Services
Articles by Simon
Activity
-
I had such a great time at #Fyuz24! It's hands down the best event for everything open and disaggregated and a must attend for anyone interested in…
I had such a great time at #Fyuz24! It's hands down the best event for everything open and disaggregated and a must attend for anyone interested in…
Liked by Simon Lok
-
I’m here at Telecom Infra Project #fyuz24 talking about how RG Nets, Inc. is leveraging NVIDIA GPUs on Dell Technologies edge XR series edge servers…
I’m here at Telecom Infra Project #fyuz24 talking about how RG Nets, Inc. is leveraging NVIDIA GPUs on Dell Technologies edge XR series edge servers…
Shared by Simon Lok
-
Check out this demo of how easy it is to deploy an OpenWiFi wireless controller on the rXg. Bring up an OpenWiFi controller on your edge in less than…
Check out this demo of how easy it is to deploy an OpenWiFi wireless controller on the rXg. Bring up an OpenWiFi controller on your edge in less than…
Liked by Simon Lok
Licenses & Certifications
Publications
-
Evaluation of Visual Balance for Automated Layout
Proceedings of the 2004 Conference on Intelligent User Interfaces
Layout refers to the process of determining the size and position of the visual objects in an information presentation. We introduce the WeightMap, a bitmap representation of the visual weight of a presentation. In addition, we present algorithms that use WeightMaps to allow an automated layout system to evaluate the effectiveness of its layouts. Our approach is based on the concepts of visual weight and visual balance, which are fundamental to the visual arts. The objects in the layout are…
Layout refers to the process of determining the size and position of the visual objects in an information presentation. We introduce the WeightMap, a bitmap representation of the visual weight of a presentation. In addition, we present algorithms that use WeightMaps to allow an automated layout system to evaluate the effectiveness of its layouts. Our approach is based on the concepts of visual weight and visual balance, which are fundamental to the visual arts. The objects in the layout are each assigned a visual weight, and a WeightMap is created that encodes the visual weight of the layout. Image-processing techniques, including pyramids and edge detection, are then used to efficiently analyze the WeightMap for balance. In addition, derivatives of the sums of the rows and columns are used to generate suggestions for how to improve the layout.
-
Employing Natural Language Summarization and Automated Layout for Effective Presentation and Navigation of Information Retrieval Results.
Proceedings of the 12th International World Wide Web Conference
This paper describes the employment of multi-document summarization and automated layout as a post-processing step in document retrieval. We also examine the use of an interactive textual fisheye that employs automated layout techniques to present a generated natural language summary as a replacement to the standard ranked list.
-
A Graphical User Interface Toolkit Approach to Thin Client Computing
Proceedings of the 11th International World Wide Web Conference
Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a PC today has been largely reduced to a terminal for running a client or viewer such as a Web browser. Implementers of network-centric applications typically rely on the limited capabilities of HTML, employing proprietary "plug ins" or transmitting the binary image of an entire application that will be executed on the…
Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a PC today has been largely reduced to a terminal for running a client or viewer such as a Web browser. Implementers of network-centric applications typically rely on the limited capabilities of HTML, employing proprietary "plug ins" or transmitting the binary image of an entire application that will be executed on the client. Alternatively, implementers can develop without regard for remote use, requiring users who wish to run such applications on a remote server to rely on a system that creates a virtual frame buffer on the server, and transmits a copy of its raster image to the local client.We review some of the problems that these current approaches pose, and show how they can be solved by developing a distributed user interface toolkit. A distributed user interface toolkit applies techniques to the high level components of a toolkit that are similar to those used at a low level in the X Window System. As an example of this approach, we present RemoteJFC, a working distributed user interface toolkit that makes it possible to develop thin-client applications using a distributed version of the Java Foundation Classes.
-
The AIL Automated Interface Layout System
Proceedings of the 2002 Conference on Intelligent User Interfaces
We describe an automated layout system called AIL that generates the user interface for the PERSIVAL digital library project. AIL creates a layout based on a variety of content components and associated meta-data information provided by the PERSIVAL generation and retrieval modules. By leveraging semantic links between the content components, the layout that AIL provides is both context and user-model aware. In addition, AIL is capable of interacting intelligently with the natural language…
We describe an automated layout system called AIL that generates the user interface for the PERSIVAL digital library project. AIL creates a layout based on a variety of content components and associated meta-data information provided by the PERSIVAL generation and retrieval modules. By leveraging semantic links between the content components, the layout that AIL provides is both context and user-model aware. In addition, AIL is capable of interacting intelligently with the natural language generation components of PERSIVAL to tailor the length of the text content for a given layout.
-
A Survey of Automated Layout Techniques for Information Presentations
Proceedings of the 2001 SmartGraphics Symposium
Layout refers to the process of determining the sizes and positions of the visual objects that are part of an information presentation. Automated layout refers to the use of a computer program to au- tomate either all or part of the layout process. This field of re- search lies at the crossroads between artificial intelligence and hu- man computer interaction. Automated layout of presentations is be- coming increasingly important as the amount of data that we need to present rapidly overtakes…
Layout refers to the process of determining the sizes and positions of the visual objects that are part of an information presentation. Automated layout refers to the use of a computer program to au- tomate either all or part of the layout process. This field of re- search lies at the crossroads between artificial intelligence and hu- man computer interaction. Automated layout of presentations is be- coming increasingly important as the amount of data that we need to present rapidly overtakes our ability to present it manually. We survey and analyze the techniques used by research systems that have automated layout components and suggest possible areas of future work.
Patents
-
Implemented per-room VLANs
Issued US 10,354,346
An inventive system related to implementation of dynamic virtual local area network (VLAN) assignment and provisioning in communication networks. The inventive system enables per-room 802.1q VLANs that are enforced through 802.1X distribution equipment. This inventive system enables facilities such as hotels to implement per-room VLANs to increase security and efficiency in handling a plurality of devices brought in by guests as well as devices that are provided by the facility itself.
-
System and method for dynamic VLAN assignment
Issued US 9025533
A system and method for dynamically assigning VLANs to devices for reliable, high performance and low support volume mechanism that allows service providers to affordably deploy dynamic per-unit VLAN assignment with zero operator intervention provisioning.
-
Distributed computer system using a graphical user interface toolkit
Issued US 20030182469
A distributed computer system having a server and remote client for executing an application on the server. A remote-capable user interface toolkit resides on the server and has remote-capable components that correspond to components of a user interface toolkit which resides on the remote client. The remote-capable components are substantially the same as corresponding components of the user interface toolkit, and interact with the application according to the same application programming…
A distributed computer system having a server and remote client for executing an application on the server. A remote-capable user interface toolkit resides on the server and has remote-capable components that correspond to components of a user interface toolkit which resides on the remote client. The remote-capable components are substantially the same as corresponding components of the user interface toolkit, and interact with the application according to the same application programming interface. However, when invoked by the application, the remote-capable components issue a message to the component on the remote client to perform the corresponding function on the client. A network communication protocol of sending messages between the remote-capable user interface toolkit on the server and the user interface toolkit on the client is thereby generated.
-
Directed Multiplexing of Data Traffic in a Link Control Environment
Issued US 20070147438
A link controller that is capable of asymmetric network traffic multiplexing. A typical link controller treats all provisioned links as being equal (i.e., traffic is symmetrically multiplexed or distributed between all provisioned links) except when a link failure is detected. Our link controller is capable of modifying the multiplexing behavior of the link controller based on a wide range of parameters including but not limited to link characteristics, network traffic type, source and/or…
A link controller that is capable of asymmetric network traffic multiplexing. A typical link controller treats all provisioned links as being equal (i.e., traffic is symmetrically multiplexed or distributed between all provisioned links) except when a link failure is detected. Our link controller is capable of modifying the multiplexing behavior of the link controller based on a wide range of parameters including but not limited to link characteristics, network traffic type, source and/or destination address, link saturation and overall network load.
-
Fusion Intrusion Protection System
Issued US 20070056038
An intrusion protection system that fuses a network instrumentation classification with a packet payload signature matching system. Each of these kinds of systems is independently capable of being effectively deployed as an anomaly detection system. By employing sensor fusion techniques to combine the instrumentation classification approach with the signature matching approach, the present invention provides an intrusion protection system that is uniquely capable of detecting both well known…
An intrusion protection system that fuses a network instrumentation classification with a packet payload signature matching system. Each of these kinds of systems is independently capable of being effectively deployed as an anomaly detection system. By employing sensor fusion techniques to combine the instrumentation classification approach with the signature matching approach, the present invention provides an intrusion protection system that is uniquely capable of detecting both well known and newly developed threats while having an extremely low false positive rate.
-
Unified memory IP packet processing platform
Issued US 20060277267
A unified memory architecture IP packet processing platform (e.g., IPv4) that is designed to execute on a standard general purpose computer. Unlike the traditional packet processing paradigm, our platform is software pluggable and can integrate all of the functionality that is typically only available by chaining a series of discrete devices. The present invention uses a unified memory architecture that precludes the need to transfer packets between modules that implement processing…
A unified memory architecture IP packet processing platform (e.g., IPv4) that is designed to execute on a standard general purpose computer. Unlike the traditional packet processing paradigm, our platform is software pluggable and can integrate all of the functionality that is typically only available by chaining a series of discrete devices. The present invention uses a unified memory architecture that precludes the need to transfer packets between modules that implement processing functionality.
-
Out-of-order superscalar IP packet analysis
Issued US 20060268866
An out-of-order network packet analysis architecture that decouples deep packet inspection from the packet forwarding process. Rather than placing the packet inspection engine inline into the packet forwarding pipeline, the packet forwarding and packet inspection processes operate asynchronously on a single unified packet buffer. Furthermore, the present invention reduces the load on the packet inspection engine by employing a packet marking preprocessor to designate appropriate packets for…
An out-of-order network packet analysis architecture that decouples deep packet inspection from the packet forwarding process. Rather than placing the packet inspection engine inline into the packet forwarding pipeline, the packet forwarding and packet inspection processes operate asynchronously on a single unified packet buffer. Furthermore, the present invention reduces the load on the packet inspection engine by employing a packet marking preprocessor to designate appropriate packets for inspection.
-
Unified roaming profile network provisioning system
Issued US 20060259952
A method of network provisioning where a profile is associated with a specific end-user node and policies are enforced via a unified network provisioning appliance. Unlike traditional back-ends where multiple discrete devices are deployed to provision a network, the present invention can be implemented as a single unified device with all of the functionality implemented as software plug-ins. In accordance with embodiments of the present invention, features execute on the same device and share a…
A method of network provisioning where a profile is associated with a specific end-user node and policies are enforced via a unified network provisioning appliance. Unlike traditional back-ends where multiple discrete devices are deployed to provision a network, the present invention can be implemented as a single unified device with all of the functionality implemented as software plug-ins. In accordance with embodiments of the present invention, features execute on the same device and share a common provisioning profile. Hence, the present invention features unbounded interoperability between what are normally considered separate sets of functionality. This capability allows provisioning services such as bandwidth shaping, identity manager, content filter and the like to enforce policies that are defined for the user of a node. Furthermore, our system is capable of dynamically changing policies enforced on a node to reflect a change in the user who is operating the node.
-
Quarantine Filesystem
Issued US 20060137013
A quarantine filesystem driver having a first interface for communicating with an operating system library, a second interface for communicating with a primary filesystem, and a third interface for communicating with a secondary filesystem. Preferably the secondary filesystem is a delta filesystem that records a log of changes to data recorded in the primary filesystem. The primary filesystem couples to a primary mass storage device or devices that may be internal to (i.e., closely coupled to)…
A quarantine filesystem driver having a first interface for communicating with an operating system library, a second interface for communicating with a primary filesystem, and a third interface for communicating with a secondary filesystem. Preferably the secondary filesystem is a delta filesystem that records a log of changes to data recorded in the primary filesystem. The primary filesystem couples to a primary mass storage device or devices that may be internal to (i.e., closely coupled to) the computing system in which the quarantine filesystem is implemented. The secondary filesystem couples to a mass storage system such as a hard disk drive that is independent of the primary mass storage device or devices. Most preferably the secondary mass storage device or devices is/are implemented externally to the system in which the quarantine filesystem is implemented.
-
Single Use Secure Token Appliance
Issued US 20050154923
Systems, methods, software and data structures that facilitate the trusted, secure data exchange of data over networks, including open networks such as the Internet.
Languages
-
Cantonese
Professional working proficiency
-
English
Native or bilingual proficiency
More activity by Simon
-
After nearly 14 incredible years, yesterday marked the end of my journey with Dell Technologies. I am overwhelmed with gratitude and appreciation for…
After nearly 14 incredible years, yesterday marked the end of my journey with Dell Technologies. I am overwhelmed with gratitude and appreciation for…
Liked by Simon Lok
-
Our fieldwork doesn't just involve installation, but also making sure that our networks can be properly operated and supported once we're gone…
Our fieldwork doesn't just involve installation, but also making sure that our networks can be properly operated and supported once we're gone…
Liked by Simon Lok
-
Looking forward to FYUZ, where we will be discussing AI for Telcos and Telcos for AI in a few sessions that will deep dive into the possible…
Looking forward to FYUZ, where we will be discussing AI for Telcos and Telcos for AI in a few sessions that will deep dive into the possible…
Liked by Simon Lok
-
What do you think? Can I install WLANPi software on it? It has an Intel Corporation BE200 #WiFi7 card in it. CM4 based Pi
What do you think? Can I install WLANPi software on it? It has an Intel Corporation BE200 #WiFi7 card in it. CM4 based Pi
Liked by Simon Lok
-
Next time you think "who will buy this", remember: Someone is selling a $90 Faraday's cage for WiFi routers!
Next time you think "who will buy this", remember: Someone is selling a $90 Faraday's cage for WiFi routers!
Liked by Simon Lok
-
The production & deployment of #OpenWiFi and # OpenLAN-based devices has been growing 2x YoY since 2021! Why you ask? Amazing #community partners…
The production & deployment of #OpenWiFi and # OpenLAN-based devices has been growing 2x YoY since 2021! Why you ask? Amazing #community partners…
Liked by Simon Lok
-
Our staff #CWNEs are literally working around the clock to revolutionize the Wi-Fi industry and fix the problems they face every day, and here's one…
Our staff #CWNEs are literally working around the clock to revolutionize the Wi-Fi industry and fix the problems they face every day, and here's one…
Liked by Simon Lok
-
More postcards from the field! This week we are bringing our networking expertise to Doral, FL, Bartlett, TN, and San Antonio, TX, and…
More postcards from the field! This week we are bringing our networking expertise to Doral, FL, Bartlett, TN, and San Antonio, TX, and…
Liked by Simon Lok
-
Upgrade your network with the FUSION Gateway — a next-gen solution designed to simplify and enhance your property's WiFi infrastructure. With six…
Upgrade your network with the FUSION Gateway — a next-gen solution designed to simplify and enhance your property's WiFi infrastructure. With six…
Liked by Simon Lok
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Simon Lok
-
Simon Lok
Consultant for Strategy, Data & Technology | ex-BCG | INSEAD MBA
-
Simon Lok
Director, Head of Strategic Client Group I, Investment Banking Department at Huatai Financial Holdings (Hong Kong) Limited
-
Simon Lok
Senior Director, Greater China - Client Solutions & Transformation, Singtel
-
Simon Lok
Water & Operations Manager at Kooba Ag Pty Ltd
26 others named Simon Lok are on LinkedIn
See others named Simon Lok