Peachtree Medical & Surgical 20 Eastbrook Bnd STE 64, Peachtree City, GA 30269 7704873272 (phone), 7706327867 (fax)
Education:
Medical School University of Tennessee College of Medicine at Memphis Graduated: 1977
Conditions:
Abdominal Hernia Benign Neoplasm of Breast Breast Disorders Cholelethiasis or Cholecystitis Inguinal Hernia
Languages:
English
Description:
Dr. Walker graduated from the University of Tennessee College of Medicine at Memphis in 1977. He works in Peachtree City, GA and specializes in General Surgery and Internal Medicine.
License Records
Don C Walker
Address:
8600 Fathom Cir APT 1403, Austin, TX 78750
Phone:
5129027807
License #:
84771 - Active
Category:
Legal Service Contract Sales Rep
Expiration Date:
Dec 8, 2017
Us Patents
System And Method For Transparent Hard Disk Drive Update
Russell Woodbury - Round Rock TX, US Don H. Walker - Katy TX, US Frank Widjaja Yu - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 9/44 G06F 9/46
US Classification:
717170, 717169, 717171, 718103, 718104
Abstract:
Information handling system hard disk drive firmware updates are initiated on a hard disk drive without disrupting operations of the information handling system. A firmware update is copied in executable form to the hard disk drive's buffer and executed by the hard disk drive's controller without aborting queued tasks or losing system synchronization. The controller then copies the firmware update to flash memory in parallel with execution of the firmware update so that the hard disk drive operates with minimal degradation in performance.
System And Method For Identifying Inoperable Connection Points In A Storage Enclosure
Kevin T. Marks - Round Rock TX, US Don H. Walker - Katy TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H05K 7/10
US Classification:
710301, 710302
Abstract:
A system and method is disclosed for encoding a set of configuration data for a given expander and at some later point comparing the configuration data to a discovered configuration derived from an attempt to discover the operability of each phy or connection point of the storage system. The configuration identifies the phys or connection points that are operable and the mapping of operable connection points to wide ports communicatively of an expander.
A network includes a management module with a first root complex, a first server with a first endpoint coupled to the first root complex, and a second server with a second root complex, a second endpoint coupled to the second root complex, a third endpoint coupled to the first root complex, and a bridge coupled to the second endpoint and to the third endpoint. A method includes discovering a PCIe host bridge adapter (PHBA) and a storage resource coupled to multiple storage extents in a PCIe domain, creating a first virtual function on the storage resource and sending a first identifier for the first virtual function to the PHBA. A network interface device includes a PCIe endpoint that is coupleable to a PCIe root complex, another PCIe endpoint that is coupleable to another PCIe root complex, and a bridge that couples the first PCIe endpoint with the second PCIe endpoint.
Encryption Key Management System And Methods Thereof
Mukund P. Khatri - Austin TX, US Kevin T. Marks - Round Rock TX, US Don H. Walker - Georgetown TX, US
Assignee:
DELL PRODUCTS, LP - Round Rock TX
International Classification:
H04L 9/08 G06F 9/54 H04L 9/32 H04L 9/06 G06F 9/24
US Classification:
380283, 719313, 713 2, 726 16, 380277
Abstract:
During execution of BIOS at an information handling system, a processor communicates with the storage controller via a command line protocol (CLP) communications channel. Via the channel, the processor obtains identification information for storage devices associated with the storage controller. The processor communicates the identification information to a key management client, which obtains encryption keys based on the identification information from a key management server. The processor receives the encryption keys, and communicates them to the storage controller via the CLP communications channel. The CLP communications channel thus provides a convenient and flexible interface for communication of security information prior to execution of an operating system.
A network includes a management module with a first root complex, a first server with a first endpoint coupled to the first root complex, and a second server with a second root complex, a second endpoint coupled to the second root complex, a third endpoint coupled to the first root complex, and a bridge coupled to the second endpoint and to the third endpoint. A method includes discovering a PCIe host bridge adapter (PHBA) and a storage resource coupled to multiple storage extents in a PCIe domain, creating a first virtual function on the storage resource and sending a first identifier for the first virtual function to the PHBA. A network interface device includes a PCIe endpoint that is coupleable to a PCIe root complex, another PCIe endpoint that is coupleable to another PCIe root complex, and a bridge that couples the first PCIe endpoint with the second PCIe endpoint.
DON H. WALKER - Georgetown TX, US WILLIAM LYNN - Round Rock TX, US
International Classification:
G06F 13/24
US Classification:
710263
Abstract:
A method for providing notification of completion of a computing task includes providing access to an information handling resource for a first information handling system, registering the first information handling system with a first completion queue, submitting commands from the first information handling system to a first submission queue, providing access to the information handling resource for second first information handling system, registering the second information handling system with the first completion queue, and submitting commands from the second information handling system to a second submission queue. Upon execution of commands in the first submission queue and the second submission queue, an entry in is created a first completion queue. Upon the creation of an entry in the first completion queue, an interrupt is selectively sent to the first information handling resource and to the second information handling resource.
Isbn (Books And Publications)
Clio's Cowboys: Studies in the Historiography of the Cattle Trade
locations. Colorado is the most typical center of...CEO at DragonBreath Consulting Retired systems analyst with a penchant for limited travel and study in MesoAmerica. Plus he tends to exhibit a particular love of photography & cinema... Retired systems analyst with a penchant for limited travel and study in MesoAmerica. Plus he tends to exhibit a particular love of photography & cinema. Currently Don is applying his formidable electronic & photographic skills toward a new business creating movies of people's lives from their photo...