Search

Shaun Wackerly Phones & Addresses

  • 288 Royal Dr, London, KY 40744
  • 1713 Laehr Dr, Lincoln, CA 95648 (916) 645-3540
  • 2931 Cardinal Dr, Lincoln, CA 95648 (916) 409-9256
  • Grass Valley, CA
  • Santa Cruz, CA
  • 6309 Gold Finch Ct, Rocklin, CA 95765
  • Golden, TX
  • Malibu, CA
  • San Luis Obispo, CA

Resumes

Resumes

Shaun Wackerly Photo 1

Senior Software Engineer

View page
Location:
288 Royal Dr, London, KY 40744
Industry:
Computer Networking
Work:
Aruba, A Hewlett Packard Enterprise Company
Senior Software Engineer

Hewlett-Packard Apr 2015 - Sep 2012
Systems and Software Engineer V at Hewlett-Packard

Opendaylight Project Sep 2014 - Mar 2015
Java Developer

Sap Feb 2003 - Feb 2003
Jsp Developer

Boeing Jan 2002 - Jan 2003
Perl Developer
Education:
University of California, Santa Cruz 2000 - 2002
Master of Science, Masters, Computer Science
California Polytechnic State University - San Luis Obispo 1998 - 2000
Bachelors, Bachelor of Science, Computer Engineering
Bear River High School
Skills:
Perl
Unix
Device Drivers
Linux
Embedded Systems
Embedded Software
C
Debugging
Software Development
Software Design
Java
Clearcase
Firmware
Tcp/Ip
Distributed Systems
Software Engineering
Testing
Shell Scripting
Integration
Vxworks
Apache
C++
System Architecture
Rtos
Languages:
English
Spanish
Shaun Wackerly Photo 2

Shaun Wackerly

View page
Location:
Sacramento, California Area
Industry:
Computer Networking

Business Records

Name / Title
Company / Classification
Phones & Addresses
Shaun Casey Wackerly
President
THE NORTH AREA CHURCH OF CHRIST
PO Box 601704, Sacramento, CA 95860
2931 Cardinal Dr, Lincoln, CA 95648

Publications

Us Patents

Systems And Methods Of Using Pseudo-Routes For Data Transmissions

View page
US Patent:
7760742, Jul 20, 2010
Filed:
Mar 15, 2005
Appl. No.:
11/081470
Inventors:
Shaun C Wackerly - Lincoln CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 12/28
US Classification:
370400, 370238, 37039531, 709239, 709241
Abstract:
In some embodiments of the present invention, method of routing data packets using a pseudo-route are presented including: receiving a data packet, the data packet having a destination; calculating the pseudo-route, if the destination corresponds with at least one of a plurality of software routing table routes, the pseudo-route having a most specific non-overlapping route mask derived from at least one of a plurality of overlapping software routing table routes; and routing the data packet using the pseudo-route. In some embodiments methods are presented further including: selecting a most specific route from the at least one of a plurality of software routing table routes corresponding with the destination. In some embodiments methods are presented further including: programmatically entering the pseudo-route into a hardware routing table.

Detection Of Mismatched Vlan Tags

View page
US Patent:
7796613, Sep 14, 2010
Filed:
Oct 31, 2006
Appl. No.:
11/590309
Inventors:
Shaun C. Wackerly - Lincoln CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 12/28
H04L 12/56
US Classification:
37039553, 370389, 370392
Abstract:
A network device, system and method are provided for detection of mismatched VLAN tags on a port of a network chip and a packet. The network device includes a processor, a memory and a network chip having a number of network ports. One of the ports is tagged with a VLAN membership of at least one particular VLAN and configured to receive a packet. Computer executable instructions are storable in the memory and executable by the processor to detect whether the packet received at the port is untagged with any VLAN. Upon detecting that the packet is untagged with any VLAN, the computer executable instructions determine whether the untagged packet is intended to be untagged on the particular VLAN at the port. If the packet is not intended to be untagged on the particular VLAN at the port, the computer executable instructions send a misconfiguration alert signal to a network management program, and determine either the packet is misconfigured to be sent to the network chip without a VLAN tag or the port of the network chip is misconfigured to be tagged with the particular VLAN.

Network Traffic Monitoring

View page
US Patent:
7924720, Apr 12, 2011
Filed:
Feb 26, 2007
Appl. No.:
11/710804
Inventors:
Shaun C. Wackerly - Lincoln CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 11/30
US Classification:
370232, 370253, 370392, 726 23
Abstract:
Systems, methods, and devices are described that monitor network traffic. One method includes monitoring a number of packets received by a network device based on a number of criteria to determine a flow of the packets. For each monitored packet for a particular source IP address/destination IP address pair, the method includes hashing a destination TCP/UDP port number into a range [0. . . N]. The method further includes setting a bit in a bit field that has a width of N+1 bits based on the hashing.

Vlan Aware Trunks

View page
US Patent:
20080101387, May 1, 2008
Filed:
Oct 31, 2006
Appl. No.:
11/590050
Inventors:
Shaun C. Wackerly - Lincoln CA, US
International Classification:
H04L 12/56
US Classification:
370401, 370392
Abstract:
Dynamically enable link aggregation control protocol on a per port and per virtual local area network (VLAN) basis.

Methods And Devices For Implementing Configuration Synchronization

View page
US Patent:
20110106921, May 5, 2011
Filed:
Oct 30, 2009
Appl. No.:
12/610018
Inventors:
Jeremy Brown - Roseville CA, US
Shaun Wackerly - Lincoln CA, US
International Classification:
G06F 15/177
US Classification:
709221
Abstract:
Embodiments of the invention provide a network device for implementing configuration synchronization, including a port configured to a receive a configuration file, a memory, and a processing engine configured such that if a configuration file is received on the port, the processing engine determines a neighbor device of the network device and forwards the configuration file to the neighbor device, and wherein if a configuration file is received on the port and the network device is a member of a predetermined peer group, the configuration file is loaded into the memory.

Methods For Configuration Management Using A Fallback Configuration

View page
US Patent:
20120102166, Apr 26, 2012
Filed:
Oct 22, 2010
Appl. No.:
12/910629
Inventors:
Shaun Wackerly - Lincoln CA, US
International Classification:
G06F 15/177
G06F 15/173
US Classification:
709222, 709223
Abstract:
A method of configuring a network managed device in a network is described herein. A fallback configuration is determined. The fallback configuration is identified as a configuration that enables the network managed device to be manageable. A working configuration is determined. The working configuration is described by a working set of configuration data that has been updated based on a management command. A commit command is received. The working configuration is saved as a running configuration and verification of the running configuration is initiated. It is determined whether the verification of the running configuration is successful. Where it is not successful, the running configuration is saved as a failed configuration and the running configuration is replaced with the fallback configuration.

System For Managing The Size Of A Hardware Routing Table

View page
US Patent:
20120307640, Dec 6, 2012
Filed:
May 30, 2011
Appl. No.:
13/118496
Inventors:
Shaun Wackerly - Lincoln CA, US
Nick E. Demmon - Roseville CA, US
International Classification:
H04L 12/26
US Classification:
370241
Abstract:
A system and method for managing a hardware routing table comprising monitoring usage of entries in said routing table and deleting entries based on usage criteria so as to generally keep the number of entries within a size limit, thereby conserving power.

Updating Security Bindings In A Network Device

View page
US Patent:
20140082693, Mar 20, 2014
Filed:
Sep 14, 2012
Appl. No.:
13/620255
Inventors:
Shaun Wackerly - Lincoln CA, US
Jeremy Brown - Roseville CA, US
International Classification:
G06F 21/00
US Classification:
726 3
Abstract:
A network device includes a security binding table. The network device is configured to couple to a network and configured to receive security information from a source device. A processor is included to compare the lookup portion of the received security information from the source device to the lookup portion of each entry of the security binding table and to compare the match portion of the received security information from the source device to the match portion of each entry of the security binding table to determine if there is a match, and to update the security binding table by adding an entry comprising the lookup portion and the match portion of the received security information from the source device when neither the lookup portion nor the match portion of the received security information from the source device matches any entry of the security binding table.
Shaun Casey Wackerly from London, KY, age ~47 Get Report