| 9811370 |
Determining an optimal datacenter for placing a resource instance in a cloud that would benefit an intended set of end users in a geographical region |
Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang |
2017-11-07 |
| 9813423 |
Trust-based computing resource authorization in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-11-07 |
| 9787717 |
Intelligent security analysis and enforcement for data transfer |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-10-10 |
| 9781020 |
Deploying applications in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-10-03 |
| 9781220 |
Identity management in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-10-03 |
| 9756060 |
Security management in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-09-05 |
| 9722964 |
Social media message delivery based on user location |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-08-01 |
| 9722963 |
Social media message delivery based on user location |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-08-01 |
| 9680715 |
Assessing a service offering in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-06-13 |
| 9654358 |
Managing user privileges for computer resources in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-05-16 |
| 9584491 |
Intelligent security analysis and enforcement for data transfer |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-02-28 |
| 9569476 |
Intelligent data routing and storage provisioning |
Ryan G. DeJana, Lisa Seacat DeLuca, Brian D. Goodman |
2017-02-14 |
| 9565206 |
Security management in a networked computing environment |
Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang |
2017-02-07 |