-
公开(公告)号:US12301536B2
公开(公告)日:2025-05-13
申请号:US18460409
申请日:2023-09-01
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Zhijun Ren , Xiaoding Shang , Hao Lu , Qiwei Chang
IPC: H04L61/5014 , H04L61/10 , H04L61/103
Abstract: An AP sets up a data tunnel to a remote network and monitors a remote DHCP session between a client device and a remote DHCP server in the remote network. The remote DHCP server assigns a remote IP address to the client device, and communication between the client device and the remote network is based on the remote IP address. In response to determining completion of the remote DHCP session, the AP initializes a local DHCP session with a local DHCP server in a local network to obtain a local IP address for the client device. Communication between the client device and the local network is based on the local IP address. In response to detecting the client device roaming from the AP to a target AP, the AP forwards the remote and local IP addresses and session data of active sessions on the client device to the target AP.
-
公开(公告)号:US12299084B2
公开(公告)日:2025-05-13
申请号:US17153852
申请日:2021-01-20
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Chaitra Kallianpur , Kalapriya Kannan , Suparna Bhattacharya
IPC: G06N20/00 , G06F18/20 , G06F18/214 , G06F18/22
Abstract: Systems and methods are provided for reusing machine learning models. For example, the applicability of prior models may be compared using one or more assessment values, including a similarity threshold and/or an accuracy threshold. The similarity threshold may identify a similarity of data between a first data set used to generate a first model and a new data set that is received by the system. When the similarity between these two data sets is exceeded, the system may reuse a model with the highest similarity value. When an accuracy value of the data set does not exceed an accuracy threshold, the system may initiate a retraining process to generate a second ML model associated with the second data.
-
公开(公告)号:US20250142763A1
公开(公告)日:2025-05-01
申请号:US18497088
申请日:2023-10-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: See Yun Yow , James D. Hensley , Mun Hoong Tai
IPC: H05K7/20
Abstract: An information processing device comprises heat generating components, a plenum, and fans arranged to flow air through the plenum and to cool the heat generating components. The device also comprises a recirculation inhibition mechanism to reduce the amount of air recirculation in the event a fan fails. The recirculation inhibition mechanism comprises a plenum impedance element extending across the plenum such that the air passing through the plenum passes through the plenum impedance element prior to reaching the fans, and dividers disposed in the plenum and defining sub-compartments in the plenum. Each of the sub-compartments corresponds to one of the fans and is configured to supply air to or receive air from the corresponding fan. In the event of one of the fans failing, air recirculating through the failed fan passes though the plenum impedance element twice before reaching an adjacent fan.
-
公开(公告)号:US20250142466A1
公开(公告)日:2025-05-01
申请号:US18498253
申请日:2023-10-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Guangning Qin , Qin Wei , Zhijun Ren , Chunfeng Wang
Abstract: A method for accelerating provisioning of wireless device. The method comprises receiving, by an access point (AP), a mapping of a wireless device and a further AP from a server. The method further comprises receiving, by the AP, presence announcement information from the wireless device. The method further comprises transmitting, by the AP and based on the received mapping, the received presence announcement information to the further AP. The method further comprises receiving, by the AP, response information for the wireless device from the further AP, the response information including an authentication request for the wireless device. The method further comprises transmitting, by the AP, the response information to the wireless device. In this manner, the provisioning ability of the provision AP can be extended to the non-provision AP, the provisioning time can be reduced, and the provisioning process can be accelerated.
-
公开(公告)号:US20250141799A1
公开(公告)日:2025-05-01
申请号:US18495474
申请日:2023-10-26
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Venkatavaradhan Devarajan , Tathagata Nandy
IPC: H04L45/745 , H04L9/40 , H04L45/24
Abstract: An access switch, which can connect one or more end devices to a network, is provided. During operation, the access switch can identify a multicast flow associated with a multicast group based on one or more packets received at the access switch. The access switch can store a flow identifier of the multicast flow in an entry of a data structure stored in a storage device of the access switch. Subsequently, the access switch can facilitate deep-packet inspection on the multicast flow. To do so, the access switch can determine a set of properties associated with the multicast flow based on a plurality of packets of the multicast group and determine a multicast traffic class for the multicast flow based on the set of properties. The access switch can then store a label identifying the multicast traffic class in the entry of the data structure.
-
公开(公告)号:US20250141576A1
公开(公告)日:2025-05-01
申请号:US18533718
申请日:2023-12-08
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
IPC: H04J3/06
Abstract: In some examples, a first network device including a first time clock sends, over a first network path, a first timing message of a time synchronization process to synchronize the first time clock and a second time clock that is connected to a second network device. The first network device receives an indication associated with a second timing message of the time synchronization process, where the second timing message is to be sent from the second time clock. Based on receiving the indication, the first network device sends a first join message to a first intermediate network device that is part of the first network path, and a second join message to a second intermediate network device that is part of a second network path different from the first network path. The first network device receives, over the first network path, the second timing message sent by the second time clock, the second timing message communicated over the first network path based on the forwarding information built in the first intermediate network device and the second network device.
-
公开(公告)号:US20250141099A1
公开(公告)日:2025-05-01
申请号:US18497113
申请日:2023-10-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Kuanyue Li , Aijun Liu , Hailong Bai , Jiguang Zheng
Abstract: Implementations of the present disclosure relate to radio frequency (RF) connection. In the implementations, an access point (AP) comprises an antenna module, a separation plate, a main board, and a connector. The antenna module is fixed on the first surface of the separation plate. The connector comprises an inner conductor and an outer conductor passing through a hole in the separation plate and connects the trace of the antenna module with the electronic components in the main board. The inner conductor and the outer conductor are retractable along a direction perpendicular to the main board. In this way, by directly connecting the antenna with the main board by a retractable connector, additional cables can be spared without sacrificing the mechanical performance of the connection structure.
-
公开(公告)号:US20250139250A1
公开(公告)日:2025-05-01
申请号:US18429564
申请日:2024-02-01
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Manisha Manjunath , Suhas Shivanna , Anusha Yerranagula , Supriya Kamthania
IPC: G06F21/57
Abstract: A process includes determining, by a recommendation engine, a security risk profile for a container environment. The container environment includes a plurality of pods that are to be deployed on an infrastructure that includes a plurality of nodes. Determining the security risk profile includes determining an infrastructure context characterizing the infrastructure and determining a workload context characterizing a workload associated with the container environment. The process includes determining, by the recommendation engine, a recommendation of a security policy for the container environment based on the security risk profile. The security policy includes a security control. The process includes deploying an agent to the infrastructure to manage compliance of the container environment with the security control.
-
公开(公告)号:US20250138966A1
公开(公告)日:2025-05-01
申请号:US18440281
申请日:2024-02-13
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Hiro Rameshlal Lalwani , Rachit Gupta , Sherine Jacob , Kumar Gaurav , Anand Andaneppa Ganjihal
IPC: G06F11/263
Abstract: In certain embodiments, a method includes receiving, at a framework controller executing, a test execution request comprising test parameters and an expected test outcome, wherein the test execution request comprises a request for testing a microservice architecture implemented in a cloud infrastructure; providing, by the framework controller, the test execution request and the test parameters to a framework injector executing on the one or more processors; providing, by the framework controller, the expected test outcome to a framework monitor executing on the one or more processors; executing, by the framework injector, a test corresponding to the test execution request using a test injector of a plurality of test injectors implemented by the framework injector; monitoring, by the framework monitor, a response of the microservice architecture of the cloud infrastructure to the test; and providing, by the framework controller and from the framework monitor, a test result based on the response.
-
10.
公开(公告)号:US20250138844A1
公开(公告)日:2025-05-01
申请号:US18497944
申请日:2023-10-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Scott J. Hinchley , David S. Brookshire , Aalap Tripathy , Donald M. Bahls , Alan D. Mutschelknaus
Abstract: A process includes hosting, on an edge computing system that is external to a high-performance computing system, a user interface instance. The process includes providing, by the user interface instance, a cryptographic authentication token to the high-performance computing system to form a connection between the high-performance computing system and an endpoint instance of the high-performance computing system. The process includes, responsive to providing the cryptographic authentication token, forming a connection between the user interface instance and the endpoint instance. The process includes mounting a first file system of the edge computing system to a second file system of the high-performance computing system to provide an extended first file system. The process includes exchanging a user environment of the edge computing system with a user environment of the high-performance computing system. The exchanging includes, responsive to a request that is received by the user interface instance from the connection, accessing, by the user interface instance, the extended file system to transfer data between the edge computing system and the high-performance computing system.
-
-
-
-
-
-
-
-
-