Search

Charles Musta Phones & Addresses

  • 6629 Whitemarsh Valley Walk, Austin, TX 78746 (512) 327-7650
  • 1204 Marshall Ln APT 5, Austin, TX 78703
  • Johnson City, TX
  • Llano, TX

Resumes

Resumes

Charles Musta Photo 1

Charles Musta

View page
Charles Musta Photo 2

Lead Software Architect At Bigfoot Networks

View page
Location:
Austin, Texas Area
Industry:
Computer Hardware
Experience:
Bigfoot Networks (Privately Held; 11-50 employees; Computer Hardware industry): Lead Software Architect,  (-) 

Publications

Us Patents

Error Detection And Recovery In A Storage Driver

View page
US Patent:
7373549, May 13, 2008
Filed:
Apr 6, 2004
Appl. No.:
10/819416
Inventors:
Navneet Malpani - Austin TX, US
Xuebin Yao - Austin TX, US
Charles A. Musta - Austin TX, US
Mikal N. Hart - Austin TX, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G06F 11/00
US Classification:
714 17, 714 4, 714 15, 714 16, 719321, 719326
Abstract:
A command is received, at a network storage driver, from an operating system storage stack, wherein the command is for communication with a target storage device over a connection across a network. The command is selectively executed, a plurality of times over the connection, for communicating with the target storage device, in response to a determination that the command failed to successfully communicate with the target storage device within a threshold period of time.

Load Balancing And Failover

View page
US Patent:
7760626, Jul 20, 2010
Filed:
Mar 31, 2004
Appl. No.:
10/815349
Inventors:
Navneet Malpani - Austin TX, US
Xuebin Yao - Austin TX, US
Charles A. Musta - Austin TX, US
Assignee:
INTEL Corporation - Santa Clara CA
International Classification:
H04L 12/28
US Classification:
370230, 3703954, 370428
Abstract:
Provided are techniques for static load balancing. For each data path in a network adapter team, a load balancing value is computed. A maximum value of the computed load balancing values is determined. A data path with the maximum value is selected for use in routing data. Also provided are techniques for dynamic load balancing in which, when a load balancing share of a data path is less than an actual load balancing share, the load balancing share of the data path is adjusted. Furthermore, provided are techniques for failover processing in which a command is routed through a second network adapter in response to determining that the command may not be routed through a first network adaptor.

Method Storing Socket State Information In Application Space For Improving Communication Efficiency Of An Application Program

View page
US Patent:
7908364, Mar 15, 2011
Filed:
Jan 24, 2008
Appl. No.:
12/018855
Inventors:
Harlan T. Beverly - McDade TX, US
Charles A. Musta - Austin TX, US
Assignee:
Bigfoot Networks, Inc. - Austin TX
International Classification:
G06F 15/173
US Classification:
709224, 719321, 719322, 719327
Abstract:
The state of the communication socket is maintained at a network device and communicated to a device driver for the network device. The device driver can send messages to an interface program in application space, which stores the state information in dedicated application space memory. In response to a query from a peer program requesting the state of the communication socket, the interface program retrieves the state information from the dedicated memory. Because the state information and the interface program are located in application space, the number of kernel transitions required to determine the socket state is reduced, improving communication efficiency.

Distributed Processing System And Method

View page
US Patent:
8255919, Aug 28, 2012
Filed:
Jan 24, 2008
Appl. No.:
12/018872
Inventors:
Harlan T. Beverly - McDade TX, US
Kumar Gala - Austin TX, US
Charles A. Musta - Austin TX, US
Assignee:
Qualcomm Atheros, Inc. - San Jose CA
International Classification:
G06F 9/46
G06F 13/00
G06F 15/00
US Classification:
718105, 719328, 712 1
Abstract:
A method is disclosed that receives a function call at an application program interface. The method selects a first processor of a plurality of processors to execute the function call. The method further executes a first transmit function associated with a bus coupled to the first processor. The first transmit function includes a function parameter associated with the function call.

Technique For Setting Network Communication Parameters

View page
US Patent:
8458357, Jun 4, 2013
Filed:
Jun 29, 2010
Appl. No.:
12/825501
Inventors:
Benjamin Menchaca - Pflugerville TX, US
Harlan T. Beverly - McDade TX, US
Christopher Cowden - Austin TX, US
Charles Musta - Austin TX, US
Wayne Dunlap - Austin TX, US
Assignee:
Qualcomm Incorporated - San Diego CA
International Classification:
G06F 15/16
G06F 15/173
US Classification:
709232, 709224, 709229
Abstract:
Techniques are disclosed for setting network communication parameters at a network interface based on the types of applications being executed at one or more computer devices that interface with the network. Thus, for example, the network interface can set the communication bandwidth, priority, or combination thereof, for each executing application based on the application type. By setting the network communication parameters for each application based on the application type, the applications can communicate with the network more efficiently.

Network Message Transformation Device And Methods Thereof

View page
US Patent:
8493985, Jul 23, 2013
Filed:
Jan 16, 2009
Appl. No.:
12/355609
Inventors:
Harlan T. Beverly - McDade TX, US
Charles Musta - Austin TX, US
Assignee:
QUALCOMM Incorporated - San Diego CA
International Classification:
H04L 29/06
H04L 29/08
US Classification:
370401
Abstract:
A method of transforming messages for communication via a network includes receiving a message from an application being executed at a processor. The message is received at a connection object, which transforms the received message based on characteristics of the connection object. The characteristics can be determined via a negotiation between the source and target of the message. The connection object provides the transformed message to a protocol layer, which forms packets based on the message. The connection object thus transforms each message independent of the transmission protocol used to communicate the message to the target, thereby improving communication bandwidth and efficiency.

Transport Layer That Warns Application Of Potential Bottleneck And Methods Thereof

View page
US Patent:
8588064, Nov 19, 2013
Filed:
Jan 16, 2009
Appl. No.:
12/355536
Inventors:
Harlan T. Beverly - McDade TX, US
Charles A. Musta - Austin TX, US
Assignee:
QUALCOMM Incorporated - San Diego CA
International Classification:
H04L 29/10
H04L 12/56
US Classification:
370230, 709230
Abstract:
A method of managing communication of messages via a network includes storing messages received from an application in a queue at a transport layer. The transport layer monitors the amount of information stored at the queue. When the amount of information exceeds a threshold amount, the transport layer provides a warning message to the application. In an embodiment, the transport layer provides the warning message before the queue assigned to store messages from the application is full, so that the application can continue to provide messages to the transport layer after the warning message. The application can take appropriate action in response to the message, such as reducing the amount or frequency of information provided at the transport layer, thereby reducing the likelihood of a communication bottleneck at the transport layer.

Data Buffering And Notification System And Methods Thereof

View page
US Patent:
20080016236, Jan 17, 2008
Filed:
Jul 16, 2007
Appl. No.:
11/778124
Inventors:
Harlan T. Beverly - McDade TX, US
Charles A. Musta - Austin TX, US
Assignee:
BIGFOOT NETWORKS, INC. - Austin TX
International Classification:
G06F 15/16
US Classification:
709230
Abstract:
An interceptor program at a computer device intercepts certain externally initiated communications intended for the peer program before those communications are placed on the network stack. Further, the interceptor program stores the received communications in a buffer in application space, rather than kernel space. The interceptor program can then intercept polling requests from the peer program inquiring if data for the peer program is located at the network stack, and provide the buffered communications to the peer program in response. Because the communications are stored in application space, rather than kernel space, the data can be rapidly provided to the peer program, improving the speed with which the program can respond to the client communications.
Charles A Musta from Austin, TX, age ~74 Get Report