Lenovo
Technical Lead For Intel Based Ethernet Products
Ibm Feb 2014 - Sep 2014
Technical Lead For Intel Based Ethernet Products
Ibm Jun 2012 - Feb 2014
Staff Engineer
Ibm Jun 2006 - Jun 2012
Engineer
Jun 2006 - Jun 2012
Technical Lead For Intel Based Ethernet
Education:
Rochester Institute of Technology 2000 - 2006
Master of Science, Masters, Bachelors, Bachelor of Science, Electrical Engineering, Electronics Engineering
Skills:
Debugging Embedded Systems Hardware Vhdl Servers Hardware Architecture Integration C Testing Linux Software Development Computer Hardware Computer Architecture Perl Agile Methodologies Java Enterprise Edition Java Software Engineering C++ Unix Xml Sql X86 Server Architecture Schematic Capture
Eric E. Pettersen - Raleigh NC, US Luke D. Remis - Raleigh NC, US William B. Schwartz - Apex NC, US Timothy M. Wiwel - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 19/00 H01R 13/64 H01R 3/00
US Classification:
702 57, 439488, 439374
Abstract:
Method and apparatus to detect use of a manufacturer-approved insertion tool to connect a processor into electronic communication with a land grid array socket on a circuit board of a computer. A baseboard management controller electronically coupled to electrical contacts on the circuit board engages a conductor on the manufacturer-approved insertion tool and records the event.
- MORRISVILLE NC, US KEITH M. CAMPBELL - CARY NC, US ERIC PETTERSEN - RALEIGH NC, US CLIFTON E. KERR - MORRISVILLE NC, US CHRISTOPHER L. WOOD - CHAPEL HILL NC, US STEVEN L. VANDERLINDEN - HILLSBOROUGH NC, US
International Classification:
G06F 21/70
Abstract:
Component access control includes: receiving, by an access control module, permissions specifying authorization of physical access to one or more secured components of a computing system by one or more requestors; receiving, by the access control module from a requestor, a request to physically access one of the secured components of the computing system; determining, by the access control module based on the permissions, whether the requestor is authorized to physically access the secured component; and responsive to determining that the requestor is authorized to physically access the secured component, granting the requestor physical access to the secured component while prohibiting the requestor from physically accessing other secured components of the computing system.
Selection Of A Location For Installation Of A Cpu In A Compute Node Using Predicted Performance Scores
- Singapore, SG Milton Cobo - Raleigh NC, US Matthew Nicholas Poppino - Morrisville NC, US Eric E. Pettersen - Raleigh NC, US
International Classification:
G06F 13/12 G06F 11/34 G06F 11/30
Abstract:
A computer program product may include storage media embodying program instructions executable by a baseboard management controller (BMC) within a compute node to: receive a request to install a central processing unit (CPU) in the compute node; identify a current hardware configuration of the compute node; identify a plurality of available locations within the compute node that are compatible with installation of the CPU; calculate, for each of the identified plurality of available locations, a predicted performance score for the CPU on the basis that the CPU were to be installed in the available location, wherein the predicted performance scores are calculated in response to receiving the request; select a location from among the plurality of available locations that is associated with the greatest performance score for the CPU; and generate user output indicating the selected location where the CPU should be installed.
Systems And Methods For Managing Access To Host Computing Devices By External Devices
- New Tech Park, SG Eric Pettersen - Raleigh NC, US Matthew Nicholas Poppino - Raleigh NC, US Luke Remis - Raleigh NC, US
International Classification:
G06F 21/44 G06F 13/40
Abstract:
Systems and methods for managing access to host computing devices by external devices are disclosed. According to an aspect, a system includes an interface to a host computing device. The system also includes a computing device controller configured to prevent access to the host computing device via the interface by an external device. The computing device controller is also configured to receive access information from the external device. Further, the computing device controller is configured to determine whether the access information is approved for permitting access to the host computing device. The computing device controller is also configured to provide access to the host computing device via the interface by the external device in response to determining that the access information is approved.
Selection Of A Location For Installation Of A Hardware Component In A Compute Node Using Historical Performance Scores
- Singapore, SG Milton Cobo - Raleigh NC, US Matthew Nicholas Poppino - Morrisville NC, US Eric E. Pettersen - Raleigh NC, US
International Classification:
G06F 13/40 G06F 13/42 G06F 9/445
Abstract:
An apparatus and a computer program product includes non-transitory computer readable storage media embodying program instructions. The program instructions are executable by a baseboard management controller (BMC) to receive a request to install a hardware component in a compute node, identify a current hardware configuration of the compute node, and identify a plurality of available locations within the compute node for installation of the requested component. Still further, the BMC may identify, for each available location, a historical performance database record that includes a performance score for a component installed in the same location as the available location, has the same component type as the requested component, and was collected from a compute node having the same hardware configuration as the current compute node. The BMC may select an available location that has the greatest performance score for the component, and generate output indicating the selected location for installation.
Prioritizing Network Traffic Based On Relative Imminence Of Usage
- Singapore, SG Gary D. Cudak - Wake Forest NC, US Eric E. Pettersen - Raleigh NC, US Luke D. Remis - Raleigh NC, US
International Classification:
H04L 29/08
Abstract:
A method and computer program product for performing the method are provided. The method includes managing network traffic, such as data files and data streams, for a network device, and identifying a context, such as a source address, subject matter, file type, file size, and data streaming rate, associated with each of the network objects. The method further includes obtaining user data associated with the network device, for example a plurality of activities, such as schedule events and historical behavior, and a time associated with each activity. Still further, the method comprises correlating network objects to activities, and altering prioritization of the network objects that are correlated with the activities in response to a current time being within a predetermined time period of the time associated with the one or more activities.