Jump to content

18436185. SYSTEM FOR MONITORING AND MANAGING DATACENTERS simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Revision as of 05:27, 6 June 2024 by Unknown user (talk) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

SYSTEM FOR MONITORING AND MANAGING DATACENTERS

Organization Name

Cisco Technology, Inc.

Inventor(s)

Navindra Yadav of Cupertino CA (US)

Abhishek Ranjan Singh of Pleasanton CA (US)

Shashidhar Gandham of Fremont CA (US)

Ellen Christine Scheib of Mountain View CA (US)

Omid Madani of San Carlos CA (US)

Ali Parandehgheibi of Sunnyvale CA (US)

Jackson Ngoc Ki Pang of Sunnyvale CA (US)

Vimalkumar Jeyakumar of Los Altos CA (US)

Michael Standish Watts of Los Altos CA (US)

Hoang Viet Nguyen of Pleasanton CA (US)

Khawar Deen of Sunnyvale CA (US)

Rohit Chandra Prasad of Sunnyvale CA (US)

Sunil Kumar Gupta of Milpitas CA (US)

Supreeth Hosur Nagesh Rao of Cupertino CA (US)

Anubhav Gupta of Fremont CA (US)

Ashutosh Kulshreshtha of Cupertino CA (US)

Roberto Fernando Spadaro of Milpitas CA (US)

Hai Trong Vu of San Jose CA (US)

Varun Sagar Malhotra of Sunnyvale CA (US)

Shih-Chun Chang of San Jose CA (US)

Bharathwaj Sankara Viswanathan of Mountain View CA (US)

Fnu Rachita Agasthy of Sunnyvale CA (US)

Duane Thomas Barlow of Fremont CA (US)

SYSTEM FOR MONITORING AND MANAGING DATACENTERS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18436185 titled 'SYSTEM FOR MONITORING AND MANAGING DATACENTERS

Simplified Explanation

The abstract describes a method for detecting and analyzing data flows in a datacenter using sensors, collectors, and an analytics module to identify the status of the datacenter and detect attacks.

  • Sensors are used to detect packets throughout the datacenter.
  • Packet logs are sent to collectors to identify and summarize data flows.
  • Flow logs are then sent to an analytics module to detect the status of the datacenter and potential attacks.

Potential Applications

This technology can be applied in various industries such as cybersecurity, network monitoring, and data center management.

Problems Solved

This technology helps in identifying and summarizing data flows in a datacenter, detecting the status of the datacenter, and detecting potential attacks, improving overall security and efficiency.

Benefits

The benefits of this technology include enhanced data center security, improved network monitoring, and quicker detection of potential attacks.

Potential Commercial Applications

Potential commercial applications of this technology include cybersecurity solutions, network monitoring tools, and data center management systems.

Possible Prior Art

One possible prior art for this technology could be existing network monitoring systems that use sensors and analytics to detect and analyze data flows in a network.

What are the specific sensors used in this method?

The abstract does not specify the exact type of sensors used in this method. It would be helpful to know the specific sensors employed and how they contribute to the detection of packets in the datacenter.

How does the analytics module identify the status of the datacenter?

The abstract mentions that the analytics module can identify the status of the datacenter, but it does not elaborate on the specific criteria or metrics used for this identification. Understanding the process by which the analytics module determines the status of the datacenter would provide more insight into the technology.


Original Abstract Submitted

An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.

(Ad) Transform your business with AI in minutes, not months

Custom AI strategy for your specific industry
Step-by-step implementation with clear ROI
5-minute setup - no technical skills needed
Get your AI playbook
Cookies help us deliver our services. By using our services, you agree to our use of cookies.