128 Technology | Date: 2015-08-24
An intermediate node obtains a lead packet of a plurality of packets in a session having a unique session identifier, modifies the lead packet to identify at least the intermediate node and also to identify source and destination port numbers assigned by the intermediate node for a possible forward association, and then forwards the lead packet toward the destination node though an intermediate node electronic output interface to the IP network. The intermediate node also may receive, through an intermediate node electronic input interface in communication with the IP network, a backward message from a next node having a next node identifier. Both the intermediate node and the next node form an association between the intermediate node identifier, the next node identifier, and the source and destination port numbers assigned by the intermediate node. This association is part of a forward association for the intermediate node and is part of a return associate for the next node.
News Article | April 26, 2017
G20 Ventures today announced the addition of Michael Troiano to its team, joining fund Co-Founder Partners Bob Hower and Bill Wiberg in the role of Partner. Troiano was already a G20 Member and Limited Partner in the firm’s debut - a $63 million fund closed in late 2013 - whose holdings now include stakes in 128 Technology, Bidtellect, Emissary, Everage, Fuze, Mautic, and Siemplify. Troiano joins after a 5-year stint as Chief Marketing Officer of Waltham-based Actifio, a global enterprise data-as-a-service provider he helped turn from an obscure virtualization technology provider into a category-creating venture capital "unicorn" valued at over $1 Billion. He will continue to play a strategic advisory role at Actifio, but will leave his day-to-day operating responsibilities at the company. He spent his early career at top worldwide ad agencies including McCann-Erickson and FCB, and was named the founding CEO of Ogilvy & Mather Interactive in 1995. He later served as the president of NASDAQ-listed systems integrator Primix, and as General Manager of mobile content pioneer m-Qube from inception through one of the largest Boston-based venture capital exits of 2006. He is a graduate of Cornell University and the Harvard Business School, a TechStars mentor, and a Board Member of the New England Venture Capital Association. Mike is ranked in the top 1% of the most influential people on Twitter and among the most popular writers on venture capital and entrepreneurship on Medium, and hosts the popular Boston startup community podcast, How Hard Can It Be? “Mike has added value to every company in the G20 portfolio,” said G20 Ventures Co-founder Bob Hower. “Bill and I could not be more excited to welcome him as a Partner in the firm. His ability to help entrepreneurs tell their stories more effectively is nothing short of remarkable, as are his entrepreneurial instincts, executive-level operating experience, and personal brand in Boston and beyond.” G20 Ventures was founded by Hower and Bill Wiberg, partners at Advanced Technology Ventures in Boston, in 2013. It was the first of the “Active Membership” funds, bringing together a group of elite entrepreneurs to apply their expertise and networks in service to portfolio companies. G20 Members participate in the value they create, both as LPs representing a third of the fund, and through participation in the fund’s carry, a share of fund profits typically reserved for fund managers. “I’ve spent my whole career helping entrepreneurs win, either in an agency or an operating role,” said Troiano. “Despite what I know will be a learning curve on the other side of the table, I view this step as a continuation of that work... just with a better business model." G20 Ventures provides early traction capital for East Coast enterprise tech startups, backed by the power and expertise of 20 of the Northeast's most accomplished entrepreneurs. For more, visit g20vc.com or follow us on Twitter @G20Ventures.
128 Technology | Date: 2015-12-09
A method has provides a router having an input, an output, and a shared memory. The router also has a forwarding path to forward a plurality of packets from the input to the output, and a service path to manage statistical data relating to packets forwarded through the forwarding path. The forwarding path has a counter to count aggregate packet information relating to the plurality of packets it forwards. Next, the method counts, using the counter(s), aggregate packet information relating to the packets forwarded through the forwarding path to produce count information. After producing the count information, the method uses the forwarding path to store the count information in the shared memory of the router, and then causes the service path to retrieve the count information from the shared memory. The service path ultimately produces statistical information using the count information retrieved from the shared memory.
Agarwal S.,128 Technology |
Venkateswara Rao P.,Indian Institute of Technology Delhi
International Journal of Machine Tools and Manufacture | Year: 2010
Surface quality of workpiece during ceramic grinding is an ever-increasing concern in industries now-a-days. Every industry cares to produce products with supposedly better surface finish. The importance of the surface finish of a product depends upon its functional requirements. Since surface finish is governed by many factors, its experimental determination is laborious and time consuming. So the establishment of a model for the reliable prediction of surface roughness is still a key issue for ceramic grinding. In this study, a new analytical surface roughness model is developed on the basis of stochastic nature of the grinding process, governed mainly by the random geometry and the random distribution of cutting edges on the wheel surface having random grain protrusion heights. A simple relationship between the surface roughness and the chip thickness was obtained, which was validated by the experimental results of silicon carbide grinding. © 2010 Elsevier Ltd. All Rights reserved.
Agarwal S.,128 Technology |
Rao P.V.,Indian Institute of Technology Delhi
International Journal of Machine Tools and Manufacture | Year: 2013
The grinding force and power play an important role in ceramic grinding process as they not only have the direct influence on the wheel wear, grinding accuracy, grinding temperature and surface integrity but also have strong influence on local contact deflection and the nature of the contact deflection that has an important effect on the mechanism of material removal. In addition, they are also important to many aspects of ceramic grinding process optimization, monitoring, and control. So the prediction of grinding force and power in ceramic grinding is essential. But, the force and power is governed by many factors and its experimental determination is laborious and time consuming. So the establishment of a model for the reliable prediction of grinding force and power is still a key issue for ceramic grinding. In this study, a new grinding force and power model is developed, for the reliable prediction of grinding force and power in ceramic grinding, based on a new analytical undeformed chip thickness model. This new analytical undeformed chip thickness model is developed on the basis of stochastic nature of the grinding process, governed mainly by the random geometry and the random distribution of cutting edges. The model includes the real contact length that results from combined contact length, due to wheel-workpiece contact zone deflection and the local deflection due to the microscopic contact at the grain level and contact length due to geometry of depth of cut. The proposed model is used to predict the total grinding forces and power in surface grinding. The new model has been validated by conducting experiments on a horizontal surface grinding machine by grinding silicon carbide with diamond grinding wheel. Results indicate that the proposed model shows a good agreement with the experimental data obtained from different kinematic conditions. It also results in a significant reduction in the grinding forces, as compared with that obtained by the force model developed based on the existing undeformed chip thickness model, under the same operating conditions, in silicon carbide grinding. © 2012 Elsevier Ltd. All rights reserved.
Kumar K.,128 Technology |
Agarwal S.,128 Technology
International Journal of Advanced Manufacturing Technology | Year: 2012
The selection of optimum machining conditions, during wire electric discharge machining process, is of great concern in manufacturing industries these days. The increasing quality demands, at higher productivity levels, require the wire electric discharge machining process to be executed more efficiently. Specifically, the material removal rate needs to be maximized while controlling the surface quality. Despite extensive research on wire electric discharge machining process, determining the desirable operating conditions in industrial setting still relies on the skill of the operators and trial-and-error methods. In the present work, an attempt has been made to optimize the machining conditions for maximum material removal rate and maximum surface finish based on multi-objective genetic algorithm. Experiments, based on Taguchi's parameter design, were carried out to study the effect of various parameters, viz. pulse peak current, pulse-on time, pulse-off time, wire feed, wire tension and flushing pressure, on the material removal rate and surface finish. It has been observed that a combination of factors for optimization of each performance measure is different. So, mathematical models were developed between machining parameters and responses like metal removal rate and surface finish by using nonlinear regression analysis. These mathematical models were then optimized by using multi-objective optimisation technique based on Non-dominated Sorting Genetic Algorithm-II to obtain a Pareto-optimal solution set. © Springer-Verlag London Limited 2011.
128 Technology | Date: 2014-09-26
An intermediate node obtains a lead packet of a plurality of packets in a session having a unique session identifier, modifies the lead packet to identify at least the intermediate node, and then forwards the lead packet toward the destination node though an intermediate node electronic output interface to the IP network. The intermediate node also receives, through an intermediate node electronic input interface in communication with the IP network, a backward message from a next node having a next node identifier. The backward message includes the next node identifier and the session identifier. The intermediate node forms an association between the next node identifier and the session identifier, stores the association in memory to maintain state information for the session, and obtains (e.g., receives) additional packets of the session. Substantially all of the additional packets in the session are forwarded toward the next node using the stored association.
128 Technology | Date: 2015-03-17
A method of routing data across a network receives a session request from a client node to access at least one node in a local network having a plurality of nodes. The method also receives a client certificate (e.g., a digital certificate at least partially specified by known standards, such as the X509 Standard) from the client node. The client certificate has client information specifying at least one node to receive packets from the client node. Next, the method uses the client certificate to execute an authentication process. If the authentication process authenticates the client node, then the method routes data packets from the client node to at least one node in the local network as specified by the client information in the client certificate.
128 Technology | Date: 2015-05-18
A method processes a session having a first session packet received by a current node in an IP network having a plurality of nodes. The plurality of nodes includes a next node, and the current node that communicates with the next node using a Layer 3 protocol. The method receives the first session packet, which has a digital signature, payload data, and meta-data, at the current node. The method uses the payload data and meta-data to produce validation information, and uses the digital signature to produce a comparator digital signature. Next, the method compares the validation information with the comparator digital signature. If the validation information does not match the comparator digital signature, then the method discards the first session packet. If there is a match, then the method digitally signs the first session packet, and routes the first session packet to the next node via the IP network.
128 Technology | Date: 2014-12-08
A packet routing method for directing packets of a session in an IP network causes an intermediate node to obtain a lead packet of a plurality of packets in a given session. The intermediate node has an electronic interface in communication with the IP network and obtains the lead packet through that same interface. The method maintains, in a routing database, state information relating to a plurality of sessions in the IP network. Each session includes a single stateful session path formed by an ordered plurality of nodes in the IP network, and the state information includes information about the ordered plurality of nodes in the sessions. The method further accesses the routing database to determine the state of a plurality of sessions, and forms a stateful given path for packets of the given session across the IP network as a function of the state information in the routing database.