Fang Lu - Austin TX, US Frank L. Wu - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F011/00
US Classification:
714 2, 713 2
Abstract:
A method of recovering from basic input/output system (BIOS) corruption operates in a multi-node computer system (MCS). The MCS includes first and second nodes, a first firmware unit in the first node, and a second firmware unit in the second node. According to the method, in response to initiation of a boot sequence for the MCS, the MCS automatically checks a BIOS image in the first firmware unit in the first node for corruption. In response to detecting corruption of the BIOS image in the first firmware unit, the MCS automatically recovers from the corruption by causing a good BIOS image to be copied from the second firmware unit in the second node to the first firmware unit in the first node. In one example embodiment, the MCS may contain multiple nodes, and the MCS may automatically recover from BIOS errors if any node contains a good BIOS image.
System And Method For Updating Bios For A Multiple-Node Computer System
Frank L. Wu - Austin TX, US Fang Lu - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 9/445 G06F 9/24
US Classification:
713 1, 713 2
Abstract:
A system and method for updating or synchronizing BIOS information for a multiple-node computer system is disclosed. Each node contains at least one processor, and a BIOS is associated with each processor. The BIOS in a node may be synchronized with the BIOS of another node such that BIOS coherence may be maintained between two or more nodes in the system. The computer system may be configured as an aggregated or partitioned system.
Martinez Vencia Addae - Austin TX, US Fang Lu - Billerica MA, US Vandana Mallempati - Austin TX, US Jehan S. Moghazy - Arlington VA, US
International Classification:
G06F 15/16
US Classification:
709206, 709220, 709238
Abstract:
A method, system, and computer program product for tracking e-mail and e-mail attachment usage information is provided. A request to track an e-mail is received. The recipients of the e-mail are determined. E-mail usage information for the e-mail is determined for each recipient. A determination is made as to whether the e-mail comprises at least one attachment. Responsive to a determination that the e-mail comprises at least one attachment, attachment usage information for the at least one attachment is determined for each recipient. Recipients are grouped based on a location of each recipient. Path information for the e-mail is generated. Data, comprising the e-mail usage information, the attachment usage information, the path information, and grouping information, is sent to a remote data processing system. A visual representation of the data is displayed at the remote data processing system.
- Armonk NY, US Jeremy R. Fox - Georgetown TX, US Fang Lu - Billerica MA, US
International Classification:
G06F 9/451 G09B 21/00
Abstract:
Embodiments of the present invention provide computer-implemented methods, computer program products and systems. Embodiments of the present invention can identify display settings of a first computing device and a second computing device of a plurality of computing devices. Embodiments of the present invention can identify objects to be displayed by the first computing device and viewed on the second computing device. Embodiments of the present invention can then generate a mapping of the identified objects that do not match in appearance based on the identified display settings of the first computing device and the second computing device and dynamically modify the identified objects such that the identified objects match in appearance for both the first computing device and the second computing device.
- Armonk NY, US Avery Rowe - Austin TX, US Susann Marie Keohane - Austin TX, US Cristi Nesbitt Ullmann - Austin TX, US Tiffany Cross - Austin TX, US Fang Lu - Billerica MA, US
International Classification:
G06Q 50/16 G06Q 10/00
Abstract:
Aspects of this disclosure relate to determining a health score of properties. For example, data from one or more sensors of each of a plurality of properties may be received from the plurality of properties. Statuses of each property of the plurality of properties may be identified from the data. A health score of a property that is within a vicinity the plurality of properties is determined using the statuses. This health score may providing to a user along with a recommended action to improve the health score.
Content Evaluation Based On Machine Learning And Engagement Metrics
- Armonk NY, US Su LIU - Austin TX, US Nadiya KOCHURA - Bolton MA, US Fang LU - Billerica MA, US
International Classification:
G06N 20/00 G06F 17/27 G06K 9/62 G06T 7/00
Abstract:
Techniques for machine learning analysis are provided. A machine learning (ML) model is trained to identify appropriate documents based on lexical knowledge of target groups. A lexical knowledge of a set of users is determined. Additionally, a first document of a plurality of documents is selected by processing the determined level of lexical knowledge using the ML model. The first document is presented to the set of users. A level of engagement of the set of users is then determined. Upon determining that the level of engagement is below a predefined threshold, a second document of the plurality of documents is selected using the ML model.
- Armonk NY, US Jeremy R. Fox - Georgetown TX, US Uri Kartoun - Cambridge MA, US Fang Lu - Billerica MA, US
International Classification:
H04L 12/58 G06K 7/14 G06F 17/27
Abstract:
A method, a computer system, and a computer program product for visitor invitation management are provided. The present invention may include determining that a first electronic message from a sender to a recipient contains invitation information. The present invention may include extracting the invitation information from the first message using one or more natural language processing (NLP) techniques. The present invention may also include generating a visitor badge based on the extracted invitation information. The present invention may lastly include sending a second electronic message to the recipient containing the generated visitor badge.
Attachment Analytics For Electronic Communications
- Armonk NY, US Janani Janakiraman - Austin TX, US Nadiya Kochura - Worcester County MA, US Fang Lu - Billerica MA, US
International Classification:
H04L 12/58
Abstract:
Methods, systems, and computer program products for electronic communication operations are provide. Aspects include receiving communication data associated with an electronic communication, wherein the communication data includes textual data, analyzing attachment data associated with an attachment to the electronic communication, comparing the communication data to the attachment data to determine a relevancy score, and based on the relevancy score, enacting an action for the electronic communication.
Zte Usa 2010 - 2013
Fixed Network Technical Support Engineer
Epic 2007 - 2007
Technical Services Engineer
Education:
Udacity 2014 - 2015
The University of Texas at Dallas 2007 - 2009
Master of Science, Masters, Computer Engineering
The University of Texas at Austin 2003 - 2006
Bachelors, Bachelor of Science, Electrical Engineering
Skills:
Python Rstudio R Packages D3.Js Mongodb Machine Learning Matlab Javascript Html Cascading Style Sheets React.js Redux