Amir Husain

Amir Husain

Austin, Texas Metropolitan Area
19K followers 500+ connections

Articles by Amir

Publications

  • On Hyperwar: AI in the Battlefield

    United States Naval Institute Proceedings

    Co-authored with Four Star US Marine Corps. Gen. John R. Allen (ret), "On Hyperwar" is an exploration of the impact and importance of Artificial Intelligence on the battlefield of the future. The publication has sparked international interest, receiving significant coverage in defense and technology publications around the world, and becoming a key topic at the NATO Adaptation Initiative Summit at Brussels in 2017

    See publication
  • Artificial Intelligence Approaches To UCAV Autonomy

    Cornell University Library arXiv.org

    This paper covers a number of approaches that leverage Artificial Intelligence algorithms and techniques to aid Unmanned Combat Aerial Vehicle (UCAV) autonomy. An analysis of current approaches to autonomous control is provided followed by an exploration of how these techniques can be extended and enriched with AI techniques including Artificial Neural Networks (ANN), Ensembling and Reinforcement Learning (RL) to evolve control strategies for UCAVs.

    Other authors
    • Prof. Bruce Porter, Chairman, UT Austin Dept. of Computer Science
    See publication
  • AI On The Battlefield: A Framework For Ethical Autonomy

    Forbes

    Autonomy is coming to warfare, and some would say it's already here. Weapon systems driven by artificial intelligence (AI) algorithms will soon be making potentially deadly decisions on the battlefield. This transition is not theoretical. The immense capability of large numbers of autonomous systems represents a revolution in warfare that no country can ignore.

    Other authors
    • Gen. John Allen
    See publication
  • Reducing VDI cost by exploring alternatives to centralized VM storage

    Network World

    One of the most significant cost elements with VDI is the centralized storage required for maintaining virtual machines. Hypervisor vendors argue that to get disaster recovery and high availability the additional expense is really a bargain. And in many instances that might be true. But in many cases cost is paramount, complexity is to be avoided and three or four nines of availability may be far down the list of priorities.

    See publication
  • Reversing CoIT: A Private Cloud for the Small Business & Home User

    VMBlog.com

    Look through the pages of a tech magazine, and you can't miss the new buzz-word; The Consumerization of IT (CoIT). It refers to the fact that users are now exposed to new, cool technology at an individual level before their employer has had an opportunity to adopt the same. In a nutshell, the information worker's raised expectations of corporate IT result from his own experiences as a consumer. And IT departments have to keep up! This phenomenon was particularly pronounced with the adoption of…

    Look through the pages of a tech magazine, and you can't miss the new buzz-word; The Consumerization of IT (CoIT). It refers to the fact that users are now exposed to new, cool technology at an individual level before their employer has had an opportunity to adopt the same. In a nutshell, the information worker's raised expectations of corporate IT result from his own experiences as a consumer. And IT departments have to keep up! This phenomenon was particularly pronounced with the adoption of mobile devices like the iPhone, which were initially not thought of as "enterprise capable". It turned out that whatever IT departments thought about the product, consumers loved it. They brought it to work with them. They liked the experience so much that they started clamouring for the ability to check their work email on it. And before you could say "Blackberry Enterprise Server", IT departments figured out ways in which to integrate iPhones, iPads and Android devices into the overall corporate infrastructure. How, is a story for another day, but in this article, I want to look at the flip side of the CoIT phenomenon.

    See publication
  • The Future of Virtualization and Cloud Computing

    VMBlog.com

    Virtualization, as one of the enabling technologies underpinning the Cloud, continues to be enormously relevant to the evolving future architecture of computing, specifically end-user computing. There are at least two underlying industry directions that make virtualization immensely relevant. First, is the trend toward highly multicore CPUs. And second, the massive, ongoing adoption of a plethora of mobile device form factors.

    See publication
  • Cloud Computing, VDI and the future of Desktops-as-a-Service

    VMBlog.com

    One of the more popular questions today's IT directors and systems administrators are faced with is whether the advent of cloud computing means that desktop virtualization is no longer relevant. On the surface, this seems to be a perfectly credible question. After all, the Cloud, as an IT meme, emerged after VDI had already been written about and discussed in the IT press for a year or two. Does the Cloud really represent an alternate architecture separate and de-linked from virtualization in…

    One of the more popular questions today's IT directors and systems administrators are faced with is whether the advent of cloud computing means that desktop virtualization is no longer relevant. On the surface, this seems to be a perfectly credible question. After all, the Cloud, as an IT meme, emerged after VDI had already been written about and discussed in the IT press for a year or two. Does the Cloud really represent an alternate architecture separate and de-linked from virtualization in general and VDI (Virtual Desktop Infrastructure) in particular? As it turns out, the answer is, "Not really!". Looking at Cloud computing as an alternate to VDI is ignoring the reality that cloud computing has, as its essential underpinning, an enabling layer made possible by virtualization. The Cloud, as a delivery paradigm, is not so much an alternative to virtualization or even VDI, as it is an overarching architecture that makes use of hypervisors and the underlying functionality they enable.

    See publication
  • Implementing Virtualization: The Importance of Management

    Virtual Strategy Magazine

    Virtualization has taken the enterprise by storm. Recent surveys indicate that a majority of CIOs are contemplating virtualization deployments...

    See publication
  • The state of Connection Brokering

    Network World

    Centralized computing is becoming increasingly accepted as an efficient and cost-effective way of deploying desktops in the enterprise, shining a light on the key technologies that make it all possible. Virtualization, for example, allows more than one user to run a desktop session on a centralized server. Another less discussed but perhaps more important component is connection brokering.

    See publication
  • Mobile Devices and Centralized Computing Redefine the Desktop

    IT Today

    Hardly a day goes by without a new mobile or smartphone device hitting the retail shelves, with upgraded capabilities and compelling new functionality. The world over, mobile telephony is becoming universally prevalent and the capabilities of our phones are increasing by the day. From larger displays, faster networks, improved software and more effective input techniques to massive storage, GPS functionality, built-in security and easier to use designs; everything is on offer, with upgrades…

    Hardly a day goes by without a new mobile or smartphone device hitting the retail shelves, with upgraded capabilities and compelling new functionality. The world over, mobile telephony is becoming universally prevalent and the capabilities of our phones are increasing by the day. From larger displays, faster networks, improved software and more effective input techniques to massive storage, GPS functionality, built-in security and easier to use designs; everything is on offer, with upgrades every six months. Wait a little while longer and you'll see greatly extended battery life with fuel cell technology, flexible displays, foldable e-paper, built-in micro projectors, and serious CPU and storage upgrades. The mobile device of today is more powerful than the PC of a few years ago.

    See publication
  • An analysis of communication induced checkpointing

    IEEE Fault-Tolerant Computing, 1999. Digest of Papers. Twenty-Ninth Annual International Symposium

    Communication induced checkpointing (CIC) allows processes in a distributed computation to take independent checkpoints and to avoid the domino effect. This paper presents an analysis of CIC protocols based on a prototype implementation and validated simulations. Our result indicate that there is sufficient evidence to suspect that much of the conventional wisdom about these protocols is questionable

    See publication
  • The Interaktiv tutor

    IEEE Systems, Man, and Cybernetics, 1997. Computational Cybernetics and Simulation., 1997 International Conference

    The Interaktiv system is a user-model based intelligent tutor for the MS-DOS operating system. The system provides a custom interface according to the domain expertise of the user. User interactions with the system are constantly monitored by the system and `situation sensitive' help is provided. This is backed up by tutorials and optional quizzes. Multimedia (audio and graphics) has also been incorporated to reinforce textual explanations. Lastly, the whole system, though currently being used…

    The Interaktiv system is a user-model based intelligent tutor for the MS-DOS operating system. The system provides a custom interface according to the domain expertise of the user. User interactions with the system are constantly monitored by the system and `situation sensitive' help is provided. This is backed up by tutorials and optional quizzes. Multimedia (audio and graphics) has also been incorporated to reinforce textual explanations. Lastly, the whole system, though currently being used for tutoring of MS-DOS, remains entirely domain independent. This increases possibilities of its use in other areas of knowledge which require an adaptable, intelligent tutoring system

    See publication
  • The Distributed Learning Environment (DLE)

    IEEE Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century., International Conference

    Connectivity is an excellent means for the spread of education. In this paper we present a domain-independent tutoring system, called the “distributed learning environment” (DLE). The paper focuses on the educational services provided by the system and its potential in promoting education. The DLE targets two classes of users, instructors and students. It provides instructors with an environment for course construction and students a facility to study and learn through one-to-one tutoring. The…

    Connectivity is an excellent means for the spread of education. In this paper we present a domain-independent tutoring system, called the “distributed learning environment” (DLE). The paper focuses on the educational services provided by the system and its potential in promoting education. The DLE targets two classes of users, instructors and students. It provides instructors with an environment for course construction and students a facility to study and learn through one-to-one tutoring. The teaching and learning environment of the DLE has been set up using electronic communication media via a local area network so that its potential be realized through the sharing of this software by multiple users

    See publication

Patents

  • Cooperative execution of a genetic algorithm with an efficient training algorithm for data-driven model creation

    Issued US 9,785,886

    A method includes, based on a fitness function, selecting a subset of models from a plurality of models. The plurality of models is generated based on a genetic algorithm and corresponds to a first epoch of the genetic algorithm. Each of the plurality of models includes data representative of a neural network. The method also includes performing at least one genetic operation of the genetic algorithm with respect to at least one model of the subset to generate a trainable model and sending the…

    A method includes, based on a fitness function, selecting a subset of models from a plurality of models. The plurality of models is generated based on a genetic algorithm and corresponds to a first epoch of the genetic algorithm. Each of the plurality of models includes data representative of a neural network. The method also includes performing at least one genetic operation of the genetic algorithm with respect to at least one model of the subset to generate a trainable model and sending the trainable model to an optimization trainer. The method includes adding a trained model received from the optimization trainer as input to a second epoch of the genetic algorithm that is subsequent to the first epoch.

    See patent
  • Systems and methods for using cognitive fingerprints

    Issued US US9578053B2

    A system and method for creating a core cognitive fingerprint. A core cognitive fingerprint can be used to capture the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a threshold. The method includes: identifying a set of time frames within which data is extracted; providing a plurality of pattern recognizers; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements;…

    A system and method for creating a core cognitive fingerprint. A core cognitive fingerprint can be used to capture the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a threshold. The method includes: identifying a set of time frames within which data is extracted; providing a plurality of pattern recognizers; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements; extracting identified relationships amongst the initial set of elements; modifying the initial set of elements to include the identified relationships to create an intermediate set of elements; comparing the intermediate set of elements against assigned values to weigh each element in the intermediate set of elements to create a final set of elements; and using the final set of elements as a cognitive fingerprint.

    See patent
  • System and method for creating a core cognitive fingerprint

    Issued US US9292675B2

    A system and method for creating a core cognitive fingerprint are provided. A core cognitive fingerprint can be used to capture and summarize the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a defined threshold. The method includes: identifying a set of time frames, each time frame corresponding to a respective data source, within which data is extracted; providing a plurality of pattern recognizers each having an assigned…

    A system and method for creating a core cognitive fingerprint are provided. A core cognitive fingerprint can be used to capture and summarize the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a defined threshold. The method includes: identifying a set of time frames, each time frame corresponding to a respective data source, within which data is extracted; providing a plurality of pattern recognizers each having an assigned heuristic specific to a type of content; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements, each element corresponding to the output of the heuristic assigned to each pattern recognizer; extracting identified relationships amongst the initial set of elements; modifying the initial set of elements to include the identified relationships to create an intermediate set of elements; comparing the intermediate set of elements against assigned values to emphasize or deemphasize each element in the intermediate set of elements to create a final set of elements; and using the final set of elements as a cognitive fingerprint representing a signature of the data extracted from the time frame, so that the signature can be compared to other cognitive fingerprints for further analysis.

    See patent
  • Zero client device with integrated serial bandwidth augmentation and support for out-of-band serial communications

    Issued US US9134945B2

    System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to…

    System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to receive the encoded input data from the transcoder, transmit the encoded input data over the network to the server, receive output data from the server, and send the output data to the transcoder. The transcoder is further configured to receive the output data from the communications processing unit, decode the output data, and send the decoded output data to at least one of the human interface devices.

    See patent
  • Zero client device with multi-boot capability supporting multiple zero client protocols

    Issued US 9,063,691

    System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to…

    System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to receive the encoded input data from the transcoder, transmit the encoded input data over the network to the server, receive output data from the server, and send the output data to the transcoder. The transcoder is further configured to receive the output data from the communications processing unit, decode the output data, and send the decoded output data to at least one of the human interface devices.

    See patent
  • Capturing and restoring session state of a machine without using memory images

    Issued US 9,043,391

    System and method for capturing and/or restoring session state of a machine without using image files. Session state information for a first computer system may be captured in a structured state capture file (SSCF) using metadata to represent the session state and steps or actions which produced the session state, and does not include a memory image or memory dump of the first computer system. The SSCF may be stored, and subsequently provided for restoration of the session state on the first…

    System and method for capturing and/or restoring session state of a machine without using image files. Session state information for a first computer system may be captured in a structured state capture file (SSCF) using metadata to represent the session state and steps or actions which produced the session state, and does not include a memory image or memory dump of the first computer system. The SSCF may be stored, and subsequently provided for restoration of the session state on the first computer system or a different computer system. A server computer system may store the SSCF (with other SSCFs) and may provide the SSCF to the first computer system or a different computer system over a network for session state restoration, e.g., in response to a request over the network. The first computer system may implement a virtual machine (VM). The session state may be that of the VM.

    See patent
  • Mass storage lockout for USB devices on extended USB system

    Issued US US8661523 B2

    A method and system, used with an extended USB computer system, for locking out USB mass storage devices at the desktop. For lockout activation, a switch at each host computer is set, and causes a host-side lockout process to deliver a downstream lockout signal to the host's associated portal. This signal causes a portal-side lockout process to disallow USB data from a mass storage device from entering the network.

    See patent
  • Zero client device with integrated serial or parallel ports

    Issued US US8539025 B2

    System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to…

    System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to receive the encoded input data from the transcoder, transmit the encoded input data over the network to the server, receive output data from the server, and send the output data to the transcoder. The transcoder is further configured to receive the output data from the communications processing unit, decode the output data, and send the decoded output data to at least one of the human interface devices.

    See patent
  • Utility computing system having co-located computer systems for provision of computing resources

    Issued US US8479146 B2

    ABSTRACT
    System and method for providing computer resources to users. The system includes a plurality of co-located computing systems, e.g., blade computers, comprising a hierarchy of computer resources based on performance, and located at a first location, each computing system including a processor, a memory medium coupled to the processor, and a plurality of human interface systems, each located at a second location remote from the first location, and each including an interface device…

    ABSTRACT
    System and method for providing computer resources to users. The system includes a plurality of co-located computing systems, e.g., blade computers, comprising a hierarchy of computer resources based on performance, and located at a first location, each computing system including a processor, a memory medium coupled to the processor, and a plurality of human interface systems, each located at a second location remote from the first location, and each including an interface device, and one or more human interface devices coupled to the interface device, where each human interface system is coupled to the co-located computing systems over a network, such as a LAN or a WAN, via the interface device. Computer resources are provided to users of the plurality of remote human interface systems over the network in accordance with the computer resource performance needs of the users. Charges may be assessed for usage of the computer resources.

    See patent
  • Maintaining a pool of free virtual machines on a server computer

    Issued US 8,176,486

    Various embodiments of a system and method for managing virtual machines on a server computer are described. According to one embodiment of the method, a pool of free virtual machines may be maintained on the server computer, e.g., where the number of virtual machines in the pool is specified by an administrator. In response to receiving a request to assign a virtual machine to a first user, the server computer may assign a first virtual machine from the pool to the first user and add a new…

    Various embodiments of a system and method for managing virtual machines on a server computer are described. According to one embodiment of the method, a pool of free virtual machines may be maintained on the server computer, e.g., where the number of virtual machines in the pool is specified by an administrator. In response to receiving a request to assign a virtual machine to a first user, the server computer may assign a first virtual machine from the pool to the first user and add a new virtual machine to the pool to replace the first virtual machine. In some embodiments the server computer may be one of a plurality of server computers in a server computer system. An administrator may be able to configure different pool sizes for different server computers in the system through a central user interface.

    See patent
  • Distributed computing infrastructure including autonomous intelligent management system

    Issued US 7,434,220

    Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed…

    Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed applications using pre-complied binaries. DCI may include a capability for multiple, independent collaborative sessions for distributed collaborative applications (e.g., chat, instant messaging, shared whiteboard, etc.). DCI may include systems and methods for reducing interactions between users and applications to archivable form and then playing back the interactions. DCI may include a system and method for automatic software retrieval on a peer-to-peer network.

    See patent
  • System and method for reducing user-application interactions to archivable form

    Issued US 7,430,616

    Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed…

    Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed applications using pre-complied binaries. DCI may include a capability for multiple, independent collaborative sessions for distributed collaborative applications (e.g., chat, instant messaging, shared whiteboard, etc.). DCI may include systems and methods for reducing interactions between users and applications to archivable form and then playing back the interactions. DCI may include a system and method for automatic software retrieval on a peer-to-peer network.

    See patent
  • Distributed computing infrastructure including small peer-to-peer applications

    Issued US 7,370,336

    Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed…

    Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed applications using pre-complied binaries. DCI may include a capability for multiple, independent collaborative sessions for distributed collaborative applications (e.g., chat, instant messaging, shared whiteboard, etc.). DCI may include systems and methods for reducing interactions between users and applications to archivable form and then playing back the interactions. DCI may include a system and method for automatic software retrieval on a peer-to-peer network.

    See patent
  • System and method for providing virtual network attached storage using excess distributed storage capacity

    Issued US 7,370,083

    A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and…

    A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and may store data on the shared storage volume. VNAS may be implemented in a peer-to-peer manner whereby each computer acts as a server for the data stored on its part of the shared storage volume (i.e., the second portion of its storage media). VNAS may be used to implement a system and method for managing data fail-over.

    See patent
  • Distributed resource manager

    Issued US 7,328,261

    A distributed resource manager for managing resources among a plurality of networked computers, e.g., computer blades. The resource manager executes on two or more of the computers, e.g., substantially concurrently, collecting data related to usage, performance, status, and/or load, for a component, process, and/or attribute of one or more computers, and evaluating operation rules based on the collected data to determine one or more resource management operations, e.g., re-configuring…

    A distributed resource manager for managing resources among a plurality of networked computers, e.g., computer blades. The resource manager executes on two or more of the computers, e.g., substantially concurrently, collecting data related to usage, performance, status, and/or load, for a component, process, and/or attribute of one or more computers, and evaluating operation rules based on the collected data to determine one or more resource management operations, e.g., re-configuring, activating/deactivating, and/or switching and/or swapping computers, for more efficient allocation of resources. Each executing resource manager transmits the determined resource management operations to the other executing resource managers, receives respective determined resource management operations from them, and resolves conflicts between the determined resource management operations and the received respective determined resource management operations, thereby generating a modified one or more resource management operations. The modified resource management operations may be performed with or without human input.

    See patent
  • Data fail-over for a multi-computer system

    Issued US 7,318,095

    System and method for managing data fail-over for a computing system comprising a plurality of computers, e.g., computer blades, coupled through a network. A fail-over condition may indicate a component failure, an imminent failure, and/or a need to modify or replace some aspect of a computer. Computers in the system may back up their information to other computers in the system. If a fail-over condition is detected on a first computer, a replacement computer may be loaded with the information…

    System and method for managing data fail-over for a computing system comprising a plurality of computers, e.g., computer blades, coupled through a network. A fail-over condition may indicate a component failure, an imminent failure, and/or a need to modify or replace some aspect of a computer. Computers in the system may back up their information to other computers in the system. If a fail-over condition is detected on a first computer, a replacement computer may be loaded with the information from the first computer, optionally from a backup copy stored on another computer (or distributed across multiple computers), and the first computer's peripheral devices (human interface) switched over to the replacement computer. The method may be used to replace a single computer, swap two computers, and/or perform a cascade move among multiple computers, and may be performed automatically in response to the fail-over condition, or initiated by a system administrator.

    See patent
  • System and method for providing virtual network attached storage using excess distributed storage capacity

    Issued US 7,139,809

    A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and…

    A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and may store data on the shared storage volume. VNAS may be implemented in a peer-to-peer manner whereby each computer acts as a server for the data stored on its part of the shared storage volume (i.e., the second portion of its storage media). VNAS may be used to implement a system and method for managing data fail-over.

    See patent
  • Migrating Session State of a Machine Without Using Memory Images

    Filed US 20120011509

    Embodiments of a system and method for migrating session state from a first machine to a second machine without using memory images are disclosed. State information for components of a first computer is determined and stored in a structured human and machine readable file, and does not include a memory image, a disk image, register status, or register contents for the first computer. A second computer is set to a state corresponding to the state of the first computer based on the stored state…

    Embodiments of a system and method for migrating session state from a first machine to a second machine without using memory images are disclosed. State information for components of a first computer is determined and stored in a structured human and machine readable file, and does not include a memory image, a disk image, register status, or register contents for the first computer. A second computer is set to a state corresponding to the state of the first computer based on the stored state information, including parsing one or more sections of the structured file to determine actions for restoring state of one or more of the corresponding components, and for each component of the one or more components, performing the actions, including instantiating or invoking the component on the second computer, and performing multiple steps to configure the component in accordance with the state information.

    See patent
  • Associating Virtual Machines on a Server Computer with Particular Users on an Exclusive Basis

    Filed US 20080201479

    A first computer of a plurality of computers in a server computer system may be associated with a first user on an exclusive basis. An administrator of the server computer system may utilize an administrative user interface in order to specify the association. Associating the first computer with the first user on the exclusive basis may prevent users other than the first user from using the first computer. In response to receiving a request from the first user to connect to the server computer…

    A first computer of a plurality of computers in a server computer system may be associated with a first user on an exclusive basis. An administrator of the server computer system may utilize an administrative user interface in order to specify the association. Associating the first computer with the first user on the exclusive basis may prevent users other than the first user from using the first computer. In response to receiving a request from the first user to connect to the server computer system, the system may operate to determine that the first computer is associated with the first user on the exclusive basis and may assign the first computer to the first user. Once the first computer has been assigned to the first user, the first user can begin using the first computer. In some embodiments the first computer may be a physical computer. In other embodiments the first computer may be a virtual machine.

    See patent
  • Moving Execution of a Virtual Machine Across Different Virtualization Platforms

    Filed US 20080201455

    Various embodiments of a system and method for moving execution of a virtual machine from a first server computer to a second server computer are disclosed. The first server computer and the second server computer may implement different types of virtualization platforms. The first server computer may be configured to execute a first virtual machine within a first virtualization platform, create snapshot information for the first virtual machine, and transmit the snapshot information to the…

    Various embodiments of a system and method for moving execution of a virtual machine from a first server computer to a second server computer are disclosed. The first server computer and the second server computer may implement different types of virtualization platforms. The first server computer may be configured to execute a first virtual machine within a first virtualization platform, create snapshot information for the first virtual machine, and transmit the snapshot information to the second server computer. The second server computer may be configured to create a second virtual machine within a second virtualization platform, where the second virtualization platform is a different type of virtualization platform than the first virtualization platform. The second server computer may set the second virtual machine to a state corresponding to the state of the first virtual machine using the snapshot information.

    See patent
  • Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer

    Filed US 20080201414

    Various embodiments of a system and method for transferring a virtual machine stored on a server computer system to a client computer system in order to execute the virtual machine locally on the client computer system are disclosed. The system and method may also be operable to transfer the virtual machine back from the client computer system to the server computer system. File differencing techniques may be used in both directions so that only changed data in the virtual machine image file is…

    Various embodiments of a system and method for transferring a virtual machine stored on a server computer system to a client computer system in order to execute the virtual machine locally on the client computer system are disclosed. The system and method may also be operable to transfer the virtual machine back from the client computer system to the server computer system. File differencing techniques may be used in both directions so that only changed data in the virtual machine image file is transferred across the network. The client computer system may be operable to download the virtual machine image file from the server computer system using common communication protocols such as HTTP, HTTPS, or FTP so that the virtual machine can be transferred to the client computer system without needing to be able to access files on the server computer system through a VPN.

    See patent

Honors & Awards

  • ABJ Best CEOs of 2016 List

    Austin Business Journal

    In September, 2016, Amir Husain was listed by the Austin Business Journal on their Best CEOs of 2016 list. http://www.bizjournals.com/austin/event/144892/2016/best-ceo

  • Austin Business Journal - Techpreneur of the Year - TechFlash Titan Award 2015

    Austin Business Journal

    http://www.bizjournals.com/austin/print-edition/2015/11/06/abj-techflash-titans-amir-husain-founder-and-ceo.html

    Amir Husain, founder and CEO of SparkCognition Inc., is the 2015 ABJ TechFlash Titans Techpreneur of the Year award winner. Husain is the type of serial entrepreneur and inventor who helped solidify Austin’s outstanding business reputation.

  • CIO Review's Hottest IoT Companies

    CIO Review

    SparkCognition was cited on the list of the Hottest IoT Companies by CIO Review. "SparkCognition is the only IoT company partnering with IBM Watson to build ground breaking applications. SparkCognition's position as an industry leader is based on its pioneering technology, backed by a number of [..] patents"
    http://software.cioreview.com/vendor/2014/sparkcognition

  • InnovateApp 2014 - Most Innovative Application of 2014

    IBM Corporation

    SparkCognition’s submission to the global IBM contest was its Cognitive Security Insights application (CSI). CSI is a Cloud-based, big data driven security offering that delivers AI-based protection from from web attacks, exploits, scans and application-specific threats. Doug Balog, General Manager of IBM's Power Systems Group, commented on SparkCognition's victory via Twitter, "SparkCognition throws down the competition with an innovative new Linux on Power…

    SparkCognition’s submission to the global IBM contest was its Cognitive Security Insights application (CSI). CSI is a Cloud-based, big data driven security offering that delivers AI-based protection from from web attacks, exploits, scans and application-specific threats. Doug Balog, General Manager of IBM's Power Systems Group, commented on SparkCognition's victory via Twitter, "SparkCognition throws down the competition with an innovative new Linux on Power application!"

    http://www.prweb.com/releases/2014/06/prweb11923574.htm

  • SBCA Best of Business Award

    Small Business Community Association

    VDIworks, a leading provider of software for virtualization and cloud computing, has been selected for the 2012 Best of Business Award in Computer Software, by the SBCA Community.

    SBCA Community recognizes and awards business leaders because they often do not receive the recognition they deserve. Business leaders and entrepreneurs are role models for the community at large. SBCA Community 2012 Best of Business Award winners are a valuable asset to their community and exemplify what makes…

    VDIworks, a leading provider of software for virtualization and cloud computing, has been selected for the 2012 Best of Business Award in Computer Software, by the SBCA Community.

    SBCA Community recognizes and awards business leaders because they often do not receive the recognition they deserve. Business leaders and entrepreneurs are role models for the community at large. SBCA Community 2012 Best of Business Award winners are a valuable asset to their community and exemplify what makes small business great.

    Amir Husain, President and CEO of VDIworks, stated “We are pleased to receive this recognition from the SBCA. In the last year VDIworks has won numerous awards and mentions from global organizations such as UBM, CRN, Network World and others. But this SBCA award means a lot to our team as it recognizes our contributions to our community, and to Austin, Texas; the amazing city we are blessed to call home.”

    http://www.prweb.com/releases/2013/3/prweb10577614.htm

  • CRN Most Innovative Products

    CRN

    Winner: VDIworks DaaSManager

    In the view of Test Center editors, no single software product in the market today combines a remote access gateway, connection broker, support for Linux and Windows desktops, power management and VM management in a single solution as well as this product does. It's also the first and only completely free desktop-as-a-service solution in the industry. Congratulations went to this year's winner for cloud solutions, VDIworks…

    Winner: VDIworks DaaSManager

    In the view of Test Center editors, no single software product in the market today combines a remote access gateway, connection broker, support for Linux and Windows desktops, power management and VM management in a single solution as well as this product does. It's also the first and only completely free desktop-as-a-service solution in the industry. Congratulations went to this year's winner for cloud solutions, VDIworks DaaSManager.
    http://www.crn.com/slide-shows/applications-os/240143786/the-most-innovative-products-of-2012.htm?pgno=2

  • Tech Innovator 2012

    Xchange Conference, UBM Media

    The Tech Innovator Awards recognizes technology companies that have used original methods or technologies to deliver new, innovative products and partner support. CRN Test Center Editors reviewed hundreds of technology products deployed over the past year to determine which vendors broke away traditional thinking to create completely new and unique channel opportunities. Companies on this year’s list recently implemented innovative methods to bridge the gap between current problems and…

    The Tech Innovator Awards recognizes technology companies that have used original methods or technologies to deliver new, innovative products and partner support. CRN Test Center Editors reviewed hundreds of technology products deployed over the past year to determine which vendors broke away traditional thinking to create completely new and unique channel opportunities. Companies on this year’s list recently implemented innovative methods to bridge the gap between current problems and solutions facing channel executives today.

  • Emerging Vendor 2012

    CRN

    While Amir was CEO, CRN recognized VDIworks as an Emerging Vendor for 2012.

    http://www.crn.com/news/channel-programs/240005991/2012-emerging-vendors-the-list.htm?pgno=4

  • CRN Virtualization 100 - 2012

    CRN

    CRN recognizes the top 100 companies in the Virtualization market annually. Under Amir's leadership, VDIworks won this recognition in 2011 and 2012.

    http://www.crn.com/slide-shows/virtualization/240000604/crns-2012-virtualization-100-part-2.htm;jsessionid=0915vtRATv7rlLqj4adYzw**.ecappj01?pgno=37

  • Hottest Products at Interop 2012

    Network World Magazine

    Network World magazine, one the leading IT publications globally, reviewed and recognized the most compelling products at the Interop show in Las Vegas, 2012. DaaSManager by VDIworks won this significant recognition. http://www.networkworld.com/slideshow/46017/#slide9

  • Everything Channel's Virtualization 100 - 2011

    Everything Channel - UBM

    Today, VDIworks, the leading virtual desktop management and enablement company, announced it has been recognized by Everything Channel in CRN’s new Virtualization 100 list. Featuring the top 100 vendors in the virtualization space as identified by the editorial staff of CRN [..]

    “From server to storage to desktop virtualization, this technology will become a mainstay for businesses large and small and one of the more profitable technologies for VARs to integrate and sell,” said Kelley…

    Today, VDIworks, the leading virtual desktop management and enablement company, announced it has been recognized by Everything Channel in CRN’s new Virtualization 100 list. Featuring the top 100 vendors in the virtualization space as identified by the editorial staff of CRN [..]

    “From server to storage to desktop virtualization, this technology will become a mainstay for businesses large and small and one of the more profitable technologies for VARs to integrate and sell,” said Kelley Damore, Vice President, Editorial Director, Everything Channel. “The Virtualization 100 list provides showcases the best virtualization technology solutions to help VARs navigate the virtualization landscape and determine which vendor is best suited to meet their unique needs.”

    “We are extremely pleased that CRN has recognized our solution as one of the most innovative and powerful virtual desktop systems available in the industry today,” said Amir Husain, President and CEO of VDIworks. “Our products have evolved over time to address almost every conceivable VDI use-case that customers would want to implement and we remain particularly excited about the innovations planned on our roadmap. We think we can offer OEMs and VARs a solution set no other VDI vendor can match and remain committed to growing our partnerships in this area”.

    http://www.prweb.com/releases/2011/6/prweb8530348.htm

  • VMWORLD Best Desktop Virtualization Software Award

    VMWORLD SearchServerVirtualization

    Amir was Chief Technology Officer of ClearCube, and architect of the Sentral product suite that won Best of VMWORLD in 2007.

    AUSTIN, TX, Sep 17, 2007 (MARKET WIRE via COMTEX) -- ClearCube Technology, the market leader in centralized computing solutions, today announced that TechTarget, a respected technology publishing company, has named ClearCube Sentral(TM) a winner of the Best of VMworld award in the desktop virtualization software category. An independent team of judges from…

    Amir was Chief Technology Officer of ClearCube, and architect of the Sentral product suite that won Best of VMWORLD in 2007.

    AUSTIN, TX, Sep 17, 2007 (MARKET WIRE via COMTEX) -- ClearCube Technology, the market leader in centralized computing solutions, today announced that TechTarget, a respected technology publishing company, has named ClearCube Sentral(TM) a winner of the Best of VMworld award in the desktop virtualization software category. An independent team of judges from SearchServerVirtualization.com evaluated products submitted by more than 100 exhibitors of the VMworld conference, sponsored by VMware, which was held last week in San Francisco.

    http://business.highbeam.com/436102/article-1G1-168734426/techtarget-searchservervirtualization-honors-clearcube

  • Virtualization 50 Award - 2013

    CRN

    Under Amir's leadership, VDIworks was named to CRN's prestigious Virtualization 50 for 2013.

Languages

  • English

    Native or bilingual proficiency

View Amir’s full profile

  • See who you know in common
  • Get introduced
  • Contact Amir directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Amir Husain in United States

Add new skills with these courses