Jeff Sedayao

Jeff Sedayao
Intel · IT@Intel

M.S.

About

68
Publications
41,369
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
397
Citations
Introduction
Jeff Sedayao is an Industry Engagement Manager and an occasional freelance enterprise architect and researcher focusing on distributed systems - cloud computing, security, and big data in particular.
Additional affiliations
May 2017 - present
Intel
Position
  • Marketing Specialist
April 2014 - May 2017
Intel
Position
  • Researcher
January 2005 - March 2014
Intel
Position
  • Enterprise Architect/Research Engineer
Education
August 1987 - August 1989
University of California, Berkeley
Field of study
  • Computer Science
September 1982 - June 1986
Princeton University
Field of study
  • Computer Science

Publications

Publications (68)
Patent
Various systems and methods for Internet of Things (IoT) network sensor fusion are provided herein. A system for providing sensor collaboration includes: a sensor command circuit to access first-tier sensor data from a first-tier sensor associated with a user; a risk assessment circuit to use the first-tier sensor data to determine a risk rating, t...
Technical Report
Full-text available
Executive Summary In several proofs of concept, fuel cell technology has proved to be a reliable, stable, efficient and sustainable source of electricity for Intel's data centers. Intel IT joined forces with Intel's Corporate Services and Global Supply Chain groups to enable fuel cells to meet Intel's redundancy and capacity expectations. For some...
Patent
Techniques are provided for optimizing the operations of an ICN, particularly for an ICN with clustered nodes. A cluster head node may function as an orchestrator and a coordinator for efficient caching, routing, and computing and for co-existence of ICN and IP nodes in the network. A content store of an ICN router may include an indication of the...
Article
Full-text available
The XPRIZE Foundation designs and operates multi-million-dollar, global competitions to incentivize the development of technological breakthroughs that accelerate humanity toward a better future. To combat the COVID-19 pandemic, the foundation coordinated with several organizations to make datasets about different facets of the disease available an...
Patent
Systems and techniques for information centric network (ICN) high definition (HD) map distribution are described herein. For example, a vehicle may detect a map tile event (e.g., moving into an area for which the vehicle does not have an up-to-date map tile). The vehicle may transmit an interest packet a name for the map tile via an ICN and receivi...
Patent
Various systems and methods for managing container and virtual machine locations for a cloud deployed service are described herein. A system includes a configuration generator to: obtain a plurality of constraints from a constraint database; generate a plurality of configuration plans, each of the plurality of configuration plans including the plur...
Patent
An apparatus is described herein. The apparatus includes a secure enclave, and the secure enclave comprises a scanning mechanism and a reboot mechanism. The apparatus also includes a negotiation module, wherein the negotiation module is to negotiate a packet type and a payload for a reboot packet and in response to the scanning mechanism detecting...
Patent
System and techniques for distributed computing resources in an information centric network (ICN) are described herein. A request may be received at a node in the ICN. The request may include identification of a computing resource set and a timing threshold. Resources that correspond to a member of the computing resource set may be locked. The node...
Conference Paper
Full-text available
In the Harry Potter novels, the magical map known as the Marauder's Map tracks the whereabouts of people in and around Hogwarts Castle, displaying their names, locations, and paths of marauding. What if such a map were realizable in the real world, customized to provide a window into any space within which you might wander? What if it was augmented...
Patent
Full-text available
echnologies for user authorization include a compute device configured to determine one or more physical attributes of a non-electronic physical object and authorize a user to a protected system based on the determined physical attributes of the non-electronic physical object. The physical attributes may include, for example, an acoustic signature,...
Patent
Full-text available
Generally discussed herein are systems, devices, and methods for managing content of an information centric network (ICN). A component of an ICN can include a memory including an extended content store that includes content from at least one other component of the ICN, and first attributes of the content, the first attributes including a content po...
Patent
Full-text available
Generally discussed herein are systems, devices, and methods for data management in a reverse content data network (rCDN). A component of the rCDN may include a memory to hold content received from a first sensor device of a plurality of sensor devices of the rCDN and first attributes that describe properties of the content. The component may inclu...
Patent
Full-text available
A system and method provide for mapping a virtual core of a computing system to an external computing resource and intercepting an instruction directed from an application resident on the computing system to the virtual core. The intercepted instruction may be sent to the external computing resource for processing.
Conference Paper
Full-text available
IoT interoperability is critical to the realization of the IoT on a global scale. This paper examines how seemingly obvious choices for perfect IoT interoperability are not so perfectly rational and offers the concept of “Rational Interoperability” as a means to frame and to scope the discussion. We identify why a new framing conceptualization adds...
Patent
An apparatus alerts on a distance between items. The apparatus includes a radio for communicating with an internet of things (IoT) tag on an item. A locator module determines a distance between two or more items, and an alertor module alerts a user to a violation of a proximity rule.
Patent
The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. Th...
Conference Paper
Full-text available
The Internet of Things (IoT) is producing a tidal wave of data, much of it originating at the network edge, from applications with requirements unmet by the traditional back-end Cloud architecture. To address the disruption caused by the overabundance of data, this paper offers a holistic data-centric architectural vision for the data-centric IoT....
Patent
Technologies for mitigating a physiological condition include a wearable computing device coupled with a head-mounted display and sensor(s). The wearable computing device may receive sensor data indicative of a physical attribute of the user while displaying information on the head-mounted display. The wearable computing device analyzes the sensor...
Patent
Network request anonymizing nodes (“NRANs”) may be described herein. The NRANs may act as anonymizing proxies by generating additional anonymizing network requests to help anonymize a network request sent by a requesting computing node. By generating the additional anonymizing network request, the NRANs may cause a relatively large number of simila...
Patent
Full-text available
Described herein is technology for managing cloud storage. In particular, systems, devices and methods for managing cloud storage are described. In some embodiments, management of cloud storage may result in the designation of storage allocated to a first storage pool as obsolete, and the reallocation and/or reclamation of such storage to a second...
Patent
Methods, apparatuses, systems, and computer-readable media for an anonymization service level improvement system (“ALI”) are described. One or more transactions may be generated by a system to be transmitted outside of a secure area. The ALI may anonymize these transactions and anonymization may be measured by reference to one or more anonymization...
Patent
Full-text available
A system and method may provide for defining a usage policy for an available resource of a personal computing system, and transmitting the usage policy to a market broker. The market broker may identify a match between the usage policy and a request from another computing system, and generate a notification of the match. In addition, funds may be t...
Patent
Technologies for adaptively striping data across multiple storage clouds include receiving user constraints corresponding one or more cloud storage providers, receiving a file to be striped across the cloud storage providers, splitting the received file into file blocks, allocating each of the file blocks to a different one of the cloud storage pro...
Conference Paper
Full-text available
The Internet-of-Things (IoT) may be described as a network of networks, but more correctly as an interoperating system of diverse physical and cyber systems. We surveyed a number of IoT systems and in the process, uncovered key issues with semantic interoperability. This paper identifies areas like scope, object definition, and connectivity that we...
Patent
Computer-readable storage medium, apparatus and method associated with management of data elements in a cloud computing environment are disclosed herein. In embodiments, one or more computer-readable storage medium may contain instructions which when executed by a computing apparatus may facilitate a user in managing the user's data elements in a c...
Article
Full-text available
Intel IT set a goal of defining and implementing a single user experience framework as a standard for all enterprise solutions. We developed a holistic understanding of the enterprise experience and then provided a model for other IT teams to emulate when developing products and tools. The framework is a conceptual map of the desired user experienc...
Patent
Full-text available
Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of...
Patent
Full-text available
Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of...
Technical Report
Full-text available
As cloud computing becomes an increasingly important aspect of enterprise IT operations, the complexities of obtaining secure, efficient, and cost-effective cloud services have given rise to a new entity: the cloud service brokerage. These intermediary services—positioned between the cloud subscriber (and/or consumer) and one or more cloud provider...
Conference Paper
Full-text available
Some scholars feel that Big Data techniques render anonymization (also known as de-identification) useless as a privacy protection technique. This paper discusses our experiences and issues encountered when we successfully combined anonymization, privacy protection, and Big Data techniques to analyze usage data while protecting the identities of us...
Technical Report
Full-text available
This PoC provides a method for evaluating different CIaaS providers—including internal enterprise operations. The proposed standardized framework illustrates how enterprises can measure across multiple providers to make better buying decisions, evaluate and help ensure quality of service more effectively, deliver a better end-user experience, and e...
Patent
Full-text available
A method, apparatus and system contain and localize malware propagation. In one embodiment, a security scheme may identify worm traffic that attempts to probe an unused network location. The security scheme may then in conjunction with a routing component, reroute the worm traffic to a contained and localized location. In one embodiment, the contai...
Patent
A method comprises maintaining, in a first electronic device, a list of one or more electronic devices associated with a user, receiving, in the first electronic device, a first command, in response to the first command, forwarding a command to block interrupts on one or more electronic devices on the list of electronic devices. Other embodiments m...
Technical Report
Full-text available
This Scale-Out Storage Usage Model extends the “ODCA Compute Infrastructure as a Service (CIaaS) Master Usage Model”" and specifies the common usage patterns and requirements for CIaaS storage, which have typically used a scale-out approach. Essentially, a scale-out storage system is designed so that adding more capacity or increasing performance i...
Article
Full-text available
As enterprises embark on their cloud computing journey, tactical as well as strategic elements that complement existing security capabilities must be considered. The enterprise must demonstrate legal and regulatory compliance while supporting application and data access via cloud service providers. The first consideration is federation across cloud...
Patent
Mobile devices, systems, and methods enable individual mobile devices and network services to utilize idle mobile computer resources through virtualization and wireless mesh networking in a manner that is transparent to users. Other embodiments include apparatus and systems of devices for dispatching virtual node modules to perform service function...
Article
Full-text available
Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our employees and customers. We believe data anonymization is a viable technique for enhancing the security of cloud compu...
Article
Full-text available
Name resolution using the Domain Name System (DNS) is integral to today’s Internet. The resolution of a domain name is often dependent on namespace outside the control of the domain’s owner. In this article we review the DNS protocol and several DNS server implementations. Based on our examination, we propose a formal model for analyzing the name d...
Conference Paper
Full-text available
The Domain Name System (DNS) is a foundational component of today's Internet for mapping Internet names to addresses. With the DNS Security Extensions (DNSSEC) DNS responses can be cryptographically verified to prevent malicious tampering. The protocol complexity and administrative overhead associated with DNSSEC can significantly impact the potent...
Conference Paper
Full-text available
The domain name system (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. We develop a model for server dependencies that is used as a basis for measuring availability. We introduce the minimum number of servers queried (MSQ) and redundancy as availability metrics and show...
Conference Paper
Full-text available
“Cloud Computing” offers many potential benefits, including cost savings, the ability to deploy applications and services quickly, and the ease of scaling those application and services once they are deployed. A key barrier for enterprise adoption is the confidentiality of data stored on Cloud Computing Infrastructure. Our simple technique implemen...
Conference Paper
Full-text available
The domain name system (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. In this paper we propose a formal model for analyzing the name dependencies inherent in DNS, based on protocol specification and actual implementations. We derive metrics to quantif...
Patent
A method, system, and computer program for real-time measurement and modification of the performance of communications on a large area network, such as the Internet, based upon actual user experience. One embodiment performs a statistical analysis of access logs that record actual server usage by users. Based on such analysis, routing of communicat...
Article
Full-text available
Cloud computing is a significant trend with the potential to increase agility and lower costs. Today, however, security risks, immature technology, and other concerns prevent widespread enterprise adoption of external clouds. Intel IT is developing a strategy based on growing the cloud from the inside out. We take advantage of software as a service...
Conference Paper
Full-text available
This paper describes our experiences implementing and operating a globally distributed application composed of services available on a Cloud Computing infrastructure. Intel needed a service that could give us an idea of end users' experiences with Intel Corporation's website from different regions of the globe. We built our monitoring system on top...
Conference Paper
Full-text available
This paper explores one company's use of PlanetLab for a real application. Intel Corporation is a global enterprise with many Internet "DMZs" and thousands of customers around the world who use them. Intel needs to monitor the quality of service received through these Internet connections from many parts of the world. Doing this with available comm...
Article
Full-text available
The construction of highly reliable planetary-scale distributed services in the unreliable Internet environment entails significant challenges. Our research focuses on the use of loose binding among service components as a means to deploy distributed services at scale. An event-based publish/subscribe messaging infrastructure is the principal means...
Article
Full-text available
Current Information Technology (IT) models for security, content distribution, network and systems management, and provisioning do not match the level of complexity and flexibility required by today's enterprise. Private enterprises increasingly need to deal with internal security threats the same way as they deal with external security threats. In...
Article
Full-text available
Today's Information Technology (IT) organizations face significant challenges in delivering business value in these times of rapid architectural evolution as well as challenges in their ability to manage, provision, trust, and integrate the various elements of IT systems. An important aspect of these challenges is the impact IT has on the user and...
Article
Full-text available
Mosaic frightens many network administrators. With a mere click of a mouse button, a user can cause megabytes of multimedia objects to enter a network. This is of great concern in many environments where networks are heavily utilized. But what are the typical network effects of a Mosaic users? How can we minimize any negative affects and still give...
Conference Paper
Full-text available
PlanetLab is a globally distributed network of hosts designed to support the deployment and evaluation of planetary scale applications. Support for planetary applications development poses several security challenges to the team maintaining PlanetLab. The planetary nature of PlanetLab mandates nodes distributed across the globe, far from the physic...
Conference Paper
Full-text available
System administrators are under pressure to do more work and provide better customer service with fewer staff members. At the same time, other challenges emerge: constant interrupts, poor morale, career development needs. At Intel Online Services, we use peer certification to reduce system and network administration burdens while simultaneously imp...
Article
First Edition June 2001 ISBN: 1-56592-385-5, 272 pages This book focuses on a critical aspect of the Cisco IOS--access lists, which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets, firewalls, and the Internet. Unlike other Cisco router t...
Article
Full-text available
The implementation of Public Internet Protocol (IP) address space is a key factor in the size and growth of Internet data centers. IP addressing space decisions affect how many servers can be hosted at a data center, and they influence the kind of network connectivity technology that will be used and even how web sites are implemented. This paper d...
Article
Full-text available
This paper describes Intel's Internet connectivity architecture, including the business drivers that led to its creation and the technology developed to build and maintain it. Intel's first Internet connection was a 2400 bit per second modem used to pick up and deliver e-mail for a small community of engineers and researchers. With the advent of th...
Conference Paper
Full-text available
Managing Internet firewalls that can failover between each other is quite a challenge. When those firewalls are geographically dispersed and have a small number of people to be maintain them, it becomes even more challenging. Intel Corporation has a small staff that manages several geographically dispersed Internet firewalls with failover requireme...
Article
Full-text available
Managing Internet firewalls that can failover between each other is quite a challenge. When those firewalls are geographically dispersed and have a small number of people to be maintain them, it becomes even more challenging. Intel Corporation has a small staff that manages several geographically dispersed Internet firewalls with failover requireme...
Conference Paper
Full-text available
Abstract Inan environment ,where ,Internet access is mission- critical, Intel has created the Internet Measurement and Control System (IMCS) with three objectives: 1) Devise quantitative measures,of Internet performance; 2)Monitor those metrics to detect performance ,prob- lems,before customers ,and employees ,start calling; and 3) Enable first lin...
Article
Intel's Intemet usage policy evolved from practically non-existant to explicitly defined - all in reaction to changing conditions and security threats. This paper covers the evolution of Intel Intemet access policy, a continual struggle to close the barn doors before the horses get out. Throughout the paper, we outline key lessons we have learned d...
Conference Paper
Full-text available
The World Wide Web (WWW) generates a significant and growing portion of traffic on the Internet. With the click of a mouse button, a person browsing on the WWW can generate megabytes of multimedia network traffic. WWW's growth and possible network impact merit a study of its traffic patterns, problems, and possible changes. This paper attempts to c...
Conference Paper
Full-text available
Internet access is increasingly critical to organizations and individuals [1]. With the current boom in Internet Service Providers (ISPs), how does one judge one vendor from another? LACHESIS* is a tool that provides a way to benchmark ISPs. LACHESIS takes a list of prominent Internet Landmarks and determines the packet loss and network latency inv...
Conference Paper
Full-text available
Intel's Intemet usage policy evolved from practically non-existant to explicitly defined - all in reaction to changing conditions and security threats. This paper covers the evolution of Intel Intemet access policy, a continual struggle to close the barn doors before the horses get out. Throughout the paper, we outline key lessons we have lear...
Conference Paper
Full-text available
Providing a networked information resource in a multivendor, multiprotocol environment is a challenging task. Intel's network has four major network environments, each corresponding to functional areas with the company. Each of the four functional areas - design engineering, manufacturing, sales and marketing, and administration - has its own netwo...
Conference Paper
Full-text available
Fourier transform infrared spectrophotometry (FTIR) is a valuable technique for monitoring thin films used in semiconductor device manufacture. Determinations of the constituent contents in borophosphosilicate (BPSG), phosphosilicate (PSG), silicon oxynitride (SiON:H,OH), and spin-on-glass (SOG) thin films are a few applications. Due to the nature...

Questions

Questions (2)

Network

Cited By

Projects

Projects (6)
Project
Produce next iteration of the CMM Cloud Maturity Model
Archived project
Explore the issues of Cloud Computing in the Enterprise, including security and other distributed computing problems like big Data
Archived project
This project implemented and managed Internet connectivity. Internet connectivity was originally part of our research group's efforts to have better communications between internal and external researchers. It expanded to exploring, implementing, and maintaining Internet connectivity, security, and other services that could benefit the our company and other organizations.