Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Hewlett Packard Enterprise Development Lp patents


Recent patent applications related to Hewlett Packard Enterprise Development Lp. Hewlett Packard Enterprise Development Lp is listed as an Agent/Assignee. Note: Hewlett Packard Enterprise Development Lp may have other listings under different names/spellings. We're not affiliated with Hewlett Packard Enterprise Development Lp, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "H" | Hewlett Packard Enterprise Development Lp-related inventors


Shared sessions through reverse proxy

In some examples, a reverse proxy system includes a network interface and a reverse proxy engine. The network interface may communicate with a web client and multiple web applications. ... Hewlett Packard Enterprise Development Lp

Multi-source credit managment

Examples herein involve managing credit returns in a multi-source credit managed communication system. In examples herein, a first amount of slots of a credit managed destination are allocated for a credit managed source and a second amount of slots of the credit managed destination are allocated for a secondary source. ... Hewlett Packard Enterprise Development Lp

Pre-processing of data packets with network switch application -specific integrated circuit

In some examples, a method includes receiving, with a programmable application-specific integrated circuit (asic) of a network switch, data packet pre-processing instructions; receiving, with the asic, a data packet including payload data and metadata; extracting, with the asic, a subset of the metadata based on the received pre-processing instructions; compiling, with the asic, the extracted subset of metadata into a data structure; and sending, to the cpu, the data structure compiled by the asic.. . ... Hewlett Packard Enterprise Development Lp

Host-storage authentication

Example implementations may relate to a host and a storage system that communicate by a block storage protocol. For example, the host may embed host credentials in a data packet of the block storage protocol, and the data packet of host credentials may be cryptographically signed by a certificate authority trusted by a user of the host to generate a signed credential packet. ... Hewlett Packard Enterprise Development Lp

Storing data in a deduplication store

Techniques are provided for storing data in a deduplication store. A method includes calculating a fingerprint for data stored in a client data store. ... Hewlett Packard Enterprise Development Lp

Identifying a layout error

First object model data from a first application state generated in a first browser mode may be collected. The first object model data may comprise a code-based representation of a first layout element and a second layout element of the first application state. ... Hewlett Packard Enterprise Development Lp

Calculating normalized metrics

Examples relate to calculating normalize metrics. The examples disclosed herein calculate respective normalized first metric values for each of a plurality of first metric values that are on a time scale and respective normalized second metric values for each of the plurality of raw second metric values that are on the time scale, where the plurality of first metric values are associated with a first metric, and the plurality of second metric values are associated with a second metric. ... Hewlett Packard Enterprise Development Lp

Determining a location of a disconnected device

Described herein are techniques for determining a location of a disconnected device. In an example, a method includes instructing a first access point to sniff a wireless channel for probe request packets from disconnected devices, and instructing the first access point to send a distance-probing packet to a disconnected device after receiving a probe request packet from the disconnected device. ... Hewlett Packard Enterprise Development Lp

Action references

Examples disclosed herein relate to action reference instructions to identify a plurality of actions associated with a data element, create a pointer to an action set comprising a list of the plurality of actions, associate the pointer to the action set with the data element, follow the pointer to retrieve the plurality of actions associated with the data element according to the action set, and perform each of the plurality of actions on the data element. . ... Hewlett Packard Enterprise Development Lp

Identifying a potentially erroneous device in an internet of things (iot) network

Examples described relate to identifying a potentially erroneous device in an iot network. In an example, data from a device in an iot network. ... Hewlett Packard Enterprise Development Lp

Photonic circuit design systems

A photonic circuit design system includes a photonic circuit design tool to facilitate user inputs to generate a photonic circuit netlist comprising a photonic design component of a photonic circuit design. The system includes a memory system to store the photonic circuit netlist and a component library comprising a plurality of predetermined photonic design components from which the photonic design component is selected. ... Hewlett Packard Enterprise Development Lp

Managing appendable state of an immutable file

Some examples described herein relate to managing appendable state of an immutable file. In an example, a request may be received to append an immutable file. ... Hewlett Packard Enterprise Development Lp

Virtual fibre channel port migration

Examples disclosed herein relate to virtual fibre channel port migration. In some examples disclosed herein, a failure in a primary physical host bus adapter (hba) hosting a plurality of virtual hba ports assigned to a virtual machine may be detected. ... Hewlett Packard Enterprise Development Lp

Snapshot storage management

In one example, primary data storage volume to store primary data blocks, and snapshot data storage volume to store snapshot data with snapshot data blocks representing copy-on-write (cow) data blocks of the primary data blocks, and with snapshot pointers to reference the primary data blocks representing non-cow data blocks of the primary data blocks of the primary data storage volume. A mapping table with primary volume mapping pointers to reference the primary data blocks, and snapshot volume mapping pointers to reference the snapshot data blocks. ... Hewlett Packard Enterprise Development Lp

07/05/18 / #20180188302

Determining an alternating current (ac) characteristic from a waveform

Examples herein disclose a system comprising a comparator circuit and a controller. The comparator circuit generates a waveform of an input source. ... Hewlett Packard Enterprise Development Lp

07/05/18 / #20180188133

Coolant leak detection based on a nanosensor resistance measurement

Examples herein relate to detecting a coolant leak. For example, a system includes a nanosensor coupled to an airflow channel in a server. ... Hewlett Packard Enterprise Development Lp

06/28/18 / #20180183806

Guest access provisioning

Example implementations may relate to a policy management system that may receive, from a scheduling application, a request to provision access for a guest. The policy management system may transmit a provisioning tool to the scheduling application, and the provisioning tool may be included in an electronic scheduling message. ... Hewlett Packard Enterprise Development Lp

06/28/18 / #20180183694

Latency measurer

In some described examples, a latency measurer receives packets from a tapping point. The packets may comprise wrapped packets including a wrapper header. ... Hewlett Packard Enterprise Development Lp

06/28/18 / #20180183616

Transmissions of unicast frames to client devices

An example system includes a transceiver. The transceiver communicates multicast frames to a plurality of client devices in a multicast group. ... Hewlett Packard Enterprise Development Lp

06/28/18 / #20180183609

Remote attestation of a network endpoint device

Examples relate to a network endpoint device of a first network infrastructure that facilitates remote attestation of the network endpoint device. In same examples, the network endpoint device comprises a trusted platform module and a processor that implements machine readable instructions that cause the network endpoint device to: receive a connection request from a computing device residing a second network infrastructure external to the first network infrastructure, the request comprising s security challenge; determine, based on a configuration of the network endpoint device, whether it can access information stored in the trusted platform module; and responsive to determining that information in the trusted platform module can be accessed, facilitate connection of the computing device to the network endpoint device by accessing the information and responding to the security challenge.. ... Hewlett Packard Enterprise Development Lp

06/28/18 / #20180181680

Ordering regular expressions

In examples, an apparatus comprises: a memory, and a processor coupled to the memory. The processor to: adaptively order an ordered set of regular expressions based on training messages to produce a set of adaptively ordered regular expressions having an adaptive order, determine a first of the adaptively ordered regular expressions that matches an additional message, and determine whether a second of the adaptively ordered regular expressions matches the additional message. ... Hewlett Packard Enterprise Development Lp

06/28/18 / #20180181214

Pointing action

An example method is provided in according with one implementation of the present disclosure. The method comprises detecting at least one pointing action directed at a display in a multi-user environment, and determining a location of each detected pointing action on the display and a displayed content being pointed to. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180177065

First socket nested in a second socket

Examples herein disclose an apparatus. The apparatus includes a first socket nested in a second socket. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180176294

Server load balancing

Examples relate to load balancing servers. In one example, a computing device may: receive a network packet from a source device, the network packet including data specifying a value; divide the value included in the network packet by a divisor; determine, from a plurality of servers, a destination server for the network packet based on a remainder of the division; and forward the network packet to the destination server.. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180176241

Abnormal behavior detection of enterprise entities using time-series data

A machine-readable medium may store instructions executable by a processing resource to access log data of an enterprise and extract time-series data of an enterprise entity from the log data. The time-series data may include measured feature values of a set of selected features over a series of time periods. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180176088

Virtualized network function monitoring

A computing system comprising a monitoring engine to generate and save a plurality of monitoring rules based on virtualized network function (vnf) types and vnf components. Each monitoring rule corresponds to a unique combination of a vnf type and a vnf component. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180175740

Plurality of converters extending duty cycle by checking voltage thresholds

An example device in accordance with an aspect of the present disclosure includes a first converter to selectively convert a first input signal to a first output signal, and a second converter to selectively convert a second input signal to a second output signal. A controller is to control switches of the first and second converters based on the input signals and output signals, and based on operating the first and second converters exclusively with respect to each other such that a total of first and second duty cycles does not exceed one.. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180175587

Monolithic wdm vcsels with spatially varying gain peak and fabry perot wavelength

An array of monolithic wavelength division multiplexing (wdm) vertical cavity surface emitting lasers (vcsels) with spatially varying gain peak and fabry perot wavelength is provided. Each vcsel includes a lower distributed bragg reflector (dbr), a fabry perot tuning/current spreading layer, and a structure comprising a multiple quantum well (mqw) layer sandwiched between a lower separate confinement heterostructure (sch) layer and an upper sch layer. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180175460

Battery charge voltage based on ambient temperature

According to an example, a battery is charged using a charge voltage based on a present state of charge of the battery and a present ambient temperature of the battery. Additionally, the charge voltage may be based on the present state of charge of the battery, the present ambient temperature of the battery, and an age of the battery. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180174717

Cable harnessing fixture

In one example in accordance with the present disclosure, a fixture comprises a first frame horizontally oriented relative to a second frame. The first frame may be coupled to a member adjustable along a first plane. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180174288

Score weights for user interface (ui) elements

An example device in accordance with an aspect of the present disclosure includes an identification engine, a clustering engine, and a weighting engine. The identification engine is to identify user interface (ui) elements of an application under test based on an image processing analysis of screens of the application under test. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180173731

Storage system deduplication

An example storage system may include storage media and a storage controller. The storage controller may be to establish virtual volumes, private data stores, and a deduplication data store, each being a virtual storage space of the storage media, wherein each of the private data stores is associated with one of the virtual volumes and the deduplication data store is shared among the virtual volumes. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180173677

Hierarchical computations on sparse matrix rows via a memristor array

Hierarchical computation on sparse matrix rows is disclosed. One example is a circuit including a sparse row processor to identify a sparse row of a matrix, where the identified row has a number of non-zero entries less than a threshold, associate a sub-vector of an input vector with a sub-row of the identified row, where the sub-row comprises the non-zero entries of the identified row, and where entries in the sub-vector correspond to the non-zero entries in the identified row in a multiplication operation, and map entries in the matrix to an engine formed from a memristor array. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180173525

Software delivery pipeline management

Examples described relate to managing a software delivery pipeline. In an example, a modified software may be identified. ... Hewlett Packard Enterprise Development Lp

06/21/18 / #20180173522

Deploying documents to a server in a specific environment

In some examples, a method includes parsing, by a computing device, configuration data associated with multiple application programming interfaces (apis) that are served by multiple remote applications executing on multiple servers in different environments respectively; determining, by the computing device, a uniform resource location (url) of a remote application executing on a particular server deployed in the specific environment; receiving, by the computing device, a version of the remote application at the url; retrieving, by the computing device, multiple documents associated with the particular api corresponding to the version from an artifact repository; and deploying, by the computing device, the multiple documents to the particular server in the specific environment.. . ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180167337

Application of network flow rule action based on packet counter

In some examples, a network switch includes an application-specific integrated circuit (asic) including a network packet counter (npc), a processing resource, and a memory resource storing machine readable instructions. The instructions can, for example, cause the processing resource to assign, in accordance with instructions received by a software-defined network (sdn) controller, a packet flow rule for certain packets received by the network switch to the npc; modify, with the npc, a value for a counter associated with the given packet flow rule for received packets that match the pattern of the given packet flow rule; and apply an action to the received packet in accordance with the flow rule only when the value for the counter is less than a threshold value.. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180167331

Network frame hold time parameter

According to an example, coordination of adjustments to network frame hold time parameters between network devices in a network is initiated based on a trigger condition. Time data may be obtained from a plurality of network devices in the network, where the time data describes a network frame hold time parameter of each network device in the plurality and a network frame processing time of each network device. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180167319

Application identification cache

In some examples, a method includes parsing a packet received by the network device to identify a packet header value of the packet and performing a lookup into an application identification cache using the packet header value to identify the packet as part of a traffic flow of a particular application.. . ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180167262

Establishing a network fault detection session

Examples relate to establishing a network fault detection session. In one example, a routing device may receive a request to initiate a bidirectional forwarding detection (bfd) session with a second routing device; transmit a first echo frame to the second routing device; receive a first response frame; determine that a response time does not meet a response time threshold; in response to the determination, determine that a bfd failure threshold has not been met; after the determination that the bfd failure threshold has not been met, transmit a second echo frame to the second routing device; receive a second response frame; determine whether a second response time meets the bfd response time threshold; and in response to determining that the second response time meets the bfd response time threshold, provide a notification that a bfd session has been established between the routing device and the second routing device.. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180166133

Reference currents for input current comparisons

An example device in accordance with an aspect of the present disclosure includes a first module, a second module, and a third module. The first module is to compare an input current to a first reference current, and provide a first output. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165479

Secure memory systems

There is provided an example memory system comprising a plurality of memory modules, each memory module comprising a persistent memory to store root key information and encrypted primary data; a volatile memory to store a working key for encrypting data, the encrypted primary data stored in the persistent memory being encrypted using the working key; and a control unit to provide load and store access to the primary data. The memory system further comprises a working key recovery mechanism to retrieve first root key information from a first module and second root key information from a second module; and compute the working key for a given module based on the retrieved first root key information and the retrieved second root key information.. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165464

Data porch for throttling data access

Examples relate to throttling data access using a data porch. In some examples, an analysis engine is used to access memory and prepare a data response for a data request that is obtained from the data porch via a throttled data buffer. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165291

Disk storage allocation

According to an example, to allocate disk storage space, a request to store a new data chunk in a container is received. For a list of available containers, an exposure count for the container is fetched in the event that a container comprises a data chunk from a same source as the new data chunk. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165273

Universal lexical analyzers

An example lexical analysis system may include lexical analyzer instructions and training instructions. The lexical analyzer instructions, when executed, may form a universal lexical analyzer that is to lexically analyze an input program by evaluating a function that maps an input tuple of lexemes to an output tuple of tokens based on input probability parameters. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165238

Self-tune controller

Example implementations relate to a self-tune controller. For example, the self-tune controller may poll, via an out-of-band data stream, low-level operation information about a processor or a bus of a computing system under a present workload. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165225

Efficiently storing intialization vectors

Examples relate to efficient storage of initialization vectors in a system. One example facilitates determining an initialization vector for use in encrypting a first cache line of a first page of memory, wherein determining the initialization vector comprises concatenating a page-level counter with a first set of hierarchical counters. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165216

Methods and systems for directly mapping a backend block address into a physical address of a caching device

A storage device made up of multiple storage media is configured such that one such media serves as a cache for data stored on another of such media. The device includes a controller configured to manage the cache by consolidating information concerning obsolete data stored in the cache with information concerning data no longer desired to be stored in the cache, and erase segments of the cache containing one or more of the blocks of obsolete data and the blocks of data that are no longer desired to be stored in the cache to produce reclaimed segments of the cache.. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165165

Commit based memory operation in a memory system

A group of memory modules in a memory system receives a memory operation instruction comprising instructions on a memory operation and sends votes on the possibility to perform the memory operation to a memory coordinator module. The memory coordinator module receives votes and establishes a list of memory modules which have voted positively. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165161

Data restoration using allocation maps

A method is described herein. The method includes generating an allocation map for a backup. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165037

Storage reclamation in a thin provisioned storage device

Some examples described herein relate to reclamation of storage in a thin provisioned storage device. In an example, a determination may be made that storage space provisioned to a logical unit number (lun) by a thin provisioned storage device is freed by a file system managing file system operations in the lun. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165036

Rendering data invalid in a memory array

A method for rendering data invalid within a memory array is described. The method includes establishing governing metadata for a memory location within a memory array. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165031

Port modes for storage drives

Examples described herein including receiving a first address from a host controller and receiving a second address from the host controller. The first address may be for a first phy and the second address may be for a second phy. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180165020

Variable cache flushing

Examples disclosed herein relate to variable cache flushing. Some examples disclosed herein a storage controller may detect a cache flush failure and, in response, may execute a first reattempt of the cache flush after a first time period has elapsed. ... Hewlett Packard Enterprise Development Lp

06/14/18 / #20180164512

Connector

An optical connector may include a vibrational element and a pair of traces to power the element. A corresponding connector receptacle includes a pair of pins to provide power to the vibrational element via the traces.. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180160364

Access point availability prediction

In an example, a set of training fingerprints may be accessed, in which each of the training fingerprints specifies an access point of a plurality of access points to which a mobile device made a successful connection, a relative signal strength of the connection to the access point, and a cellular signal strength of a cellular tower near the mobile device when the successful connection to the access point was made. Level counts of the relative signal strengths of the connections to the access points corresponding to the cellular signal strengths of the cellular tower may be cumulated from the set of training fingerprints. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180160258

Deterrence of user equipment device location tracking

Examples include deterrence of user equipment (ue) device location tracking. Some examples include a core network device of a telecommunication network having a processing resource and a machine-readable storage medium with instructions executable by the processing resource to receive a first service request message from the ue device that includes a pseudo-globally unique temporary identifier (p-guti), to send a paging message that includes the p-guti, and to receive a second service request message from the ue device that includes a new p-guti based on the p-guti of the first service request message matching the p-guti of the paging message.. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180159758

Virtual media access control addresses for hosts

Examples described herein relate to virtual media access control (mac) addresses. In some such examples, a method includes receiving, at a first provider edge router, a discovery request for a mac address of a first host communicatively coupled to the first provider edge router. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180159735

Managing hardware resources

Examples relate to managing hardware devices. In one example, a computing device may receive a virtual network function specifying a particular function to be performed by at least one virtual machine; identify a particular performance metric for the virtual network function; determine, using the particular performance metric and a default resource configuration, a first infrastructure configuration specifying a value for each of a plurality of infrastructure options, each of the plurality of infrastructure options specifying a feature of the at least one virtual machine; and determine, using the particular performance metric and the first infrastructure configuration, a first resource configuration specifying a value for each of a plurality of virtualized hardware resources for the at least one virtual machine.. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180157740

Suggested offerings

Examples relate to determining suggested offerings for users. The examples disclosed herein identify, a recent entity accessed by a user. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180157605

Configuration of a memory controller for copy-on-write

Examples include configuration of a memory controller for copy-on-write. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a management subsystem configuring a memory controller to treat location ids, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component.. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180157565

Handling errors during run time backups

Examples provide systems and a method for handling errors during run-time back up of volatile memory. The method includes initiating a backup of a volatile memory domain to a non-volatile memory domain. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180157552

Data validation

Examples associated with data validation are disclosed. One example includes a sensor attribute data store having information describing attributes of a set of distributed sensors. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180157477

Versioned extension points of graphical user interfaces

In some examples, version data in an extension point of a graphical user interface of a version of a software application may be identified. In some examples, based on the identified version data, a version of a user interface module available to integrate with the user interface of the version of the software application may be determined.. ... Hewlett Packard Enterprise Development Lp

06/07/18 / #20180157299

Managing power in a high performance computing system for resiliency and cooling

An apparatus and method thermally manage a high performance computing system having a plurality of nodes with microprocessors. To that end, the apparatus and method monitor the temperature of at least one of a) the environment of the high performance computing system and b) at least a portion of the high performance computing system. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152849

Enable access point availability prediction

In an example, a set of training fingerprints may be access, in which each of the training fingerprints may specify an access point of a plurality of access points to which a mobile device made a successful connection and a cellular signal strength of a cellular tower near the client device when the successful connection was made. An interim model may be generated from the accessed set of training fingerprints, in which the interim model may contain a subset of the information in the set of training fingerprints to enable a destination device to generate a prediction model to predict an availability of an access point. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152733

Methods and systems for efficiently reading a data block from a data seglet with compressed data blocks

When data blocks of a data seglet are compressed using a shared dictionary and when the requested data block (or blocks) do not include the last data block of the data seglet, an optimization in the read path may involve decompressing a certain portion of the data seglet from a starting position of the data seglet to a decompression endpoint of the data seglet, but not including the portion of the data seglet following the decompression endpoint. Such technique may involve the storing of a mapping that maps, for each data block within the data seglet, an identifier of the data block to a decompression endpoint that indicates a portion of the data seglet that includes the data block.. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152468

Processing network data using a graph data structure

Certain described examples are directed towards analyzing network data. The network data is processed to generate a graph data structure that has edges that are associated with communication times from the network data and nodes that are associated with computer devices. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152394

Fabric cable emulation

Examples disclosed herein relate to fabric cable emulation. Some examples disclosed herein include determining connection data associated with a connection between a fabric interface of a cluster node in a fabric cluster and a fabric switch. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152392

Hybrid cloud management

A hybrid cloud management system in a cloud environment having a more than one cloud platforms is described. The system includes a management interface, a cloud broker including cloud connectors, and a resource broker. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152318

Ring protection network module

Examples herein involve establishing communication links between a first ring protection network in communication with a service network and a second ring protection network in communication with a service network, the communication links between the first ring protection network and the second ring protection network to form a management network ring; determining an owner of the management network ring; and establishing a single uplink between one network module of the management network ring and the service network.. . ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180152305

Cryptographic data

Examples set out herein provide a method comprising using first cryptographic key data specific to a computing device to verify a package of machine readable instructions to run on the computing device. The verified package may be executed to generate a random number using a true random number generator of the computing device, and to store the generated random number. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180150526

Generic query language for data stores

In some examples, a method includes constructing, by a computing device, a plurality of expressions using a generic query language that is independent of implementation of an associated data store, the associated data store supporting a plurality of operands comprising at least one comparison operand and multiple logical operands; generating, by the computing device, a single query including the plurality of expressions to the associated data store, wherein the plurality of expressions are connected using the multiple logical operands; transmitting, by the computing device, the single query to the associated data store; and receiving, by the computing device, a single set of results corresponding to the single query.. . ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180150486

Linking datasets

A method is described in which a first data set, which is represented by a first model, is provided; a second data set, which is represented by a second model, is provided; information relating to a link to be created between the first data set and the second data set is received; a link creation mechanism is selected based on the received information; an equivalence between the first data set and the second data set is determined using the selected link creation mechanism; an equivalence relation is added to the first model based on the determined equivalence; and an equivalence relation is added to the second model based on the determined equivalence.. . ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180150405

Data type management

In one example in accordance with the present disclosure, a method for data type management may include adding a first data to a first data set. The first data set may belong to a plurality of data sets stored in a memory and each data set in the plurality may correspond to a type table defining data types in the corresponding data set. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180150236

Storage of format-aware filter format tracking states

Examples include the storage of format-aware filter format tracking states. Some examples include storage of a format tracking state for a format aware filter in a backup system in association with a backup object, access of the format tracking state from the backup system in response to detection of a potential continuation of a backup image, and applying the format-aware filter using the accessed format tracking state.. ... Hewlett Packard Enterprise Development Lp

05/31/18 / #20180150234

Cloud volume storage

According to examples, a data storage system may include a plurality of storage arrays of a cloud volume provider (cvp), in which the plurality of storage arrays is a plurality of logical volumes. The data storage system may also include a cvp portal to link a first compute instance of a first cloud service provider (csp) with a first logical volume over a network. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180146325

Localization from access point and mobile device

. . Localization from an access point and mobile device can include receiving information from a mobile device and initiating a location package based on information received from the mobile device to select a location server. Localization information can be requested information from the location server, where the localization information includes localization information from at least one access point and information received from the mobile device. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180146013

Providing notifications via a platform

Examples disclosed herein relate to providing notifications via a platform. The examples enable managing, by a physical processor that implements machine readable instructions, a set of security policies for the platform; applying the set of security policies to a set of applications interfaced with the platform for a user of the platform; providing, by the physical processor, a first notification via the platform based on a determination that a first application interfaced with the platform should provide the first notification to a user of the platform; and providing, by the physical processor, a second notification via the platform based on a determination that a second application interfaced with the platform should provide the second notification to the user of the platform.. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180145893

Server discrete side information

In some examples, a method can include receiving, at a network monitor, discrete side information from a first server at a first rack regarding a data flow between the first server and a second server at a rack other than the first rack. The discrete side information can, for example, include an indicator determined by the first server that indicates whether the data flow satisfies a reference criteria. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180145866

Storage system enclosures

The present subject matter relates to an enclosure of a storage system. Each node of the enclosure comprises: at least two peer-to-peer connected class-a esp devices to redundantly monitor and control a first set of environmental components shared within a respective node by the at least two class-a esp devices; at least one class-b esp device peer-to-peer connected to at least one class-b esp device of another node in the enclosure to redundantly monitor and control a second set of environmental components shared between the respective node and the other node; and at least one class-x em device peer-to-peer connected to the at least two class-a esp devices and the at least one class-b esp device of the respective node, and to a class-x em device of the other node to redundantly supervise the monitoring and controlling of the first set and the second set of environmental components.. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180144157

Protecting memory storage content

An apparatus includes memory storage and a protection system to protect content of the memory storage. The protection system includes a first key that is held by a process and is associated with application data to be stored in the memory storage; and a second key that is held by an operating system kernel. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180144054

Generation of digital documents

The present subject matter relates to generating a digital document. In one example, the present subject matter includes generating one or more seed topics based on topic-based textual data. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180144003

Automated entity-resolution methods and systems

Automated entity-resolution methods—that may be implemented via execution, by a processor, of machine-readable instructions stored on a non-transitory computer-readable medium—assess similarity between data records, for a group of data records in a data-set, based on a number n of plural attributes of the data records; identify clusters of similar data records in the group based on the assessed similarity; determine, in a multidimensional space having a number d of dimensions less than the number n, respective regions corresponding to different identified clusters, wherein a selected dimensionality-reduction method transforms data records into said multidimensional space; and set up a classifier to identify correspondences between data records and entities based on the regions in the multidimensional space that contain the data records after their transformation according to the selected dimensionality-reduction method.. . ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180143997

Translation of source m-node identifier to target m-node identifier

Examples include translation of a source m-node identifier (id) to a target m-node id, the source m-node id identifying a source m-node representing a file system object in a source file system, and the source m-node id including a source replication set id, a source m-node container id, and at least one local id. In examples, a source m-node container id is replaced with a target m-node container id in the target m-node id.. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180143936

Shared usb ports

In one example in accordance with the present disclosure, a system comprises a first computing device comprising a first baseboard management controller (bmc), a second computing device comprising a second bmc, a first universal serial bus (usb) port coupled to the first bmc, a second usb port coupled to the second bmc, a multiplexor coupled to the first usb port and the second usb port, a shared usb port coupled to the multiplexor, and a chassis manager coupled to the first computing device and the second computing device. The chassis manager may connect, with the multiplexor, the shared port to the first usb port or the second usb port.. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180143792

Redirecting a print job

In an example, a method is disclosed for redirecting a print job. The method includes monitoring status of a plurality of printers on a network, determining that a first printer of the plurality of printers that is responsible for a print job is not suitable for processing the print job, and selecting a second printer of the plurality of printers to process the print job. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180143285

Correcting time-of-flight measurements

In an example, a method for correcting time-of-flight measurements includes receiving a plurality of time-of-flight measurements and determining whether the time-of-flight measurements relate to a strong signal client, a weak signal client, or a preferred signal client. If the time-of-flight measurements relate to a strong signal client or a weak signal client, the method determines whether the time-of-flight measurements constitute two distinct distributions. ... Hewlett Packard Enterprise Development Lp

05/24/18 / #20180143263

Current restriction

An example system includes a failure detection circuit. The failure detection circuit is to detect a failure of a first power source electrically coupled to a first load. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180139224

Collecting domain name system traffic

Examples relate to collecting domain name system traffic. In one example, a computing device may: receive, from a first intermediary network device, a dns query packet that was sent by a client computing device operating on a private network, the dns query packet specifying i) a query domain name, and ii) a source address that specifies the client computing device; store, in a data storage device, a query record specifying the query domain name and the source address specified by the dns query packet; receive, from a second intermediary network device, a dns response packet; determine that the dns response packet specifies a response domain name that matches the query domain name; in response to the determination, extract, from the dns response packet, a resolved address that corresponds to the response domain name; and store, in the query record, the resolved address specified by the dns response packet.. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180139096

Composition constraints for network policies

Each network policy of network policies specifies at least one characteristic of communications allowed between endpoint groups, each endpoint group of the endpoint groups including at least one endpoint. The network policies are merged according to composition constraints included in the network policies.. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180137443

Promotion artifact risk assessment

In one example of the disclosure, a promotion artifact is received, the promotion artifact for implementation at a computer system. An origin environment is identified. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180137403

Sensor data

Examples disclosed herein relate, among other things, to a non-transitory machine-readable storage medium encoded with instructions executable by a processor of a computing device to cause the computing device to obtain data from a plurality of sensors of at least a first type and a second type. The instructions may also cause the computing device to determine, for each sensor of the second type, whether the data obtained from the sensor of the second type is reliable based at least on the data obtained from a sensor of the first type that is associated with the sensor of the second type.. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180137131

Data retentions

An example computing device includes a data storage device and a controller coupled to the data storage device. The data storage device includes a storage segment. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180137062

Cryptographic-based initialization of memory content

A technique includes receiving a request to initialize a region of a memory. Content that is stored in the region is encrypted based at least in part on a stored nonce value and a key. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180136946

Securely and reliably transferring startup script

A system for securely and reliably transferring startup script files over a network may include a unified extensible firmware interface (uefi) network stack on a client server wherein the client server requests startup script over the network upon startup of the client server using a secure transfer network protocol and receives over the network the startup script. A computing device may comprise a unified extensible firmware interface (uefi) shell to request a download of startup script, over a network, upon startup of the client server wherein the startup script is staged in a provisioned storage device within the client server to be mounted as local file systems in the client server. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180136933

Dependency rank based on commit history

In one example implementation, an example system includes a dependency engine, a filter engine, and a cluster engine. In the one example implementation, a file pair of a first commit log entry of a plurality of commit log entries in a commit history is identified by the dependency engine. ... Hewlett Packard Enterprise Development Lp

05/17/18 / #20180136842

Partition metadata for distributed data objects

In some examples, a system includes a shared memory, a metadata store separate from the shared memory, and a management engine. The management engine may receive input data, partition the input data into multiple data partitions to cache the input data in the shared memory as a distributed data object, send partition store instructions to store the multiple data partitions within the shared memory. ... Hewlett Packard Enterprise Development Lp

05/10/18 / #20180131775

Network based service discovery via unicast messages

In one example, a system is described which includes an underlay network including a mapping server and a mapping database, an overlay network including vteps, at least one peripheral device, and at least one client device connected to the at least one peripheral device via the vteps. Further, each vtep includes a traffic optimization module. ... Hewlett Packard Enterprise Development Lp

05/10/18 / #20180131627

Socket state transfer

In response to receiving tcp inbound message packets from a remote node, a network node buffers the received tcp message packets in a receive queue. The network node forwards the inbound message packets to an application node. ... Hewlett Packard Enterprise Development Lp

05/10/18 / #20180131621

Middlebox modeling

In some examples, a method includes parsing, by a network device, a section of source code associated with a network function provided by a middlebox in a network; extracting, by the network device, a packet processing slice and a state transition slice from the section of source code; generating, by the network device, a plurality of execution paths from the packet processing slice and the state transition slice; and modeling the middlebox by inserting, by the network device, the plurality of execution paths to a match-action table that describes a packet processing model for the middlebox.. . ... Hewlett Packard Enterprise Development Lp

05/10/18 / #20180131128

Magnetic fluid connector

Example implementations relate to a magnetic fluid connector. For example, a magnetic fluid connector can include a magnet, an internal fluid path defined by a first portion and a second portion when the first portion and the second portion are coupled together, and a movable member that is movable to seal the internal fluid path, where the magnet provides at least a portion of a force sufficient to seal the internal fluid path.. ... Hewlett Packard Enterprise Development Lp

05/10/18 / #20180130106

Use of marketplace platform instances for reselling

An example method may include creating multiple instances of a marketplace platform, using a first instance of the marketplace platform to aggregate multiple catalogs of service vendors into an aggregated catalog of the first instance, and additional instances of the marketplace platform (reseller instances) to aggregate the aggregated catalog of the first instance (or the aggregated catalog of another reseller instance) into the aggregated catalog of the respective reseller instance into the aggregated catalog of the respective reseller instance. Each instance of the marketplace platform may be such that, when it is run by processing circuitry, it aggregates input catalogs into an aggregated catalog of the respective instance. ... Hewlett Packard Enterprise Development Lp

05/10/18 / #20180129583

Function call visualization

In one example in accordance with the present disclosure, a system may include a processor and a memory comprising instructions executable by the processor to generate a plurality of visual indicators on a flow graph. Each of the visual indicators may correspond to one of a plurality of functions performed during execution of software code. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124951

Water wall

A water wall is provided herein. An example water wall includes a top member, a thermal member, an orifice member, and a manifold member. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124694

Wireless access point selection based on signal-to-interference-plus noise ratio value

In some examples, a method includes estimating a signal-to-interference-plus noise ratio (sinr) value between a wireless client and each access point (ap) of a plurality of aps based on channel state information (csi) between the wireless client and each ap of the plurality of aps and selecting an ap of the plurality of aps to be associated with the wireless client based on a channel bandwidth of the wireless client and the estimated sinr value between the wireless client and each ap of the plurality of aps.. . ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124594

Storing profile data in data repository local to a regional service area

Examples herein retrieve a profile data corresponding to a mobile device from a first data repository in response to the mobile device entering a regional service area. The examples store the profile data in a second data repository. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124590

Roaming on low power wide area networks

According to one example of the disclosure, a first lpwan receives a message from an internet of things (iot) device. The message includes at least one of: a network id associated with a second lpwan and an application id associated with the second lpwan. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124220

Deploying an internet storage name service (isns) server on a network device

Examples disclosed herein relate to deployment of an internet storage name service (isns) server on a network device. In an example, a network device may determine that the network device has a highest ip address among network devices in an internet small computer system interface (iscsi) network. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124205

Performance monitor based on user engagement

Examples disclosed herein involve measuring application performance based on user engagement of the application. In examples herein, an activation of an action item may be detected and a degree of user engagement of the application in response to the activation of the action item may be determined. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124074

Probe counter state for neighbor discovery

Examples disclosed herein relate to security actions that can be taken at a network appliance based on a received copy of a neighbor discovery packet. The neighbor discovery packet copy is received on a control plane of a network that originated at a port on a data plane of the network. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124054

Parameter based data access on a security information sharing platform

Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For example, in an implementation, a system may determine that a first member of a community of a security information sharing platform is entitled access to a first set of encrypted information shared by a second member of the community. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124010

Identifying algorithmically generated domains

Examples relate to identifying algorithmically generated domains. In one example, a computing device may: receive a query domain name; provide the query domain name as input to a predictive model that has been trained to determine whether the query domain name is an algorithmically generated domain name, the determination being based on syntactic features of the query domain name, the syntactic features including a count of particular character n-grams included in at least a portion of the query domain name, where n is a positive integer greater than one; and receive, as output from the predictive model, data indicating whether the query domain name is algorithmically generated.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180124007

Hashes of email text

Examples described herein include receiving text of an email, determining a header of an email message in the email, and determining a body of the email message. Examples also include modifying the text of the email to indicate a beginning boundary and an ending boundary of the header, modifying the text of the email to indicate a beginning boundary and an ending boundary of the body, generating a hash of the header, generating a hash of the body, and tracing the email based on the hash of the header.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123975

Switch resource manager

Example implementations relate to a switch resource manager for a network switching device. In an example, a network switching device includes a packet switching device and an operating system kernel. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123966

Fabric back pressure timeout transmitting device

A fabric back pressure timeout transmitting device may include an arbiter, a first queue to supply packets to the arbiter and a second queue to supply packets to the arbiter, a first timer tracking time since transmission of a packet from the first queue with at least one packet in the first queue and a second timer tracking time since transmission of a packet from the second queue with at least one packet in the second queue. The first queue is designated to receive those packets that have a first number of remaining to destination hops. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123930

Selectively monitoring a network of network function chains based on probability of service level agreement violation

In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a service level agreement (sla); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of sla violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of sla violation.. . ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123911

Verify service level agreement compliance of network function chains based on a stateful forwarding graph

In some examples, a method includes parsing, by a network device, a set of flow rules and network function configurations to identify an equivalent class of packets passing through network function chains; identifying, by the network device, a plurality of paths that packets belonging to the equivalent class pass through; computing, by the network device, a first set of service level agreement (sla) performance metrics for the equivalent class; constructing, by the network device, a set of stateful forwarding criteria comprising the first set of sla performance metrics; and verifying, by the network device, whether the network function chains comply with a sla based on the stateful forwarding criteria.. . ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123892

Fabric management devices

Examples include fabric management devices. Some examples include a fabric management device to manage a network fabric. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123642

Dc bias signals isolatable from transmission protocols

An example device in accordance with an aspect of the present disclosure includes a direct current (dc) bias source coupled to a transmitter connector of a transmitter. The dc bias source is to apply, onto the transmission line, a dc bias signal isolatable from the transmission protocol by the receiver based on the receiver separating the dc bias signal from the transmission protocol without compromising the transmission protocol.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123525

Differential amplifier

A differential amplifier includes a pair of cascode amplifiers. A voltage clamp is coupled to the pair of cascode amplifiers.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180123268

Transceiver module

One example of a system includes a system board including first contacts and second contacts and a cage attached to the system board. The cage includes a first side over the first contacts and a second side over the second contacts. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180122785

Direct bandgap semiconductor bonded to silicon photonics

According to an example of the present disclosure a direct bandgap (dbg) semiconductor structure is bonded to an assembly comprising a silicon photonics (sip) wafer and a complementary metal-oxide-semiconductor (cmos) wafer. The sip wafer includes photonics circuitry and the cmos wafer includes electronic circuitry. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121747

Associating a screenshot group with a screen

A first screenshot taken from a screen and having a first layout element may be determined to meet a first layout similarity threshold with a second screenshot having a second layout element. A first group comprising the first and second screenshot may be created in response to the first screenshot meeting the first layout similarity threshold with the second screenshot and it may be determined that a first feature of the first screenshot from the first group matches a second feature of a third screenshot from a second group. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121656

Validating operating firmware of a periperhal device

Various examples described herein provide for firmware verification on a peripheral device that can couple to a computing device. Before operating firmware is executed on the peripheral device, boot firmware can execute on the peripheral device and cause the peripheral device to generate a hash of the operating firmware. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121648

Detection of object creation

Examples disclosed herein relate to detecting object creation when instrumenting an application for security purposes. The examples enable determining, by an instrumenter implemented by a physical processor that implements machine readable instructions, whether to instrument a function; responsive to determining that the function should be instrumented, determining, by the instrumenter, that a base class constructor is to be called by the function; before the base class constructor is called, pushing, by the instrumenter, object related information onto a local storage registry; analyzing, by the instrumenter, the local storage registry to determine whether an object associated with the function was created based on information in the local storage registry; and responsive to determining that the object was created, applying, by the instrumenter, a security rule to the function.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121527

Singular value decompositions

In one example in accordance with the present disclosure, a system comprises a computing node. The computing node comprises: a memory, and a processor to: execute a database in the memory, and invoke, with the database, singular value decomposition (svd) on a data set. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121506

Solving graph routes into a set of possible relationship chains

Example embodiments relate to solve a graph route into a set of possible relationship chains. The example disclosed herein receives a graph route, identifies an edge expansion wildcard based on the graph route, expands the graph route into a plurality of sub-graph routes based on the edge expansion wildcard, solves the plurality of sub-graph routes in parallel into a plurality of sub-graph routes results, and joins the plurality of sub-graph routes results into a set of possible relationship chains.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121501

Translating gql queries into sql queries

Example embodiments relate to translate a gql query into a sql query. The example disclosed herein receives a graph query language (gql) query, transforms the gql query into a representation of an abstract syntactic structure of the gql query, translates the representation of the abstract syntactic structure of the gql query into a structured query language (sql) query, and sends the sql query to a relational database management system.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121485

Container images

Examples described relate to container images. In an example, a mapping of respective unique identifiers of container images of a software container and respective metadata of the container images may be generated. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121416

Comparator associated with dictionary entry

Comparators may be associated with dictionary entries. In one aspect, a dictionary entry may store a dictionary word. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121372

Throttled data memory access

Examples relate to providing throttled data memory access. In some examples, a locking mechanism is used to activate a corresponding memory lock after receiving a first read access cycle. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121371

Reading by user-level processes

Examples described herein relate to a memory structure by a user-level process. In an example, a method includes mapping in a read mode, by a kernel, a memory structure and a lock associated with a portion of the memory structure into an address space of a user-level process based on the user-level process being untrusted. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121308

Light color adjustment of a server panel light

In some examples, a method may be performed through light adjustment circuitry of a server that includes a panel light. The method may include identifying a server version of the server from a hardware configuration detected for the server and adjusting a light color of the panel light to account for a lighting variance characteristic of the server version.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121300

Resilient memory fabric

Examples of a resilient memory fabric comprise a network of memory components, each memory component comprising a respective address space, wherein the memory fabric comprises the aggregated respective memory as a single addressable memory space. A first memory component of the network of memory components may comprise a first memory local non-transitory machine readable storage medium that stores a set of labeled routes to other memory components in the memory fabric; and a first memory processor that executes machine-readable instructions that cause the first memory component to route data along a selected labeled route.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121270

Detecting malformed application screens

In some examples, a first skeleton of a layout of a first version of an application screen may be compared with a second skeleton of a layout of a second version of the application screen. It may be determined whether the first version of the application screen is malformed based on the comparison.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121267

Dynamic messaging for an application programming interface

Examples disclosed herein comprise dynamic message instructions to map each of a plurality of data identifiers to at least one granular application programming interface (api), receive a message comprising at least one of the plurality of data identifiers from a client, retrieve, via the at least one granular api for the at least one of the plurality of data identifiers, a data resource, and provide the retrieved data resources to the client.. . ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121222

Determining virtual network function configurations

Examples relate to determining virtual network function configurations. In one example, a computing device may receive a virtual network function specifying a particular function to be performed by at least one virtual machine; identify a particular performance metric for the virtual network function; determine, using the particular performance metric and a default resource configuration, a first infrastructure configuration specifying a value for each of a plurality of infrastructure options, each of the plurality of infrastructure options specifying a feature of the at least one virtual machine; and determine, using the particular performance metric and the first infrastructure configuration, a first resource configuration specifying a value for each of a plurality of virtualized hardware resources for the at least one virtual machine.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121172

Specifying models of an architectural type

Example implementations relate to specifying models of an architectural type. In an example implementation, a domain model of the architectural type is captured and a meta-language for the architectural type is defined. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121122

Using a memory controller to manage access to a memory based on a memory initialization state indicator

A technique includes receiving, in a memory controller, a request to read data that is stored in the region of memory. The technique includes using the memory controller to manage access to the memory based on an initialization state indicator for the region of memory. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121099

Data replication in memory systems

The present disclosure discloses memory systems that comprise a network of logically-connected, routable memory modules each comprising an individual memory-address space, in which the memory-address spaces of the individual memory modules are aggregated and exposed as a single memory component to components external to the memory system seeking to write or read data objects in the memory system, and the memory systems are configured to perform data replication according to a lazy data replication protocol to hold plural replicas of data objects in the memory system.. . ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121087

Register-based communications interface

An example device may include processing circuitry and a management controller. The processing circuitry may include a communications interface that includes a first register and a second register. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180121045

Toggling application feature flags based on user sentiment

In some examples, a user sentiment of an end user that is interacting with an application to be executed on a client computing device may be inferred based on biometric data of the end user. A feature flag of the application may be toggled based on the inferred user sentiment.. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180120890

Signal filtering

In various examples, a system comprises a computing device comprising a transmitter coupled to a high frequency serial communication interface. The transmitter may transmit a signal to another computing device via the high frequency communication interface. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180120525

Multi-chip module

One example of a multi-chip module includes a substrate, a semiconductor chip, and an optical transceiver. The substrate has a first side and a second side opposite the first side. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180120524

Devices with optical ports in fan-out configurations

Examples herein relate to devices with optical ports in fan-out configurations. An electrical device may have a substrate with an electrical port on a first face of the substrate and a plurality of optical ports on a second face of the substrate. ... Hewlett Packard Enterprise Development Lp

05/03/18 / #20180120351

Module statuses corresponding to slot locations

An example device in accordance with an aspect of the present disclosure includes a plurality of pins coupled to a controller to receive a plurality of module statuses corresponding to slot locations of the enclosure at various proximity tiers relative to the module. The controller is to check a first pin of the plurality of pins to identify whether a first proximity tier relative to the module is occupied, regardless of a slot location of the module in the enclosure.. ... Hewlett Packard Enterprise Development Lp

04/19/18 / #20180110154

Rack enclosure with perforations for cooling

The present examples include a rack enclosure with perforations formed within vertical rack columns. Front vertical rack columns may include front perforations formed therein. ... Hewlett Packard Enterprise Development Lp

04/19/18 / #20180109390

Certificate generation

Examples disclosed herein comprise certificate generation instructions to create a key pair comprising a private key and a public key, receive a signing certificate associated with the public key comprising a configurable signing window, create an end user certificate according to the signing certificate, determine whether the configurable signing window has expired, and in response to determining that the configurable signing window has expired, discard the private key of the key pair.. . ... Hewlett Packard Enterprise Development Lp

04/19/18 / #20180108410

Memristance feedback tuning

An example device in accordance with an aspect of the present disclosure includes at least one current comparator, a plurality of threshold currents, and a controller. The current comparator is to compare a memristor current to a plurality of threshold currents. ... Hewlett Packard Enterprise Development Lp

04/19/18 / #20180108403

Temperature compensation circuits

A temperature compensation circuit may comprise a temperature sensor to sense a temperature signal of a memristor crossbar array, a signal converter to convert the temperature signal to an electrical control signal, and a voltage compensation circuit to determine a compensation voltage based on the electrical control signal and pre-calibrated temperature data of the memristor crossbar array.. . ... Hewlett Packard Enterprise Development Lp








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Hewlett Packard Enterprise Development Lp in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Hewlett Packard Enterprise Development Lp with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###