Search

Nicos A Vekiarides

from Draper, UT
Age ~55

Nicos Vekiarides Phones & Addresses

  • Draper, UT
  • 52 Sprague St, Dedham, MA 02026 (781) 329-7904 (781) 329-7937
  • 8 Carter Dr, Natick, MA 01760 (508) 545-1663 (508) 545-1664
  • Boston, MA
  • Milford, MA
  • Framingham, MA
  • Pittsburgh, PA
  • 8 Carter Dr, Natick, MA 01760 (508) 308-6465

Work

Position: Food Preparation and Serving Related Occupations

Education

Degree: Associate degree or higher

Business Records

Name / Title
Company / Classification
Phones & Addresses
Nicos Vekiarides
Director
THE 3-21 FOUNDATION, INC
268 Western Ave, Cambridge, MA 02139
8 Carter Dr, Natick, MA 01760
Nicos Andrew Vekiarides
Manager
TWINSTRATA, LLC
8 Carter Dr, Natick, MA 01760

Publications

Us Patents

Method And System Of Allocating Storage Resources In A Storage Area Network

View page
US Patent:
6977927, Dec 20, 2005
Filed:
Sep 18, 2000
Appl. No.:
09/664500
Inventors:
John W. Bates - Mendon MA, US
Nicos A. Vekiarides - Dedham MA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L012/54
US Classification:
370381, 370428, 707 10, 709211, 709223, 711111, 711152, 711163, 711170, 711202
Abstract:
A system for allocating storage resources in a storage area network is described. A logical unit number (LUN) mapper receives at least one storage request parameter and maps the storage request parameters to at least one physical LUN. The LUN mapper includes at least one LUN map. The storage request parameters include a host id parameter, a target LUN parameter, and a target host bus adaptor (HBA) parameter. The LUN mapper uses the host id parameter to select the one of the LUN maps that corresponds to the host id parameter. The LUN mapper applies the target LUN parameter and the target HBA parameter to the selected LUN map to locate the physical LUN(s) stored in the selected LUN map. The LUN mapper issues the received read/write storage request to at least one storage device that houses the physical LUN(s). The one or more storage devices are located in the storage area network.

Internet Protocol Data Mirroring

View page
US Patent:
7386610, Jun 10, 2008
Filed:
Sep 18, 2000
Appl. No.:
09/664499
Inventors:
Nicos A. Vekiarides - Dedham MA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/173
G06F 15/167
US Classification:
709224, 709213, 709223, 709248
Abstract:
A method, system, and computer program product for mirroring data in a computer network is described. At least one connection is established between a local storage server and a mirror storage server. A primary storage request is received from a network host at the local storage server. A mirror storage request is sent across the established at least one connection from the local storage server, wherein the mirror storage request corresponds to the received primary storage request. The mirror storage request is processed at the mirror storage server. A first heartbeat signal is sent from the local storage server to the mirror storage server. A second heartbeat signal is sent from the mirror storage server to the local storage server. Data of the received mirror storage request is stored in a mirror storage device corresponding to a primary storage device. A response is sent across the established at least one connection from the mirror storage server, wherein the response indicates whether the storing of data of the received mirror storage request step was successful.

Non-Disruptive Data Path Upgrade Using Target Mobility

View page
US Patent:
8024426, Sep 20, 2011
Filed:
May 9, 2008
Appl. No.:
12/118332
Inventors:
Dmitry Trikoz - Waltham MA, US
Tom Middleton - Hingham MA, US
Robert Mulcahy - Sudbury MA, US
Ric Calvillo, Jr. - Boston MA, US
Nicos Vekiarides - Natick MA, US
Assignee:
Texas Memory Systems, Inc. - Houston TX
International Classification:
G06F 15/16
US Classification:
709218
Abstract:
Described are computer-based methods and apparatuses, including computer program products, for non-disruptive data path modification using target mobility. A management server is in communication with a switching fabric. The switching fabric is in communication with a host and a data storage element. The management server creates a takeover target based on a primary target, where the primary target is part of a virtual data path between the host and the data storage. The switching fabric, through the direction of the server, modifies metadata associated with the virtual data path to expose the takeover target so that the takeover target becomes part of the virtual data path. The management server unexposes the primary target so that the primary target is no longer part of the virtual data path. The delay between exposing the takeover target and unexposing the primary target is sufficiently small to prevent an error condition from occurring at the host.

Method For Data Disaster Recovery Assessment And Planning

View page
US Patent:
20090300409, Dec 3, 2009
Filed:
May 28, 2009
Appl. No.:
12/473524
Inventors:
John W. Bates - Mendon MA, US
Nicos Vekiarides - Natick MA, US
Brian Geisel - Shrewsbury MA, US
Assignee:
TWINSTRATA, INC - NATICK MA
International Classification:
G06F 11/07
G06F 11/00
G06F 3/048
US Classification:
714 5, 715781, 714E11144
Abstract:
A method for assessing the risk and cost for data loss and disaster recovery (DR) plans includes providing an application having a graphical user interface (GUI) comprising first and second windows arranged adjacent to each other. The first window comprises a catalog of components used to generate data disaster recovery (DR) configurations and the second window displays the generated DR configurations. A first DR configuration is generated in the second window and components are added to the first DR configuration by dragging and dropping components from the catalog into appropriate locations of the second window. Metrics for the first DR configuration are calculated and reported in the second window. A second configuration is also similarly generated in the second window and the metrics results are graphically compared to each other.

Method, System, And Computer Program Product For A Data Propagation Platform And Applications Of Same

View page
US Patent:
6804819, Oct 12, 2004
Filed:
Sep 18, 2000
Appl. No.:
09/665583
Inventors:
John W. Bates - Mendon MA
Nicos A. Vekiarides - Dedham MA
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 300
US Classification:
719318, 709220, 709223
Abstract:
A method, system, and computer program product for a data propagation platform and applications of same is described. The data propagation platform provides various storage functions. According to an embodiment, the factories of the data propagation platform create and implement device modules. Device modules perform operations on encapsulated messages formed from data and commands, such as device operation commands and data from storage device read/write operations. Device modules are formed into device chains. Device chains are able to perform various tasks as a sum of device modules. In embodiments, device chains are layered and built on each other.

Atomic Capture Of A Set Of Related Files, Using A Distributed Ledger, For Proof Of Authenticity

View page
US Patent:
20200012806, Jan 9, 2020
Filed:
Jun 19, 2019
Appl. No.:
16/445478
Inventors:
- Natick MA, US
Thomas Mark Morley - Dedham MA, US
Emmanuel Parasirakis - Norwood MA, US
Nicos Vekiarides - Natick MA, US
International Classification:
G06F 21/62
H04W 12/06
G06F 16/13
G06N 20/00
Abstract:
Techniques for proving authenticity of data files, such as digital photos. An authentication/indexing server content from a client device such as a mobile device, and generates or receives other related data such as a reference to the content object, a fingerprint for the content object, and other metadata indicating for example a timestamp related to the content object. The fingerprint is inserted into a distributed ledger, with the distributed ledger returning a ledger address. A manifest object containing the transaction object, the ledger address, and a list of the content object and, optionally, related edits is then created and stored. The server may index fingerprints. Thus, a fingerprint can be used to authenticate subsequently received object against the stored metadata.

Real Time Visual Validation Of Digital Content Using A Distributed Ledger

View page
US Patent:
20190391972, Dec 26, 2019
Filed:
Jun 19, 2019
Appl. No.:
16/445488
Inventors:
- Natick MA, US
Thomas Mark Morley - Dedham MA, US
Emmanuel Parasirakis - Norwood MA, US
Nicos Vekiarides - Natick MA, US
International Classification:
G06F 16/23
G06F 9/451
G06F 16/27
G06F 3/0481
G06F 3/0484
Abstract:
A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.

Methods And Systems For Enriching Text Information For Application Data Entry And Viewing

View page
US Patent:
20190347313, Nov 14, 2019
Filed:
May 7, 2019
Appl. No.:
16/405176
Inventors:
- Boston MA, US
Nicos Vekiarides - Natick MA, US
Edgar Velazquez - Brooklyn NY, US
Bryan Chambers - Watertown MA, US
International Classification:
G06F 17/21
G06F 16/35
G06Q 30/00
G06F 3/0482
G06F 17/27
G06F 17/24
Abstract:
A note enrichment engine for applying context and structure to unstructured data, such as sales notes, through intelligent metadata tags. Metadata tags are associated with note records manually, or by automatic detection of keywords, or by other language understanding methods. Metadata tags may be configured to initiate events in other systems, such as to populate a database table in a related application such as a Customer Relationship Management (CRM) application, or to create an event in a calendar application, or to provide a taxonomy for note search and later retrieval.
Nicos A Vekiarides from Draper, UT, age ~55 Get Report