Inteum Company
Links
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - kanad+ghose
6
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Control Systems and Prediction Methods for IT Cooling Performance in Containment
Control systems and prediction methods for it cooling performance in containment systems by effectively controlling airflow Background: Containment is becoming a standard modality in data centers today due to its inherent energy efficiency advantages. Cold aisle containment, hot aisle containment, chimney, enclosed racks and rear door heat exchangers...
Published: 8/21/2025
|
Inventor(s):
Husam Alissa
,
Kourosh Nemati
,
Bahgat Sammakia
,
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Energy-Aware Load Direction in Server Installations
Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their peak efficiency levels. Technology Overview: Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their...
Published: 8/29/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Server Power Management Through Dynamic Job Classification
This tool schedules new jobs and repetitive jobs with the server characteristics using the most energy-efficient configuration for realizing the performance goal Technology Overview: With the growing concern about energy expenditures in server installations, mechanisms are needed for improving the energy-efficiency of server installations....
Published: 8/29/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor
A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty Background: The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 8/21/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes. Background: A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 8/21/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time
A technology that enables the detection of tampering of a program as the program executes for security applications. Background: Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 8/21/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University