Articles by Amir
Publications
-
On Hyperwar: AI in the Battlefield
United States Naval Institute Proceedings
Co-authored with Four Star US Marine Corps. Gen. John R. Allen (ret), "On Hyperwar" is an exploration of the impact and importance of Artificial Intelligence on the battlefield of the future. The publication has sparked international interest, receiving significant coverage in defense and technology publications around the world, and becoming a key topic at the NATO Adaptation Initiative Summit at Brussels in 2017
-
Artificial Intelligence Approaches To UCAV Autonomy
Cornell University Library arXiv.org
This paper covers a number of approaches that leverage Artificial Intelligence algorithms and techniques to aid Unmanned Combat Aerial Vehicle (UCAV) autonomy. An analysis of current approaches to autonomous control is provided followed by an exploration of how these techniques can be extended and enriched with AI techniques including Artificial Neural Networks (ANN), Ensembling and Reinforcement Learning (RL) to evolve control strategies for UCAVs.
Other authors -
AI On The Battlefield: A Framework For Ethical Autonomy
Forbes
Autonomy is coming to warfare, and some would say it's already here. Weapon systems driven by artificial intelligence (AI) algorithms will soon be making potentially deadly decisions on the battlefield. This transition is not theoretical. The immense capability of large numbers of autonomous systems represents a revolution in warfare that no country can ignore.
Other authors -
Reducing VDI cost by exploring alternatives to centralized VM storage
Network World
One of the most significant cost elements with VDI is the centralized storage required for maintaining virtual machines. Hypervisor vendors argue that to get disaster recovery and high availability the additional expense is really a bargain. And in many instances that might be true. But in many cases cost is paramount, complexity is to be avoided and three or four nines of availability may be far down the list of priorities.
-
Reversing CoIT: A Private Cloud for the Small Business & Home User
VMBlog.com
Look through the pages of a tech magazine, and you can't miss the new buzz-word; The Consumerization of IT (CoIT). It refers to the fact that users are now exposed to new, cool technology at an individual level before their employer has had an opportunity to adopt the same. In a nutshell, the information worker's raised expectations of corporate IT result from his own experiences as a consumer. And IT departments have to keep up! This phenomenon was particularly pronounced with the adoption of…
Look through the pages of a tech magazine, and you can't miss the new buzz-word; The Consumerization of IT (CoIT). It refers to the fact that users are now exposed to new, cool technology at an individual level before their employer has had an opportunity to adopt the same. In a nutshell, the information worker's raised expectations of corporate IT result from his own experiences as a consumer. And IT departments have to keep up! This phenomenon was particularly pronounced with the adoption of mobile devices like the iPhone, which were initially not thought of as "enterprise capable". It turned out that whatever IT departments thought about the product, consumers loved it. They brought it to work with them. They liked the experience so much that they started clamouring for the ability to check their work email on it. And before you could say "Blackberry Enterprise Server", IT departments figured out ways in which to integrate iPhones, iPads and Android devices into the overall corporate infrastructure. How, is a story for another day, but in this article, I want to look at the flip side of the CoIT phenomenon.
-
The Future of Virtualization and Cloud Computing
VMBlog.com
Virtualization, as one of the enabling technologies underpinning the Cloud, continues to be enormously relevant to the evolving future architecture of computing, specifically end-user computing. There are at least two underlying industry directions that make virtualization immensely relevant. First, is the trend toward highly multicore CPUs. And second, the massive, ongoing adoption of a plethora of mobile device form factors.
-
Cloud Computing, VDI and the future of Desktops-as-a-Service
VMBlog.com
One of the more popular questions today's IT directors and systems administrators are faced with is whether the advent of cloud computing means that desktop virtualization is no longer relevant. On the surface, this seems to be a perfectly credible question. After all, the Cloud, as an IT meme, emerged after VDI had already been written about and discussed in the IT press for a year or two. Does the Cloud really represent an alternate architecture separate and de-linked from virtualization in…
One of the more popular questions today's IT directors and systems administrators are faced with is whether the advent of cloud computing means that desktop virtualization is no longer relevant. On the surface, this seems to be a perfectly credible question. After all, the Cloud, as an IT meme, emerged after VDI had already been written about and discussed in the IT press for a year or two. Does the Cloud really represent an alternate architecture separate and de-linked from virtualization in general and VDI (Virtual Desktop Infrastructure) in particular? As it turns out, the answer is, "Not really!". Looking at Cloud computing as an alternate to VDI is ignoring the reality that cloud computing has, as its essential underpinning, an enabling layer made possible by virtualization. The Cloud, as a delivery paradigm, is not so much an alternative to virtualization or even VDI, as it is an overarching architecture that makes use of hypervisors and the underlying functionality they enable.
-
Implementing Virtualization: The Importance of Management
Virtual Strategy Magazine
Virtualization has taken the enterprise by storm. Recent surveys indicate that a majority of CIOs are contemplating virtualization deployments...
-
The state of Connection Brokering
Network World
Centralized computing is becoming increasingly accepted as an efficient and cost-effective way of deploying desktops in the enterprise, shining a light on the key technologies that make it all possible. Virtualization, for example, allows more than one user to run a desktop session on a centralized server. Another less discussed but perhaps more important component is connection brokering.
-
Mobile Devices and Centralized Computing Redefine the Desktop
IT Today
Hardly a day goes by without a new mobile or smartphone device hitting the retail shelves, with upgraded capabilities and compelling new functionality. The world over, mobile telephony is becoming universally prevalent and the capabilities of our phones are increasing by the day. From larger displays, faster networks, improved software and more effective input techniques to massive storage, GPS functionality, built-in security and easier to use designs; everything is on offer, with upgrades…
Hardly a day goes by without a new mobile or smartphone device hitting the retail shelves, with upgraded capabilities and compelling new functionality. The world over, mobile telephony is becoming universally prevalent and the capabilities of our phones are increasing by the day. From larger displays, faster networks, improved software and more effective input techniques to massive storage, GPS functionality, built-in security and easier to use designs; everything is on offer, with upgrades every six months. Wait a little while longer and you'll see greatly extended battery life with fuel cell technology, flexible displays, foldable e-paper, built-in micro projectors, and serious CPU and storage upgrades. The mobile device of today is more powerful than the PC of a few years ago.
-
An analysis of communication induced checkpointing
IEEE Fault-Tolerant Computing, 1999. Digest of Papers. Twenty-Ninth Annual International Symposium
Communication induced checkpointing (CIC) allows processes in a distributed computation to take independent checkpoints and to avoid the domino effect. This paper presents an analysis of CIC protocols based on a prototype implementation and validated simulations. Our result indicate that there is sufficient evidence to suspect that much of the conventional wisdom about these protocols is questionable
-
The Interaktiv tutor
IEEE Systems, Man, and Cybernetics, 1997. Computational Cybernetics and Simulation., 1997 International Conference
The Interaktiv system is a user-model based intelligent tutor for the MS-DOS operating system. The system provides a custom interface according to the domain expertise of the user. User interactions with the system are constantly monitored by the system and `situation sensitive' help is provided. This is backed up by tutorials and optional quizzes. Multimedia (audio and graphics) has also been incorporated to reinforce textual explanations. Lastly, the whole system, though currently being used…
The Interaktiv system is a user-model based intelligent tutor for the MS-DOS operating system. The system provides a custom interface according to the domain expertise of the user. User interactions with the system are constantly monitored by the system and `situation sensitive' help is provided. This is backed up by tutorials and optional quizzes. Multimedia (audio and graphics) has also been incorporated to reinforce textual explanations. Lastly, the whole system, though currently being used for tutoring of MS-DOS, remains entirely domain independent. This increases possibilities of its use in other areas of knowledge which require an adaptable, intelligent tutoring system
-
The Distributed Learning Environment (DLE)
IEEE Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century., International Conference
Connectivity is an excellent means for the spread of education. In this paper we present a domain-independent tutoring system, called the “distributed learning environment” (DLE). The paper focuses on the educational services provided by the system and its potential in promoting education. The DLE targets two classes of users, instructors and students. It provides instructors with an environment for course construction and students a facility to study and learn through one-to-one tutoring. The…
Connectivity is an excellent means for the spread of education. In this paper we present a domain-independent tutoring system, called the “distributed learning environment” (DLE). The paper focuses on the educational services provided by the system and its potential in promoting education. The DLE targets two classes of users, instructors and students. It provides instructors with an environment for course construction and students a facility to study and learn through one-to-one tutoring. The teaching and learning environment of the DLE has been set up using electronic communication media via a local area network so that its potential be realized through the sharing of this software by multiple users
Patents
-
Cooperative execution of a genetic algorithm with an efficient training algorithm for data-driven model creation
Issued US 9,785,886
A method includes, based on a fitness function, selecting a subset of models from a plurality of models. The plurality of models is generated based on a genetic algorithm and corresponds to a first epoch of the genetic algorithm. Each of the plurality of models includes data representative of a neural network. The method also includes performing at least one genetic operation of the genetic algorithm with respect to at least one model of the subset to generate a trainable model and sending the…
A method includes, based on a fitness function, selecting a subset of models from a plurality of models. The plurality of models is generated based on a genetic algorithm and corresponds to a first epoch of the genetic algorithm. Each of the plurality of models includes data representative of a neural network. The method also includes performing at least one genetic operation of the genetic algorithm with respect to at least one model of the subset to generate a trainable model and sending the trainable model to an optimization trainer. The method includes adding a trained model received from the optimization trainer as input to a second epoch of the genetic algorithm that is subsequent to the first epoch.
-
Systems and methods for using cognitive fingerprints
Issued US US9578053B2
A system and method for creating a core cognitive fingerprint. A core cognitive fingerprint can be used to capture the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a threshold. The method includes: identifying a set of time frames within which data is extracted; providing a plurality of pattern recognizers; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements;…
A system and method for creating a core cognitive fingerprint. A core cognitive fingerprint can be used to capture the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a threshold. The method includes: identifying a set of time frames within which data is extracted; providing a plurality of pattern recognizers; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements; extracting identified relationships amongst the initial set of elements; modifying the initial set of elements to include the identified relationships to create an intermediate set of elements; comparing the intermediate set of elements against assigned values to weigh each element in the intermediate set of elements to create a final set of elements; and using the final set of elements as a cognitive fingerprint.
-
System and method for creating a core cognitive fingerprint
Issued US US9292675B2
A system and method for creating a core cognitive fingerprint are provided. A core cognitive fingerprint can be used to capture and summarize the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a defined threshold. The method includes: identifying a set of time frames, each time frame corresponding to a respective data source, within which data is extracted; providing a plurality of pattern recognizers each having an assigned…
A system and method for creating a core cognitive fingerprint are provided. A core cognitive fingerprint can be used to capture and summarize the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a defined threshold. The method includes: identifying a set of time frames, each time frame corresponding to a respective data source, within which data is extracted; providing a plurality of pattern recognizers each having an assigned heuristic specific to a type of content; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements, each element corresponding to the output of the heuristic assigned to each pattern recognizer; extracting identified relationships amongst the initial set of elements; modifying the initial set of elements to include the identified relationships to create an intermediate set of elements; comparing the intermediate set of elements against assigned values to emphasize or deemphasize each element in the intermediate set of elements to create a final set of elements; and using the final set of elements as a cognitive fingerprint representing a signature of the data extracted from the time frame, so that the signature can be compared to other cognitive fingerprints for further analysis.
-
Zero client device with integrated serial bandwidth augmentation and support for out-of-band serial communications
Issued US US9134945B2
System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to…
System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to receive the encoded input data from the transcoder, transmit the encoded input data over the network to the server, receive output data from the server, and send the output data to the transcoder. The transcoder is further configured to receive the output data from the communications processing unit, decode the output data, and send the decoded output data to at least one of the human interface devices.
-
Zero client device with multi-boot capability supporting multiple zero client protocols
Issued US 9,063,691
System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to…
System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to receive the encoded input data from the transcoder, transmit the encoded input data over the network to the server, receive output data from the server, and send the output data to the transcoder. The transcoder is further configured to receive the output data from the communications processing unit, decode the output data, and send the decoded output data to at least one of the human interface devices.
-
Capturing and restoring session state of a machine without using memory images
Issued US 9,043,391
System and method for capturing and/or restoring session state of a machine without using image files. Session state information for a first computer system may be captured in a structured state capture file (SSCF) using metadata to represent the session state and steps or actions which produced the session state, and does not include a memory image or memory dump of the first computer system. The SSCF may be stored, and subsequently provided for restoration of the session state on the first…
System and method for capturing and/or restoring session state of a machine without using image files. Session state information for a first computer system may be captured in a structured state capture file (SSCF) using metadata to represent the session state and steps or actions which produced the session state, and does not include a memory image or memory dump of the first computer system. The SSCF may be stored, and subsequently provided for restoration of the session state on the first computer system or a different computer system. A server computer system may store the SSCF (with other SSCFs) and may provide the SSCF to the first computer system or a different computer system over a network for session state restoration, e.g., in response to a request over the network. The first computer system may implement a virtual machine (VM). The session state may be that of the VM.
-
Mass storage lockout for USB devices on extended USB system
Issued US US8661523 B2
A method and system, used with an extended USB computer system, for locking out USB mass storage devices at the desktop. For lockout activation, a switch at each host computer is set, and causes a host-side lockout process to deliver a downstream lockout signal to the host's associated portal. This signal causes a portal-side lockout process to disallow USB data from a mass storage device from entering the network.
-
Zero client device with integrated serial or parallel ports
Issued US US8539025 B2
System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to…
System and method for zero client communications. A zero client device includes a housing, and in the housing, a transcoding processing unit (transcoder) and a communications processing unit coupled to the transcoder. The transcoder is configured to receive input data from human interface device(s), encode the input data, and provide the encoded input data to the communications processing unit for transmission over a network to a server. The communications processing unit is configured to receive the encoded input data from the transcoder, transmit the encoded input data over the network to the server, receive output data from the server, and send the output data to the transcoder. The transcoder is further configured to receive the output data from the communications processing unit, decode the output data, and send the decoded output data to at least one of the human interface devices.
-
Utility computing system having co-located computer systems for provision of computing resources
Issued US US8479146 B2
ABSTRACT
System and method for providing computer resources to users. The system includes a plurality of co-located computing systems, e.g., blade computers, comprising a hierarchy of computer resources based on performance, and located at a first location, each computing system including a processor, a memory medium coupled to the processor, and a plurality of human interface systems, each located at a second location remote from the first location, and each including an interface device…ABSTRACT
System and method for providing computer resources to users. The system includes a plurality of co-located computing systems, e.g., blade computers, comprising a hierarchy of computer resources based on performance, and located at a first location, each computing system including a processor, a memory medium coupled to the processor, and a plurality of human interface systems, each located at a second location remote from the first location, and each including an interface device, and one or more human interface devices coupled to the interface device, where each human interface system is coupled to the co-located computing systems over a network, such as a LAN or a WAN, via the interface device. Computer resources are provided to users of the plurality of remote human interface systems over the network in accordance with the computer resource performance needs of the users. Charges may be assessed for usage of the computer resources. -
Maintaining a pool of free virtual machines on a server computer
Issued US 8,176,486
Various embodiments of a system and method for managing virtual machines on a server computer are described. According to one embodiment of the method, a pool of free virtual machines may be maintained on the server computer, e.g., where the number of virtual machines in the pool is specified by an administrator. In response to receiving a request to assign a virtual machine to a first user, the server computer may assign a first virtual machine from the pool to the first user and add a new…
Various embodiments of a system and method for managing virtual machines on a server computer are described. According to one embodiment of the method, a pool of free virtual machines may be maintained on the server computer, e.g., where the number of virtual machines in the pool is specified by an administrator. In response to receiving a request to assign a virtual machine to a first user, the server computer may assign a first virtual machine from the pool to the first user and add a new virtual machine to the pool to replace the first virtual machine. In some embodiments the server computer may be one of a plurality of server computers in a server computer system. An administrator may be able to configure different pool sizes for different server computers in the system through a central user interface.
-
Distributed computing infrastructure including autonomous intelligent management system
Issued US 7,434,220
Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed…
Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed applications using pre-complied binaries. DCI may include a capability for multiple, independent collaborative sessions for distributed collaborative applications (e.g., chat, instant messaging, shared whiteboard, etc.). DCI may include systems and methods for reducing interactions between users and applications to archivable form and then playing back the interactions. DCI may include a system and method for automatic software retrieval on a peer-to-peer network.
-
System and method for reducing user-application interactions to archivable form
Issued US 7,430,616
Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed…
Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed applications using pre-complied binaries. DCI may include a capability for multiple, independent collaborative sessions for distributed collaborative applications (e.g., chat, instant messaging, shared whiteboard, etc.). DCI may include systems and methods for reducing interactions between users and applications to archivable form and then playing back the interactions. DCI may include a system and method for automatic software retrieval on a peer-to-peer network.
-
Distributed computing infrastructure including small peer-to-peer applications
Issued US 7,370,336
Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed…
Systems and methods are disclosed for a distributed computing infrastructure on a computer network comprising a plurality of computers. The distributed computing infrastructure (DCI) provides a software platform for creating, running, and managing distributed applications. DCI may include XML-capable software applications on a peer-to-peer network. DCI may include small, network-unaware applications called peerlets. DCI may include a system and method for creating complex distributed applications using pre-complied binaries. DCI may include a capability for multiple, independent collaborative sessions for distributed collaborative applications (e.g., chat, instant messaging, shared whiteboard, etc.). DCI may include systems and methods for reducing interactions between users and applications to archivable form and then playing back the interactions. DCI may include a system and method for automatic software retrieval on a peer-to-peer network.
-
System and method for providing virtual network attached storage using excess distributed storage capacity
Issued US 7,370,083
A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and…
A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and may store data on the shared storage volume. VNAS may be implemented in a peer-to-peer manner whereby each computer acts as a server for the data stored on its part of the shared storage volume (i.e., the second portion of its storage media). VNAS may be used to implement a system and method for managing data fail-over.
-
Distributed resource manager
Issued US 7,328,261
A distributed resource manager for managing resources among a plurality of networked computers, e.g., computer blades. The resource manager executes on two or more of the computers, e.g., substantially concurrently, collecting data related to usage, performance, status, and/or load, for a component, process, and/or attribute of one or more computers, and evaluating operation rules based on the collected data to determine one or more resource management operations, e.g., re-configuring…
A distributed resource manager for managing resources among a plurality of networked computers, e.g., computer blades. The resource manager executes on two or more of the computers, e.g., substantially concurrently, collecting data related to usage, performance, status, and/or load, for a component, process, and/or attribute of one or more computers, and evaluating operation rules based on the collected data to determine one or more resource management operations, e.g., re-configuring, activating/deactivating, and/or switching and/or swapping computers, for more efficient allocation of resources. Each executing resource manager transmits the determined resource management operations to the other executing resource managers, receives respective determined resource management operations from them, and resolves conflicts between the determined resource management operations and the received respective determined resource management operations, thereby generating a modified one or more resource management operations. The modified resource management operations may be performed with or without human input.
-
Data fail-over for a multi-computer system
Issued US 7,318,095
System and method for managing data fail-over for a computing system comprising a plurality of computers, e.g., computer blades, coupled through a network. A fail-over condition may indicate a component failure, an imminent failure, and/or a need to modify or replace some aspect of a computer. Computers in the system may back up their information to other computers in the system. If a fail-over condition is detected on a first computer, a replacement computer may be loaded with the information…
System and method for managing data fail-over for a computing system comprising a plurality of computers, e.g., computer blades, coupled through a network. A fail-over condition may indicate a component failure, an imminent failure, and/or a need to modify or replace some aspect of a computer. Computers in the system may back up their information to other computers in the system. If a fail-over condition is detected on a first computer, a replacement computer may be loaded with the information from the first computer, optionally from a backup copy stored on another computer (or distributed across multiple computers), and the first computer's peripheral devices (human interface) switched over to the replacement computer. The method may be used to replace a single computer, swap two computers, and/or perform a cascade move among multiple computers, and may be performed automatically in response to the fail-over condition, or initiated by a system administrator.
-
System and method for providing virtual network attached storage using excess distributed storage capacity
Issued US 7,139,809
A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and…
A system and method are disclosed for using free storage capacity on a plurality of storage media as a virtual storage device on a computer network comprising a plurality of computers. A first portion of each storage medium stores data. To implement Virtual Network Attached Storage (VNAS), the respective "free" second portions of each storage medium are aggregated into a shared storage volume. Computers on the network may mount the shared storage volume at one of a plurality of mount points and may store data on the shared storage volume. VNAS may be implemented in a peer-to-peer manner whereby each computer acts as a server for the data stored on its part of the shared storage volume (i.e., the second portion of its storage media). VNAS may be used to implement a system and method for managing data fail-over.
-
Migrating Session State of a Machine Without Using Memory Images
Filed US 20120011509
Embodiments of a system and method for migrating session state from a first machine to a second machine without using memory images are disclosed. State information for components of a first computer is determined and stored in a structured human and machine readable file, and does not include a memory image, a disk image, register status, or register contents for the first computer. A second computer is set to a state corresponding to the state of the first computer based on the stored state…
Embodiments of a system and method for migrating session state from a first machine to a second machine without using memory images are disclosed. State information for components of a first computer is determined and stored in a structured human and machine readable file, and does not include a memory image, a disk image, register status, or register contents for the first computer. A second computer is set to a state corresponding to the state of the first computer based on the stored state information, including parsing one or more sections of the structured file to determine actions for restoring state of one or more of the corresponding components, and for each component of the one or more components, performing the actions, including instantiating or invoking the component on the second computer, and performing multiple steps to configure the component in accordance with the state information.
-
Associating Virtual Machines on a Server Computer with Particular Users on an Exclusive Basis
Filed US 20080201479
A first computer of a plurality of computers in a server computer system may be associated with a first user on an exclusive basis. An administrator of the server computer system may utilize an administrative user interface in order to specify the association. Associating the first computer with the first user on the exclusive basis may prevent users other than the first user from using the first computer. In response to receiving a request from the first user to connect to the server computer…
A first computer of a plurality of computers in a server computer system may be associated with a first user on an exclusive basis. An administrator of the server computer system may utilize an administrative user interface in order to specify the association. Associating the first computer with the first user on the exclusive basis may prevent users other than the first user from using the first computer. In response to receiving a request from the first user to connect to the server computer system, the system may operate to determine that the first computer is associated with the first user on the exclusive basis and may assign the first computer to the first user. Once the first computer has been assigned to the first user, the first user can begin using the first computer. In some embodiments the first computer may be a physical computer. In other embodiments the first computer may be a virtual machine.
-
Moving Execution of a Virtual Machine Across Different Virtualization Platforms
Filed US 20080201455
Various embodiments of a system and method for moving execution of a virtual machine from a first server computer to a second server computer are disclosed. The first server computer and the second server computer may implement different types of virtualization platforms. The first server computer may be configured to execute a first virtual machine within a first virtualization platform, create snapshot information for the first virtual machine, and transmit the snapshot information to the…
Various embodiments of a system and method for moving execution of a virtual machine from a first server computer to a second server computer are disclosed. The first server computer and the second server computer may implement different types of virtualization platforms. The first server computer may be configured to execute a first virtual machine within a first virtualization platform, create snapshot information for the first virtual machine, and transmit the snapshot information to the second server computer. The second server computer may be configured to create a second virtual machine within a second virtualization platform, where the second virtualization platform is a different type of virtualization platform than the first virtualization platform. The second server computer may set the second virtual machine to a state corresponding to the state of the first virtual machine using the snapshot information.
-
Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
Filed US 20080201414
Various embodiments of a system and method for transferring a virtual machine stored on a server computer system to a client computer system in order to execute the virtual machine locally on the client computer system are disclosed. The system and method may also be operable to transfer the virtual machine back from the client computer system to the server computer system. File differencing techniques may be used in both directions so that only changed data in the virtual machine image file is…
Various embodiments of a system and method for transferring a virtual machine stored on a server computer system to a client computer system in order to execute the virtual machine locally on the client computer system are disclosed. The system and method may also be operable to transfer the virtual machine back from the client computer system to the server computer system. File differencing techniques may be used in both directions so that only changed data in the virtual machine image file is transferred across the network. The client computer system may be operable to download the virtual machine image file from the server computer system using common communication protocols such as HTTP, HTTPS, or FTP so that the virtual machine can be transferred to the client computer system without needing to be able to access files on the server computer system through a VPN.
Honors & Awards
-
ABJ Best CEOs of 2016 List
Austin Business Journal
In September, 2016, Amir Husain was listed by the Austin Business Journal on their Best CEOs of 2016 list. http://www.bizjournals.com/austin/event/144892/2016/best-ceo
-
Austin Business Journal - Techpreneur of the Year - TechFlash Titan Award 2015
Austin Business Journal
http://www.bizjournals.com/austin/print-edition/2015/11/06/abj-techflash-titans-amir-husain-founder-and-ceo.html
Amir Husain, founder and CEO of SparkCognition Inc., is the 2015 ABJ TechFlash Titans Techpreneur of the Year award winner. Husain is the type of serial entrepreneur and inventor who helped solidify Austin’s outstanding business reputation. -
CIO Review's Hottest IoT Companies
CIO Review
SparkCognition was cited on the list of the Hottest IoT Companies by CIO Review. "SparkCognition is the only IoT company partnering with IBM Watson to build ground breaking applications. SparkCognition's position as an industry leader is based on its pioneering technology, backed by a number of [..] patents"
http://software.cioreview.com/vendor/2014/sparkcognition -
InnovateApp 2014 - Most Innovative Application of 2014
IBM Corporation
SparkCognition’s submission to the global IBM contest was its Cognitive Security Insights application (CSI). CSI is a Cloud-based, big data driven security offering that delivers AI-based protection from from web attacks, exploits, scans and application-specific threats. Doug Balog, General Manager of IBM's Power Systems Group, commented on SparkCognition's victory via Twitter, "SparkCognition throws down the competition with an innovative new Linux on Power…
SparkCognition’s submission to the global IBM contest was its Cognitive Security Insights application (CSI). CSI is a Cloud-based, big data driven security offering that delivers AI-based protection from from web attacks, exploits, scans and application-specific threats. Doug Balog, General Manager of IBM's Power Systems Group, commented on SparkCognition's victory via Twitter, "SparkCognition throws down the competition with an innovative new Linux on Power application!"
http://www.prweb.com/releases/2014/06/prweb11923574.htm -
SBCA Best of Business Award
Small Business Community Association
VDIworks, a leading provider of software for virtualization and cloud computing, has been selected for the 2012 Best of Business Award in Computer Software, by the SBCA Community.
SBCA Community recognizes and awards business leaders because they often do not receive the recognition they deserve. Business leaders and entrepreneurs are role models for the community at large. SBCA Community 2012 Best of Business Award winners are a valuable asset to their community and exemplify what makes…VDIworks, a leading provider of software for virtualization and cloud computing, has been selected for the 2012 Best of Business Award in Computer Software, by the SBCA Community.
SBCA Community recognizes and awards business leaders because they often do not receive the recognition they deserve. Business leaders and entrepreneurs are role models for the community at large. SBCA Community 2012 Best of Business Award winners are a valuable asset to their community and exemplify what makes small business great.
Amir Husain, President and CEO of VDIworks, stated “We are pleased to receive this recognition from the SBCA. In the last year VDIworks has won numerous awards and mentions from global organizations such as UBM, CRN, Network World and others. But this SBCA award means a lot to our team as it recognizes our contributions to our community, and to Austin, Texas; the amazing city we are blessed to call home.”
http://www.prweb.com/releases/2013/3/prweb10577614.htm -
CRN Most Innovative Products
CRN
Winner: VDIworks DaaSManager
In the view of Test Center editors, no single software product in the market today combines a remote access gateway, connection broker, support for Linux and Windows desktops, power management and VM management in a single solution as well as this product does. It's also the first and only completely free desktop-as-a-service solution in the industry. Congratulations went to this year's winner for cloud solutions, VDIworks…Winner: VDIworks DaaSManager
In the view of Test Center editors, no single software product in the market today combines a remote access gateway, connection broker, support for Linux and Windows desktops, power management and VM management in a single solution as well as this product does. It's also the first and only completely free desktop-as-a-service solution in the industry. Congratulations went to this year's winner for cloud solutions, VDIworks DaaSManager.
http://www.crn.com/slide-shows/applications-os/240143786/the-most-innovative-products-of-2012.htm?pgno=2 -
Tech Innovator 2012
Xchange Conference, UBM Media
The Tech Innovator Awards recognizes technology companies that have used original methods or technologies to deliver new, innovative products and partner support. CRN Test Center Editors reviewed hundreds of technology products deployed over the past year to determine which vendors broke away traditional thinking to create completely new and unique channel opportunities. Companies on this year’s list recently implemented innovative methods to bridge the gap between current problems and…
The Tech Innovator Awards recognizes technology companies that have used original methods or technologies to deliver new, innovative products and partner support. CRN Test Center Editors reviewed hundreds of technology products deployed over the past year to determine which vendors broke away traditional thinking to create completely new and unique channel opportunities. Companies on this year’s list recently implemented innovative methods to bridge the gap between current problems and solutions facing channel executives today.
-
Emerging Vendor 2012
CRN
While Amir was CEO, CRN recognized VDIworks as an Emerging Vendor for 2012.
http://www.crn.com/news/channel-programs/240005991/2012-emerging-vendors-the-list.htm?pgno=4 -
CRN Virtualization 100 - 2012
CRN
CRN recognizes the top 100 companies in the Virtualization market annually. Under Amir's leadership, VDIworks won this recognition in 2011 and 2012.
http://www.crn.com/slide-shows/virtualization/240000604/crns-2012-virtualization-100-part-2.htm;jsessionid=0915vtRATv7rlLqj4adYzw**.ecappj01?pgno=37 -
Hottest Products at Interop 2012
Network World Magazine
Network World magazine, one the leading IT publications globally, reviewed and recognized the most compelling products at the Interop show in Las Vegas, 2012. DaaSManager by VDIworks won this significant recognition. http://www.networkworld.com/slideshow/46017/#slide9
-
Everything Channel's Virtualization 100 - 2011
Everything Channel - UBM
Today, VDIworks, the leading virtual desktop management and enablement company, announced it has been recognized by Everything Channel in CRN’s new Virtualization 100 list. Featuring the top 100 vendors in the virtualization space as identified by the editorial staff of CRN [..]
“From server to storage to desktop virtualization, this technology will become a mainstay for businesses large and small and one of the more profitable technologies for VARs to integrate and sell,” said Kelley…Today, VDIworks, the leading virtual desktop management and enablement company, announced it has been recognized by Everything Channel in CRN’s new Virtualization 100 list. Featuring the top 100 vendors in the virtualization space as identified by the editorial staff of CRN [..]
“From server to storage to desktop virtualization, this technology will become a mainstay for businesses large and small and one of the more profitable technologies for VARs to integrate and sell,” said Kelley Damore, Vice President, Editorial Director, Everything Channel. “The Virtualization 100 list provides showcases the best virtualization technology solutions to help VARs navigate the virtualization landscape and determine which vendor is best suited to meet their unique needs.”
“We are extremely pleased that CRN has recognized our solution as one of the most innovative and powerful virtual desktop systems available in the industry today,” said Amir Husain, President and CEO of VDIworks. “Our products have evolved over time to address almost every conceivable VDI use-case that customers would want to implement and we remain particularly excited about the innovations planned on our roadmap. We think we can offer OEMs and VARs a solution set no other VDI vendor can match and remain committed to growing our partnerships in this area”.
http://www.prweb.com/releases/2011/6/prweb8530348.htm -
VMWORLD Best Desktop Virtualization Software Award
VMWORLD SearchServerVirtualization
Amir was Chief Technology Officer of ClearCube, and architect of the Sentral product suite that won Best of VMWORLD in 2007.
AUSTIN, TX, Sep 17, 2007 (MARKET WIRE via COMTEX) -- ClearCube Technology, the market leader in centralized computing solutions, today announced that TechTarget, a respected technology publishing company, has named ClearCube Sentral(TM) a winner of the Best of VMworld award in the desktop virtualization software category. An independent team of judges from…Amir was Chief Technology Officer of ClearCube, and architect of the Sentral product suite that won Best of VMWORLD in 2007.
AUSTIN, TX, Sep 17, 2007 (MARKET WIRE via COMTEX) -- ClearCube Technology, the market leader in centralized computing solutions, today announced that TechTarget, a respected technology publishing company, has named ClearCube Sentral(TM) a winner of the Best of VMworld award in the desktop virtualization software category. An independent team of judges from SearchServerVirtualization.com evaluated products submitted by more than 100 exhibitors of the VMworld conference, sponsored by VMware, which was held last week in San Francisco.
http://business.highbeam.com/436102/article-1G1-168734426/techtarget-searchservervirtualization-honors-clearcube -
Virtualization 50 Award - 2013
CRN
Under Amir's leadership, VDIworks was named to CRN's prestigious Virtualization 50 for 2013.
Languages
-
English
Native or bilingual proficiency
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Amir Husain in United States
-
Amir Husain
Hiring for Capital One- Java, Big Data, DevOps, Data Analyst, Frontend/Backend Developer, Product Owner/Manager, UX Designer/Researcher.
-
Amir Husain
-
Amir Husain
Senior Front End Software Engineer
-
Amir Husain
--
11 others named Amir Husain in United States are on LinkedIn
See others named Amir Husain