James E. Pherson - Colorado Springs CO, US Diana Shen - Colorado Springs CO, US Paul D. Guttormson - Colorado Springs CO, US Michael Dean Walker - Colorado Springs CO, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F011/30 H04L009/00
US Classification:
713201, 711163, 711164, 711167
Abstract:
A method for implementing security management in a storage area network by controlling access to network resources. Initially, a resource provider communicates with potential resource users, such as host computers, servers, and workstations, to allow the users to discover the resources available on the storage area network. Resource users that have not previously logged in to a particular resource supply identification information to the resource provider, which places the information in a ‘not yet approved entity’ table. The ‘not yet approved entity’ table is made available to a management station. An administrator, using the management station, then determines whether to authorize use of resources. If access to the requested resource is allowed, the resource user identification information is stored in an ‘approved entity’ table. A login is then allowed by the resource user to the selected resource.
James E. Pherson - Colorado Springs CO, US Diana Shen - Colorado Springs CO, US Paul D. Guttormson - Colorado Springs CO, US Michael Dean Walker - Colorado Springs CO, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
A method for implementing security management in a storage area network by controlling access to network resources. Initially, a resource provider communicates with potential resource users, such as host computers, servers, and workstations, to allow the users to discover the resources available on the storage area network. Resource users that have not previously logged in to a particular resource supply identification information to the resource provider, which places the information in a ‘not yet approved entity’ table. The ‘not yet approved entity’ table is made available to a management station. An administrator, using the management station, then determines whether to authorize use of resources. If access to the requested resource is allowed, the resource user identification information is stored in an ‘approved entity’ table. A login is then allowed by the resource user to the selected resource.
Generic Storage Container For Allocating Multiple Data Formats
A generic storage container system is provided for a grid-based storage architecture, comprising a generic storage container comprising a plurality of storage domains along one axis against a plurality of rows of stripes along another axis defining a preselected storage capacity, and configuration information allocating the stripes in response to a storage format specified by an allocation request. A method is provided for storing the data, comprising: providing the generic storage container; providing configuration information adapted for selectively allocating the stripes in relation to a data storage format; specifying a desired storage format; and allocating the stripes in response to the desired format.
Host Transparent Storage Controller Failover/Failback Of Scsi Targets And Associated Units
Randal S. Marks - Colorado Springs CO Randy L. Roberson - Colorado Springs CO Diana Shen - Colorado Springs CO Stephen J. Sicola - Monument CO
Assignee:
Digital Equipment Corporation - Maynard MA
International Classification:
G06F 1120
US Classification:
39518207
Abstract:
Provided herein is a method and apparatus for host transparent storage controller failover and failback. A controller is capable of assuming the identity of a failed controller while continuing to respond to its own SCSI ID or IDs in such a way that all SCSI IDs and associated units (LUNS) of the failed controller are effectively taken over by the surviving controller. This "failover" behavior is transparent to any attached host computers and is treated by such attached hosts as a powerfail condition. The symmetric operation of returning the targets (IDs) and units (LUNs) to the previously failing controller ("failback") is likewise transparent.
Name / Title
Company / Classification
Phones & Addresses
Diana Shen
NAUGHTY GIRLS INC
1444 Territory Trl, Colorado Springs, CO 80919 757 Cresting Oak Cir, Orlando, FL 32824
Diana Shen
YOGURT TREE, INC
2874 N University Dr, Pompano Beach, FL 33071 1840 NW 124 Way, Pompano Beach, FL 33071
Diana Shen Vice President, Director
Oriental Express, Inc
2874 N University Dr, Pompano Beach, FL 33065
Diana Shen Treasurer, Director, Vice President
NAUGHTY GIRLS, INC Nonclassifiable Establishments
12951 NW 1 St #104, Hollywood, FL 33028
Diana Shen Treasurer, Director, Secretary, Vice President
OSS WEB DEVELOPMENT, INC Computer Systems Design
12951 N West 1 St STE 104, Hollywood, FL 33028 12951 NW 1 St, Hollywood, FL 33028
Barneys New York since Jan 2013
Financial Analyst
UBS Investment Bank Jul 2012 - Jan 2013
Market Risk Analyst
UBS Investment Bank Jul 2010 - Jul 2012
Financial Analyst
UBS Investment Bank - Stamford, Connecticut Jul 2009 - Aug 2009
Global Valuations Summer Intern
NYU Stern School of Business Jan 2009 - May 2009
Stern Consulting Corp Intern
Education:
New York University - Leonard N. Stern School of Business 2006 - 2010
BS, Finance, International Business, East Asian Studies
Williamsville East High School 2002 - 2006
Skills:
Basel III Exchange Traded Derivatives Financial Analysis Financial Reporting Product Control Risk Weighted Assets Capital Adequacy Market Risk Bond Pricing Interest Rate Swaps Total Return Swaps