A method for upgrading one or more security applications, e.g., anti-spam,
anti-virus, intrusion detection/prevention. The method includes deriving
a second hardware logic from a security knowledge base. The method
includes operating a computing system including a security device. The
computer system is coupled to the one or more computer networks, e.g.,
local area networks, wide area networks, Internet. The security device
has one or more security logic processors, which include one or more
respective first hardware logic. The method transfers an FPGA image
representative of at least the second hardware logic through the computer
network to one or more first memory devices. The method includes
temporarily halting one or more of the security logic processors at a
predetermined portion of the stream of information according to a
specific embodiment. The method includes loading the second hardware
logic onto the one or more security logic processors while the one or
more security logic processors have been paused. The method resumes the
operation of the one or more security logic processors.