Shanghai, China

Teng Hong


Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2023

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovator Spotlight: Teng Hong and His Contributions to Antivirus Technology

Introduction: Teng Hong is an accomplished inventor based in Shanghai, China, known for his innovative approach to antivirus solutions in computing environments. With a unique patent to his name, he has made significant strides in enhancing the security of clustered storage systems.

Latest Patents: Teng Hong holds a patent for the "NANON support for antivirus jobs in clustered storage." This invention outlines techniques for implementing antivirus scanning in clustered storage systems, where not all nodes are connected to an antivirus server. His design allows a primary computing node to assess the status of the antivirus server and communicate this information to a group management protocol service. This service subsequently informs a job engine about the availability of nodes for antivirus scanning, enabling efficient distribution of antivirus jobs across the cluster.

Career Highlights: Currently, Teng Hong is employed with EMC IP Holding Company LLC, where he continues to develop innovative solutions in the realm of cybersecurity. His contributions are invaluable to the company and the field of information technology, especially concerning data protection in clustered environments.

Collaborations: Throughout his career, Teng has collaborated with talented professionals, including Terry Stokes and Antony Richards. These partnerships have fostered a creative environment, allowing for the exchange of ideas and collaborative innovation.

Conclusion: Teng Hong's work exemplifies the impact of innovation in technology, particularly in enhancing cybersecurity measures within clustered storage systems. As the digital landscape continues to evolve, the contributions of inventors like Teng are crucial in ensuring the security and integrity of data across various computing environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…