Steven L Grobman

age ~52

from Flower Mound, TX

Also known as:
  • Steven Leonard Grobman
  • Steve L Grobman
  • Ashlyn Grobman
  • Steven N
Phone and address:
3808 Long Meadow Dr, Lewisville, TX 75022
9169334463

Steven Grobman Phones & Addresses

  • 3808 Long Meadow Dr, Flower Mound, TX 75022 • 9169334463
  • 1511 Southridge Ct, El Dorado Hills, CA 95762 • 9169334463
  • Folsom, CA
  • 2496 Julliard Cir, Roseville, CA 95661 • 9167825485
  • Raleigh, NC
  • Austin, TX
  • Yorktown Heights, NY
  • Brewster, NY
  • El Dorado Hls, CA

Us Patents

  • Predictive Processor Speed Governor

    view source
  • US Patent:
    7334145, Feb 19, 2008
  • Filed:
    Jun 7, 2004
  • Appl. No.:
    10/862980
  • Inventors:
    Steven L. Grobman - El Dorado Hills CA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G06F 1/00
  • US Classification:
    713322, 713300, 713320, 713321, 713323, 700 28, 700 32, 700108, 700174
  • Abstract:
    A processor-based system accessing a performance profile for a program executing on a predetermined data set, executing the program on the predetermined data set, and governing processor speed in a predictive manner based at least in part on the performance profile.
  • Method For Guest Operating System Integrity Validation

    view source
  • US Patent:
    7539986, May 26, 2009
  • Filed:
    Jun 30, 2004
  • Appl. No.:
    10/881830
  • Inventors:
    Steven L. Grobman - El Dorado Hills CA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G06F 9/455
    G06F 9/46
    G06F 11/00
  • US Classification:
    718 1, 718100, 718104, 718105, 718108, 714 7, 714 8, 714 21, 714 37, 714 39
  • Abstract:
    A method includes performing a file system integrity validation on a host machine having a hypervisor architecture when a file system of a second process is mounted on a file system of a first process. The file system integrity validation occurs independently of booting the host machine.
  • Network Protecting Authentication Proxy

    view source
  • US Patent:
    7669229, Feb 23, 2010
  • Filed:
    Nov 13, 2002
  • Appl. No.:
    10/294126
  • Inventors:
    Steven L. Grobman - El Dorado Hills CA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    H04L 9/32
  • US Classification:
    726 2, 726 1, 726 3, 726 6, 726 12, 726 14, 726 25, 726 27, 709225, 709227, 709229
  • Abstract:
    It is convenient to allow access to a private network, such as a corporate intranet, or outward facing extranet application, from an external network, such as the Internet. Unfortunately, if an internal authentication system is used to control access from the external network, it may be attacked, such as by a malicious party intentionally attempting multiple invalid authentications to ultimately result in an attacked account being locked out. To circumvent this, an authentication front-end, proxy, wrapper, etc. may be employed which checks for lockout conditions prior to attempting to authenticate security credentials with the internal authentication system.
  • Method, Apparatus And System For Enhanced Cpu Frequency Governers

    view source
  • US Patent:
    7739532, Jun 15, 2010
  • Filed:
    Sep 7, 2006
  • Appl. No.:
    11/518004
  • Inventors:
    Steven L. Grobman - El Dorado Hills CA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G06F 9/455
    G06F 1/00
  • US Classification:
    713322, 718 1
  • Abstract:
    A method, apparatus and system enable enhanced processor frequency governors to comprehend virtualized platforms and utilize predictive information to enhance performance in virtualized platforms. Specifically, in one embodiment, an enhanced frequency governor in a virtual host may run within a virtual machine on the host and interact with a virtual machine manager to collect predictive information from application(s) running within each virtual machine on the host. The enhanced frequency governor may then utilize the predictive information to determine future CPU frequency requirements and raise or lower the CPU frequency and/or voltage in anticipation of the needs of the various applications.
  • Exclusive Access For Secure Audio Program

    view source
  • US Patent:
    7752436, Jul 6, 2010
  • Filed:
    Aug 9, 2005
  • Appl. No.:
    11/200662
  • Inventors:
    Steven Grobman - El Dorado Hills CA, US
    David Grawrock - Aloha OR, US
    Narendar B. Sahgal - Portland OR, US
    Joe Gruber - West Chester OH, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    H04L 29/06
  • US Classification:
    713164, 718108
  • Abstract:
    Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.
  • Method, Apparatus And System For Virtualized Peer-To-Peer Proxy Services

    view source
  • US Patent:
    7788713, Aug 31, 2010
  • Filed:
    Jun 23, 2004
  • Appl. No.:
    10/875833
  • Inventors:
    Steven Grobman - El Dorado Hills CA, US
    Carl C. Jones - Folsom CA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G06F 9/455
    G06F 9/00
  • US Classification:
    726 12, 718 1, 726 2, 726 11, 726 26, 726 27, 726 30
  • Abstract:
    A method, apparatus and system for virtualized proxy services are disclosed herein. Specifically, on one embodiment, a virtual proxy may be implemented in a virtual machine host. The virtual proxy may reside within a dedicated or shared virtual partition and may include a set of access restrictions. In one embodiment, a network including virtual machine hosts having virtual proxies may also provide additional peer-to-peer services. More specifically, a virtual proxy on a virtual host may be configured to broadcast/multicast content requests to other virtual hosts on the network prior to accessing the content from a remote location. If the content has previously been downloaded by another virtual host on the network, the virtual proxy on the requesting host may copy the content from the peer virtual host, instead of downloading the content from the remote location again. A variety of security measures may be implemented in one embodiment to ensure data integrity.
  • Method And Apparatus To Detect Kernel Mode Rootkit Events Through Virtualization Traps

    view source
  • US Patent:
    7845009, Nov 30, 2010
  • Filed:
    May 16, 2006
  • Appl. No.:
    11/435463
  • Inventors:
    Steven Grobman - El Dorado Hills CA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G06F 21/22
    G06F 11/30
    G06F 9/445
  • US Classification:
    726 24, 718 1
  • Abstract:
    Detecting a rootkit in a computing system may be achieved by detecting, by a virtual machine monitor, a virtualization trap occurring as a result of an action by a rootkit executing in a computing system; and analyzing the virtualization trap to detect the presence of the rootkit in the computing system. Action may then be taken to block the rootkit activity to safeguard the computing system.
  • Selective Register Save And Restore Upon Context Switch Using Trap

    view source
  • US Patent:
    7904903, Mar 8, 2011
  • Filed:
    Jun 30, 2005
  • Appl. No.:
    11/174254
  • Inventors:
    Steven L. Grobman - El Dorado Hills CA, US
    Michael D. Kinney - Olympia WA, US
  • Assignee:
    Intel Corporation - Santa Clara CA
  • International Classification:
    G06F 9/455
    G06F 9/46
  • US Classification:
    718 1, 718108
  • Abstract:
    In some embodiments, the invention involves saving limited context information when transitioning between virtual machines. A predetermined set of instructions and events cause a trap. A bit or flag is set to indicate that the event has occurred within a virtual machine. The virtual machine monitor determines whether specific register sets must be saved or restored upon a context switch, based on whether the flag has been set. Other embodiments are described and claimed.

Myspace

Steven Grobman Photo 1

Steven Grobman

view source
Birthday:
1942

Facebook

Steven Grobman Photo 2

Mark Steven Grobman

view source

Youtube

2010 Intel Core vPro Processor Overview Part ...

2010 Intel Core vPro Processor Overview with Steve Grobman, Director o...

  • Category:
    Science & Technology
  • Uploaded:
    03 Feb, 2010
  • Duration:
    9m 15s

2010 Intel Core vPro Processor Overview Part ...

2010 Intel Core vPro Processor Overview with Steve Grobman, Director o...

  • Category:
    Science & Technology
  • Uploaded:
    03 Feb, 2010
  • Duration:
    8m 38s

2010 Intel Core vPro Processor Overview: Cost...

Learn how the remote management capabilities of the all new 2010 Intel...

  • Category:
    Science & Technology
  • Uploaded:
    30 Aug, 2010
  • Duration:
    9m 43s

2010 Intel Core vPro Processor Overview Part ...

2010 Intel Core vPro Processor Overview with Steve Grobman, Director o...

  • Category:
    Science & Technology
  • Uploaded:
    03 Feb, 2010
  • Duration:
    8m 37s

2008 Intel vPro technology: What's New

Steve Grobman, Intel's Director of Business Client Architecture, talks...

  • Category:
    Science & Technology
  • Uploaded:
    23 Sep, 2008
  • Duration:
    5m 4s

Steve Grobman - Technology Has No Moral Compa...

Speaker: Steve Grobman SVP & CTO, McAfee Topic: Technology Has No Mora...

  • Duration:
    44m 51s

Steve Grobman Discusses Resilience and his Up...

If there was ever a time that tested our resilience, it's now. In his ...

  • Duration:
    36s

McAfee's Steve Grobman on massive SolarWinds ...

Turn to CNBC TV for the latest stock market news and analysis. From ma...

  • Duration:
    2m 14s

Get Report for Steven L Grobman from Flower Mound, TX, age ~52
Control profile