McKinney, TX, United States of America

James W Ling


Average Co-Inventor Count = 4.6

ph-index = 1

Forward Citations = 6(Granted Patents)


Company Filing History:


Years Active: 2012-2020

Loading Chart...
7 patents (USPTO):

Title: Innovations of James W. Ling

Introduction

James W. Ling is a notable inventor based in McKinney, TX (US). He has made significant contributions to the field of technology, holding a total of seven patents. His work primarily focuses on network protection and efficiency.

Latest Patents

One of his latest patents involves a method for protecting a network from a unicast flood. This innovative approach ensures that if the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table. The frame is then forwarded to non-blocked spanning tree links to locate the MAC address within the network. If the MAC address is already in the table and a timer for suppressing frame forwarding is active, the frame is discarded. Conversely, if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter exceeds this threshold, the timer is activated, and the frame is discarded. If not, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.

Career Highlights

James W. Ling is currently employed at International Business Machines Corporation, commonly known as IBM. His role at IBM has allowed him to develop and refine his innovative ideas, contributing to the company's technological advancements.

Collaborations

Throughout his career, James has collaborated with notable colleagues, including Robert K. Floyd, III, and Roger Hoffmann. These collaborations have fostered an environment of innovation and creativity, leading to the development of impactful technologies.

Conclusion

James W. Ling's contributions to network protection and his innovative patents highlight his significant role in the technology sector. His work continues to influence advancements in network security and efficiency.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…