements for the workload in order to cause those identified hardware components to provide an operating system and at least one application that operate to perform the workload.
    Type: Application
    Filed: October 29, 2020
    Publication date: May 5, 2022
    Inventors: Mukund P. Khatri, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mark Steven Sanders, Walter A. O'Brien, III, Robert W. Hormuth, Jimmy D. Pike
  • Publication number: 20220129571
    Abstract: A device access control system includes a computing system having a device access controller subsystem coupled to devices and a central processing subsystem. A device access control manager subsystem is coupled to the device access controller subsystem and operates, during initialization operations for the computing system, to identify application(s) that are configured to be provided by the central processing subsystem, and identify a first subset of the devices that satisfy application provisioning requirements for the application(s).
    Type: Application
    Filed: April 2, 2021
    Publication date: April 28, 2022
    Inventors: Walter A. O'Brien, III, Mukund P. Khatri, Jimmy D. Pike, Mark Steven Sanders, Elie Jreij, Gaurav Chawla, William Price Dawkins
  • Publication number: 20220129536
    Abstract: A device access control system includes a first computing system that is coupled to a second computing system via a network, and that includes a device access controller subsystem coupled to devices, a central processing subsystem, and a device access control manager subsystem. The device access control manager subsystem identifies first application(s) configured for provisioning by the central processing subsystem and second application(s) configured for provisioning by the second computing system, configures the device access controller subsystem to provide the central processing subsystem access to a first subset of the devices to allow the central processing subsystem to provide the first application(s), and configures the device access controller subsystem to provide the second computing system access via the device access control manager subsystem to a second subset of the devices to allow the second computing device to provide the second application(s) using the second subset of the devices.
    Type: Application
    Filed: October 27, 2020
    Publication date: April 28, 2022
    Inventors: Walter A. O'Brien, III, Mukund P. Khatri, Mark Steven Sanders, William Price Dawkins, Elie Jreij, Robert W. Hormuth, Jimmy D. Pike, Gaurav Chawla
  • Publication number: 20220129356
    Abstract: A live migration/high availability system includes a first computing system having a first SCP subsystem coupled to first computing system components and a first hypervisor subsystem that provides a first virtual machine. Each time the first SCP subsystem receives snapshot commands from the hypervisor subsystem, it retrieves respective SCP component state information that was not retrieved in response to a previous snapshot command from each first SCP component included in the first SCP subsystem, and uses the respective SCP component state information to generate a respective SCP subsystem snapshot based on that snapshot command. The first SCP subsystem then transmits the SCP subsystem snapshots to a second SCP subsystem in a second computing system, and the second SCP subsystem uses the SCP subsystem snapshots to allow a second hypervisor subsystem on the second computing system to provide a second virtual machine that operates the same as the first virtual machine.
    Type: Application
    Filed: October 22, 2020
    Publication date: April 28, 2022
    Inventors: William Price Dawkins, Robert W. Hormuth, Elie Jreij, Gaurav Chawla, Mark Steven Sanders, Jimmy D. Pike
  • Publication number: 20220131695
    Abstract: A distributed secure communication system includes a first System Control Processor (SCP) subsystem coupled to second and third SCP subsystems via a network. The first SCP subsystem identifies the second SCP subsystem, signs a first SCP authentication communication with a first private key to provide a first signed SCP authentication communication that it transmits to the second SCP subsystem. The first SCP subsystem receives a second signed SCP authentication communication from the second SCP subsystem, authenticates the second signed SCP authentication communication using a second public key associated with the second SCP subsystem and, in response, establishes a first secure communication channel with the second SCP subsystem.
    Type: Application
    Filed: October 26, 2020
    Publication date: April 28, 2022
    Inventors: Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Mark Steven Sanders, Elie Jreij, Robert W. Hormuth, Mukund P. Khatri, Walter A. O'Brien, III
  • Publication number: 20220121580
    Abstract: A graph-based data flow control system includes a control plane system coupled to SCP subsystems. The control plane system identifies a workload, and identifies service(s) on the SCP subsystems for manipulting/exchanging data to perform the workload. The control plane system generates a respective SCP-local data flow control graph for each SCP subsystem that defines how their service(s) will manipulate/exchange data within that SCP subsystem, and generates inter-SCP data flow control graph(s) that define how service(s) provided by at least one SCP subsystem will manipulate/exchange data with service(s) provided by at least one other SCP subsystem. The control plane system then transmits each respective SCP-local data flow control graph to each of the SCP subsystems, and the inter-SCP data flow control graph(s) to at least one SCP subsystem, for use by the SCP subsystems in causing their service(s) to manipulate/exchange data to perform the workload.
    Type: Application
    Filed: October 15, 2020
    Publication date: April 21, 2022
    Inventors: Gaurav Chawla, Mark Steven Sanders, Elie Jreij, Jimmy D. Pike, Robert W. Hormuth, William Price Dawkins
  • Publication number: 20220123920
    Abstract: A distributed key management system includes a first SCP subsystem coupled to second SCP subsystems via a network. The first SCP subsystem establishes secure communication channels with the second SCP subsystems, and a first key management subsystem in the first SCP subsystem retrieves enabling key(s) for communicating via the secure communication channels from a second key management subsystem in one of the second SCP subsystems, and stores the enabling key(s). The first key management subsystem then receives a first enabling key request from the first SCP subsystem and determines whether the first SCP subsystem is trusted. If the first SCP subsystem is trusted, the first key management subsystem provides the first SCP subsystem access to the at least one enabling key. If the first SCP subsystem is not trusted, the first key management subsystem prevents the first SCP subsystem from accessing the at least one enabling key stored.
    Type: Application
    Filed: October 15, 2020
    Publication date: April 21, 2022
    Inventors: Jimmy D. Pike, Robert W. Hormuth, Gaurav Chawla, Mark Steven Sanders, Elie Jreij, William Price Dawkins
  • Publication number: 20220121546
    Abstract: A graph-based data multi-operation system includes a data multi-operation management subsystem coupled to an application and accelerator subsystems. The data multi-operation management subsystem receives a data multi-operation graph from the application that identifies first data and defines operations for performance on the first data to transform the first data into second data. The data multi-operation management subsystem assigns each of the operations to at least one of the accelerator systems, and configures the accelerator subsystems to perform the operations in a sequence that transforms the first data into the second data, When the data multi-operation management subsystem determine a completion status for the performance of the operations by the accelerator subsystems, it transmits a completion status communication to the application that indicates the completion status of the performance of the plurality of operations by the plurality of accelerator subsystems.
    Type: Application
    Filed: October 21, 2020
    Publication date: April 21, 2022
    Inventors: Gaurav Chawla, Mark Steven Sanders, William Price Dawkins, Jimmy D. Pike, Elie Jreij, Robert W. Hormuth
  • Publication number: 20220113980
    Abstract: A System Control Processor (SCP) cloning system includes a first computing system coupled to second computing systems via a network. The first computing system includes a first SCP subsystem coupled to a central processing system and first computing system components in the first computing system. The first SCP subsystem receives a first cloning command via the network from a management system and, based on the first cloning command, retrieves respective first SCP component state information from each of a plurality of first SCP components that are included in the first SCP subsystem, uses the respective first SCP component state information to generate a first SCP subsystem image that is configured for installation on an SCP subsystem to configure that SCP subsystem the same as the first SCP subsystem, and transmits the first SCP subsystem image to a second SCP subsystem in each of at least one second computing system.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: William Price Dawkins, Gaurav Chawla, Mark Steven Sanders, Elie Jreij, Robert W. Hormuth, Jimmy D. Pike
  • Patent number: 11301259
    Abstract: A System Control Processor (SCP) cloning system includes a first computing system coupled to second computing systems via a network. The first computing system includes a first SCP subsystem coupled to a central processing system and first computing system components in the first computing system. The first SCP subsystem receives a first cloning command via the network from a management system and, based on the first cloning command, retrieves respective first SCP component state information from each of a plurality of first SCP components that are included in the first SCP subsystem, uses the respective first SCP component state information to generate a first SCP subsystem image that is configured for installation on an SCP subsystem to configure that SCP subsystem the same as the first SCP subsystem, and transmits the first SCP subsystem image to a second SCP subsystem in each of at least one second computing system.
    Type: Grant
    Filed: October 13, 2020
    Date of Patent: April 12, 2022
    Assignee: Dell Products L.P.
    Inventors: William Price Dawkins, Gaurav Chawla, Mark Steven Sanders, Elie Jreij, Robert W. Hormuth, Jimmy D. Pike
  • Patent number: 11288008
    Abstract: A reflective memory system includes network-connected computing systems including respective memory subsystems. A reflective memory management subsystem in a first computing system receives a processor memory-centric reflective write request associated with a local reflective memory write operation and remote reflective memory write operations, performs the local reflective memory write operation to write data to a memory subsystem in the first computing system, and uses remote memory access hardware to generate remote memory write information for performing the remote reflective memory write operations to write the data at respective second memory subsystems in second computing systems.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: March 29, 2022
    Assignee: Dell Products L.P.
    Inventors: Robert W. Hormuth, Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mukund P. Khatri, Walter A. O'Brien, III, Mark Steven Sanders
  • Publication number: 20220092203
    Abstract: A platform root-of-trust system includes a System Control Processor (SCP) subsystem coupled to a central processing subsystem, a BIOS subsystem, and an I/O device. In response to an initialization instruction, the SCP subsystem begins initialization operations prior to the beginning of initialization operations for the central processing subsystem, the BIOS subsystem, and the I/O device. As part of SCP initialization operations, the SCP subsystem validates SCP subsystem initialization information to provide validated SCP subsystem initialization information, and uses the validated SCP subsystem initialization information to complete the SCP initialization operations.
    Type: Application
    Filed: September 22, 2020
    Publication date: March 24, 2022
    Inventors: Mukund P. Khatri, Robert W. Hormuth, Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mark Steven Sanders, Walter A. O'Brien, III
  • Publication number: 20220091859
    Abstract: A coordinated initialization system includes a computing system with first and second initialization subsystems coupled to a coordinated initialization subsystem. The coordinated initialization subsystem receives first and second initialization progress information associated with respective first and second initialization subsystem operations performed by the respective first and second initialization subsystems.
    Type: Application
    Filed: September 24, 2020
    Publication date: March 24, 2022
    Inventors: Elie Jreij, Robert W. Hormuth, Gaurav Chawla, Mark Steven Sanders, William Price Dawkins, Jimmy D. Pike
  • Publication number: 20220092188
    Abstract: A communication system personality provisioning system includes a communication system included in a computing system and coupled to a management system. The communication system stores authentication information in a UEFI database of a UEFI system in the communication system. The communication system receives a first operating software image and application/service from the management system, authenticates the first operating software image and application/service via first secure initialization operations performed by the UEFI system using the authentication information and, in response, installs the first operating software image and application/service on the communication system.
    Type: Application
    Filed: September 23, 2020
    Publication date: March 24, 2022
    Inventors: Mukund P. Khatri, Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mark Steven Sanders, Walter A. O'Brien, III, Robert W. Hormuth
  • Patent number: 11281612
    Abstract: A switch-based inter-device notational data movement system includes a switch device that is coupled to a first processing system included in a first chassis and configured to provide a first thread, a second processing system included in a second chassis and configured to provide a second thread, and a memory system. The switch device identifies, in a communication transmitted by the first thread, a request to transfer data, which is stored in a first portion of the memory system that is associated with the first thread in a memory fabric management database, to the second thread. The switch device then modifies notational reference information in the memory fabric management database to disassociate the first portion of the memory system and the first thread and associate the first portion of the memory system with the second thread, which allows the second thread to reference the data using request/respond operation.
    Type: Grant
    Filed: November 10, 2020
    Date of Patent: March 22, 2022
    Assignee: Dell Products L.P.
    Inventors: Kurtis John Bowman, Jimmy Doyle Pike, William Price Dawkins, Shyamkumar T. Iyer