Search

Gordon C Chaffee

from Hillsborough, CA
Age ~55

Gordon Chaffee Phones & Addresses

  • 1740 Crockett Ln, Burlingame, CA 94010 (650) 393-4794
  • Hillsborough, CA
  • 3700 Warwick Rd, Fremont, CA 94555 (510) 494-1229 (510) 790-2389
  • Berkeley, CA
  • Richmond, CA
  • San Mateo, CA
  • Alameda, CA

Education

Degree: High school graduate or higher

Business Records

Name / Title
Company / Classification
Phones & Addresses
Gordon Chaffee
Managing
Pi Consulting LLC
Software Development Consulting
3700 Warwick Rd, Fremont, CA 94555

Publications

Us Patents

Data Network Controller

View page
US Patent:
20030088529, May 8, 2003
Filed:
Nov 1, 2002
Appl. No.:
10/286576
Inventors:
Eric Klinker - Oakland CA, US
Jeremy Johnson - Oakland CA, US
Steven McCanne - Berkeley CA, US
Daniel McKernan - Cupertino CA, US
Gordon Chaffee - Fremont CA, US
Charles Fraleigh - Sunnyvale CA, US
Assignee:
netVmg, Inc. - Fremont CA
International Classification:
G06G007/00
US Classification:
706/003000
Abstract:
The present invention provides for a system and method for data network control. Using a flow control system, embodiments of the present invention can analyze traffic flow volume and performance, incorporate usage, billing, and cost control data to yield an improved data network controller. Efficiency in data routing is improved while costs are decreased by enabling the selection of the optimal performance data route. Cost constraints and costs are minimized for an overall data load. Given a diverse set of cost structures for available transit providers, the overall system cost can be minimized by distributing traffic in a manner that takes advantage of the diverse billing structures and yet maintains acceptable performance levels. Systems and methods in accordance with embodiments of the present invention determine projected flow performance and projected flow volume in relation to the available bandwidth and marginal cost to a destination provider.

Identifying Unverified Application Behavior In A Computing Environment

View page
US Patent:
20170054746, Feb 23, 2017
Filed:
Aug 5, 2016
Appl. No.:
15/229420
Inventors:
- Mountain View CA, US
Gaurav Mathur - Palo Alto CA, US
Richard Spillane - Mountain View CA, US
Gordon Chaffee - Hillsborough CA, US
International Classification:
H04L 29/06
Abstract:
Systems, methods, and software provided herein identify unverified behavior in an application component environment. In one example, a method of operating a collection service includes receiving communication data for a plurality of application components and generating a baseline set of communication interactions for the application component environment based on the communication data. The method further includes receiving additional communication data for the application components and generating a second set of communication interactions for the application component environment based on the communication data. The method also provides identifying a differential set of communication interactions by comparing the baseline set and the second set of communication interactions.

Behavior Data Management In An Application Component Environment

View page
US Patent:
20170054747, Feb 23, 2017
Filed:
Aug 5, 2016
Appl. No.:
15/229448
Inventors:
- Mountain View CA, US
Gaurav Mathur - Palo Alto CA, US
Richard Spillane - Mountain View CA, US
Gordon Chaffee - Hillsborough CA, US
International Classification:
H04L 29/06
H04L 12/26
G06F 17/30
Abstract:
Systems, methods, and software provided herein manage behavioral data for application components in a computing environment. In one example, a method of operating collection service includes receiving behavior reports for application containers in a computing environment. Once received, behavioral data in the behavior reports is stored in a tree data structure, wherein the tree data structure includes nodes for various time periods. Once the behavioral data is stored, a request may be generated for a portion of the behavioral data over a defined time period. In response to the request, a response summary may be generated based on the tree data structure and the defined time period.

Real-Time Tracking And Visibility Into Application Communications And Component Interactions

View page
US Patent:
20160301585, Oct 13, 2016
Filed:
Apr 13, 2016
Appl. No.:
15/097449
Inventors:
- Mountain View CA, US
Gaurav Mathur - Palo Alto CA, US
Richard Spillane - Mountain View CA, US
Gordon Chaffee - Hillsborough CA, US
International Classification:
H04L 12/26
H04L 29/06
Abstract:
Systems, methods, and software provided herein generate a visual representation of communication between application components. In one example, a method of operating a method of operating a collection service system includes receiving a plurality of communication reports representing communications for application components, and storing the communication data from the plurality of communication reports in one or more data structures. The method further provides identifying administrator defined display parameters for the communication data, and generating a visual representation of the application components based on the display parameters and the one or more data structures.

Management Of Encryption Keys In An Application Container Environment

View page
US Patent:
20160292431, Oct 6, 2016
Filed:
Apr 2, 2015
Appl. No.:
14/677566
Inventors:
- Mountain View CA, US
Gaurav Mathur - Palo Alto CA, US
Richard Spillane - Mountain View CA, US
Gordon Chaffee - Hillsborough CA, US
International Classification:
G06F 21/60
H04L 9/14
Abstract:
Systems, methods, and software to manage encryption keys in an application container environment are provided. In one example, a method of managing encryption keys comprises identifying a plurality of data objects to encrypt and encrypting the plurality of data objects via a plurality of encryption keys. The method further provides generating supplemental data for each data object, wherein the supplemental data for each data object comprises a key identifier that corresponds to an encryption key used to encrypt each data object. The method further includes associating the supplemental data for each data object with the encrypted version of each data object, and organizing the key identifiers from the plurality of data objects into a data structure with the plurality of encryption keys.
Gordon C Chaffee from Hillsborough, CA, age ~55 Get Report