| 9515879 |
Establishing an action list for reconfiguration of a remote hardware system |
David D. Chudy, Cristian Medina, Michael T. Shelton |
2016-12-06 |
| 9443221 |
Physical location tagging via image recognition |
David D. Chudy, Cristian Medina, Michael T. Shelton |
2016-09-13 |
| 9438611 |
Managing a blocked-originator list for a messaging application |
David Wayne Glass, Clifford A. Pickover, Daniel J. Winarski |
2016-09-06 |
| 9412095 |
Status and time-based delivery services for instant messengers |
William G. Pagan |
2016-08-09 |
| 9363934 |
Controlling access to components in a server housing to enforce use of a grounding strap |
Keith M. Campbell, William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood |
2016-06-07 |
| 9304860 |
Arranging data handling in a computer-implemented system in accordance with reliability ratings based on reverse predictive failure analysis in response to changes |
Clifford A. Pickover, Daniel J. Winarski |
2016-04-05 |