Navneet Malpani - Austin TX, US Xuebin Yao - Austin TX, US Charles A. Musta - Austin TX, US
Assignee:
INTEL Corporation - Santa Clara CA
International Classification:
H04L 12/28
US Classification:
370230, 3703954, 370428
Abstract:
Provided are techniques for static load balancing. For each data path in a network adapter team, a load balancing value is computed. A maximum value of the computed load balancing values is determined. A data path with the maximum value is selected for use in routing data. Also provided are techniques for dynamic load balancing in which, when a load balancing share of a data path is less than an actual load balancing share, the load balancing share of the data path is adjusted. Furthermore, provided are techniques for failover processing in which a command is routed through a second network adapter in response to determining that the command may not be routed through a first network adaptor.
Navneet Malpani - Austin TX, US Xuebin Yao - Austin TX, US Charles A. Musta - Austin TX, US Mikal N. Hart - Austin TX, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G06F 11/00
US Classification:
714 17, 714 4, 714 15, 714 16, 719321, 719326
Abstract:
A command is received, at a network storage driver, from an operating system storage stack, wherein the command is for communication with a target storage device over a connection across a network. The command is selectively executed, a plurality of times over the connection, for communicating with the target storage device, in response to a determination that the command failed to successfully communicate with the target storage device within a threshold period of time.
Management Of Offload Operations In A Network Storage Driver
Xuebin Yao - Austin TX, US Navneet Malpani - Austin TX, US
International Classification:
G06F015/16
US Classification:
709227000
Abstract:
A network storage driver requests a connection from an offload application, wherein the offload application interfaces with a first network stack implemented in an operating system and a second network stack implemented in a hardware device. The connection is received from the offload application, wherein the received connection is an offloaded connection and is reserved for the network storage driver. Data is communicated over the offloaded connection through the hardware device.
Compression And Decompression Of Expansion Read Only Memories
David Matheny - Cedar Park TX, US Navneet Malpani - Austin TX, US
International Classification:
G06F012/00
US Classification:
711102000, 713002000, 711154000
Abstract:
The inventive subject matter provides systems, methods, data structures, and software to compress and decompress a memory image such as an expansion read-only memory (ROM). Some embodiments include attaching a compressed memory image to a decompression shell to create a data structure that includes decompression instructions. Other embodiments include loading a memory image from a data structure by decompressing the memory image according to decompression instructions included in the data structure.
Technologies For Authentication And Single-Sign-On Using Device Security Assertions
- Santa Clara CA, US Suman Sharma - San Jose CA, US John B. Vicente - Roseville CA, US Luis A. Gimenez - Granite Bay CA, US Carlton D. Ashley - Folsom CA, US Navneet Malpani - Phoenix AZ, US
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server. Other embodiments are described and claimed.
Technologies For Authentication And Single-Sign-On Using Device Security Assertions
Hong Li - El Dorado Hills CA, US Suman Sharma - San Jose CA, US John B. Vicente - Roseville CA, US Luis A. Gimenez - Granite Bay CA, US Carlton D. Ashley - Folsom CA, US Navneet Malpani - Phoenix AZ, US
International Classification:
H04L 29/06 H04L 29/08 G06F 21/41 G06F 21/44
Abstract:
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server. Other embodiments are described and claimed.
Alivecor Inc.
Vice President
Amazon
Principal Business Development Manager
Amazon
Principal Solutions Architect
Intel Corporation Apr 2013 - Jul 2016
Director, Business Development - Datacenter and Cloud Group
Intel Corporation Jun 2001 - Apr 2013
Strategic Planner and Product and Technical Marketing
Education:
Babson College 2005 - 2006
Master of Business Administration, Masters
Texas A&M University 2000 - 2001
Master of Science, Masters, Computer Science
R. V. College of Engineering, Bangalore 1994 - 1998
Bachelors, Computer Science
Skills:
Product Marketing Solution Architecture Cross Functional Team Leadership Product Management Business Development Semiconductors Strategic Partnerships Management Go To Market Strategy
Youtube
A decent dance by a Bride
Duration:
2m 30s
What I Got Wrong About Waste in India | Anish...
Waste is a massive problem in the world today. Anish Malpani takes us ...
Duration:
13m 54s
Gulshan ka jalva
Duration:
2m 20s
Fertility Treatment | The Value of the Second...
Seeking a second opinion sometimes before embarking on your fertility ...
Duration:
5m 53s
A message from Mr. Navneet Bali for the futur...
Brainware University had the privilege of having Mr. Navneet Bali (Reg...
Duration:
1m 37s
Vipasana Meditation Series 1st Video of Mr Di...
20 Minutes to Change the Way you Look at Life With Vipassana Meditatio...