Matthew Scott Wood - Salt Lake City UT, US Paal Tveit - Salt Lake City UT, US Brian Edginton - West Jordan UT, US Steve Shillingford - Lindon UT, US James Brown - Lindon UT, US Joseph H Levy - Eagle Mountain UT, US Daniel M Arnold - Riverton UT, US
Assignee:
Solera Networks, Inc. - South Jordan UT
International Classification:
G06F 7/00 G06F 17/30
US Classification:
707731, 707741, 707758, 707769
Abstract:
A system and method of presentation of an extracted artifact based on an indexing technique are disclosed. In an embodiment, the method includes indexing a database of a captured network characteristic data using a processor and a memory to form an indexed capture data. The method includes enhancing a query response time with the indexed capture data. The method further includes searching the indexed capture data to generate a capture query result. The capture query result includes an extracted artifact. The method also includes graphically presenting the capture query result as at least one of an artifact list and an artifact image.
Method And Apparatus Of Network Artifact Indentification And Extraction
Matthew Scott Wood - Salt Lake City UT, US Paal Tveit - Salt Lake City UT, US Brian Edginton - West Jordan UT, US Steve Shillingford - Lindon UT, US James Brown - Lindon UT, US
Assignee:
Solera Networks, Inc. - South Jordan UT
International Classification:
H04L 12/66
US Classification:
370529, 726 22, 726 23, 726 29
Abstract:
A method, system, and apparatus of network artifact identification and extraction are disclosed. In one embodiment, a method includes aggregating a payload data (e. g. , may be a component of the extracted artifact) from different network packets to form an aggregated payload data, matching the payload data with an entry of a library of known artifacts, determining a type of the payload data based on a match with the entry of the library of known artifacts, separating the payload data from a header data in a network packet, and communicating the aggregated payload data as an extracted artifact to a user. The method may include using the extracted artifact to perform network visibility analysis of users on packets flowing across the network. The method may validate that the entry is accurate by performing a deeper analysis of the payload data with the entry of the library of known artifacts.
Method And Apparatus To Index Network Traffic Meta-Data
Matthew Scott Wood - Salt Lake City UT, US Paal Tveit - Salt Lake City UT, US Brian Edginton - West Jordan UT, US Steve Shillingford - Lindon UT, US James Brown - Lindon UT, US
International Classification:
G01R 31/08
US Classification:
370235
Abstract:
A method, system, and apparatus for indexing network traffic meta-data is disclosed. In one embodiment, a method includes identifying a packet having a header and a payload in a flow of a data through a network, classifying the header of the packet in a type of the header, determining an algorithm to extract a meta-data (e.g., which may be stored in a database of the storage device, and the storage device may be limited in a storage capacity) having information relevant to network traffic visibility based on the type of the header, extracting the meta-data from the header, and streaming the meta-data to a storage device. The method may include applying a last recently used algorithm to discard information from the storage device when storage device is limited in the storage capacity. The method may also include determining that the type of the header is an Ethernet header.
Capture And Regeneration Of A Network Data Using A Virtual Software Switch
Joseph H. Levy - Eagle Mountain UT, US Matthew Scott Wood - Salt Lake City UT, US Paal Tveit - Salt Lake City UT, US Brian Edginton - West Jordan UT, US Steve Shillingford - Lindon UT, US James Brown - Lindon UT, US
International Classification:
H04L 12/26
US Classification:
370250
Abstract:
Methods and a system of capture and regeneration of a network data using a virtual software switch are disclosed. In an embodiment, a method includes capturing a network data using a virtual software switch, a processor, and a memory. The network data is captured to perform a network visibility analysis and the network data is communicated to at least one port of the virtual software switch. The method includes forming a stored network data in a memory. The method also includes regenerating the stored network data to form a reconstructed data.
On Demand Network Activity Reporting Through A Dynamic File System And Method
Matthew Scott Wood - Salt Lake City UT, US Paal Tveit - Salt Lake City UT, US Brian Edginton - West Jordan UT, US Steve Shillingford - Lindon UT, US James Brown - Linden UT, US
International Classification:
G06F 17/30
US Classification:
707200
Abstract:
A method, apparatus and a system of on demand network activity reporting through a dynamic file system and method are disclosed. In one embodiment, a method includes forming a root level selection guide based on a set of criteria associated with an activity through a network that is captured and stored on a storage device associated with a network appliance, refreshing listings of a sub-directory of the root level selection guide dynamically based on the activity through the network stored on the storage device when an option is selected in the root level selection guide, and creating a packet capture file based on a current state of the activity through the network when one of the listings of the sub-directory of the root level selection guide is selected. The method may include automatically referencing a database having the activity through the network when creating the packet capture file.
Progressive Leasing
Senior Solution Architect
Usana Health Sciences Jun 1, 2016 - May 2017
Development Manager
Progresssive Leasing Jun 1, 2016 - May 2017
Director Software Development
Insidesales.com Mar 2015 - Jun 2016
Senior Development Manager
Landesk Software Apr 2014 - Mar 2015
Senior Manager of Software Engineering
Education:
University of Utah 1971 - 1975
West High School 1969 - 1971
Skills:
Agile Methodologies Software Development Software Engineering Software Project Management Linux Integration Enterprise Software Scrum System Architecture C++ Management Testing Team Building Software Design Operating Systems Object Oriented Design Software Quality Assurance Unix Cloud Computing Subversion Agile Project Management Automation Engineering Management Certified Scrum Master Csm Sdlc Software Development Life Cycle Continuous Improvement Continuous Integration Architectures Linux Kernel Architecture Saas Lean Software Development Unix System V Kanban Coffee Roasting Business Partner Relations
Interests:
Civil Rights and Social Action Education Environment Science and Technology Human Rights Arts and Culture
Certifications:
Certified Scrum Master
Youtube
Narcissistic Harry has betrayed King Charles ...
As Prince Harry continues his attacks on the Royal Family, The Telegra...
Duration:
46m 12s
CHAPPAQUIDDICK: DID SENATOR TED KENNEDY COMMI...
tedkennedy #conspiracy #coverup The story of Senator Edward Kennedy's ...
Duration:
46m 44s
CHAPPAQUIDDICK:T... AUTOPSY. EXTRA 1.Why was...
CHAPPAQUIDDICK: THE AUTOPSY EXTRA examines in more detail than our 199...
Duration:
9m 21s
BILLY JOEL on JOE COCKER. Billy Joel Intervie...
In July 2016, Billy Joel was interviewed by director John Edginton, sh...
Duration:
13m 31s
MP Athletic Hall of Fame Inductee (2017) - Ry...
Duration:
12m 16s
Malvern Prep Athletic Hall of Fame Inductee (...
Duration:
3m 3s
Googleplus
Brian Edginton
Lived:
West Jordan, UT West jordan, utah
Work:
LANDesk Software - Engineering Manager
Education:
School of Hard Knocks - Jack of All Trades, Master of None
About:
Software technology professional focused on applying agile principles to engineering, quality assurance and management.