JA Solar - Shanghai, China since 2012
Senior Customer Service Manager
Venture Funded start-up - Fremont, CA 2011 - 2012
Supervisor Engineer, PV integration at VC Funded Start-up
JDS Uniphase 2010 - 2010
Reliability Test Engineer
PerkinElmer Optoelectronics 2007 - 2009
Team Lead, Dry Etch Process
Chartered Semiconductor 2006 - 2007
Principal Engineer
Education:
Northwestern Polytechnic University 2009 - 2011
MBA, Accounting
National University of Singapore
MEng, Electrical Engineering
Nanjing University
BSc, Physics
Interests:
entrepreneurship, connecting with people,motorcycle,
volleyball, soccer, basketball, tennis, hiking/backpacking/camping
Name / Title
Company / Classification
Phones & Addresses
Geng Chen President
ARCADIA TRADING, INC Whole In Baby Products
1542 Ctr Pointe Dr, Milpitas, CA 95035 (408)2597281
A method and apparatus for assigning an IP address, in a modular network system, to at least one client premise equipment device coupled by a communications link to a router, wherein the last octet of said IP address may be one of at least three different values.
Manufacture Of Light Emitting Devices With Phosphor Wavelength Conversion
A method of manufacturing a light emitting device comprises: a) depositing over substantially the entire surface of a LED diode wafer having an array of LEDs formed on a surface thereof a mixture of at least one phosphor material and a polymer material, wherein the polymer material is transmissive to light generated by the LEDs and to light generated by the at least one phosphor material; b) mechanically stamping the phosphor/polymer mixture with a stamp having features configured such as to form passages in the phosphor/polymer corresponding to electrode contact pads of each LED thereby enabling access to each electrode contact pad; c) curing the polymer; d) removing the stamp; and e) dividing the LED wafer into individual light emitting devices. The stamp comprises a dissolvable material (polyvinyl alcohol) and the stamp is removed by dissolving it using a solvent (e. g. water).
Techniques For Auto Assigning Ip Telephone Extension Numbers Based On A Port
Geng Chen - San Jose CA, US Gary Dennis Vogel - Sunnyvale CA, US Ron Lewis - Hayward CA, US
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
H04L 12/66
US Classification:
370356
Abstract:
Techniques are provided for assigning extension numbers to Internet Protocol (IP) telephony devices. The techniques include receiving a message from the IP telephony device requesting that an extension be assigned. A port identifier of a port in which the IP telephony device is coupled is determined. Extension numbers are fixed for specific ports. Thus, an extension number for the port identifier of the port is determined. The extension number is then assigned to the IP telephony device. For example, a MAC address for the IP phone is assigned to the extension number.
Vadim Draluk - Cupertino CA, US Francois Goldfain - San Jose CA, US Jan-Willem Maarse - San Jose CA, US Geng Chen - San Jose CA, US Sean Xiao - Beijing, CN
Assignee:
DELL Products L.P. - Round Rock TX
International Classification:
G06F 15/16
US Classification:
709217
Abstract:
Mode sensitive networking is provided to allow mode specific communications using a mobile device. If a device has an established secured connection and an application is running in work mode, packets are routed through the secure connection. If the device has an established secured connection but an application is running in personal mode, packets are routed through an alternate connection. Secured connections may be established by using privileged applications. A device and associated applications may have access to different servers, sites, and destinations based on a current mode.
Vadim Draluk - Cupertino CA, US Francois Goldfain - San Jose CA, US Jan-Willem Maarse - San Jose CA, US Geng Chen - San Jose CA, US
Assignee:
DELL Products L.P. - Round Rock TX
International Classification:
G06F 9/48
US Classification:
713 1
Abstract:
Mechanisms are provided to allow devices to support multiple modes, such as work, personal, and family modes. Conventional mobile solutions provide only for mode distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Existing computer system solutions rely on multiple operating system instances or multiple virtual machines. Framework level modes are provided that do not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data and capabilities based on a current mode.
Vadim Draluk - Cupertino CA, US Francois Goldfain - San Jose CA, US Jan-Willem Maarse - San Jose CA, US Geng Chen - San Jose CA, US
Assignee:
DELL Products L.P. - Round Rock TX
International Classification:
G06F 17/30
US Classification:
713165
Abstract:
Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.
Geng Chen - San Jose CA, US Vadim Draluk - Cupertino CA, US Francois Goldfain - Sunnyvale CA, US
Assignee:
DELL Products L.P. - Round Rock TX
International Classification:
G06F 21/24
US Classification:
380 28
Abstract:
Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.
A method and apparatus for assigning an IP address, in a modular network system, to at least one client premise equipment device coupled by a communications link to a router, wherein the last octet of said IP address may be one of at least three different values.