Issued Patents 2018
Showing 25 most recent of 38 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10162963 | Malware detection and identification using deviations in one or more operating parameters | Paul T. Artman, Tristian T. Brown, Christopher L. Wood | 2018-12-25 |
| 10146979 | Processing visual cues to improve device understanding of user input | Shareef F. Alshinnawi, Jeffrey S. Holland, Pradeep Ramineni | 2018-12-04 |
| 10116711 | Determining and providing data related to collaboration event | Joseph F. Herman, William James Sommerville, Laura A. Weaver | 2018-10-30 |
| 10116594 | Provisioning of a server using a virtual local area network | Fred Allison Bower, III | 2018-10-30 |
| 10102041 | Controlling workload placement to manage wear of a component nearing end of life | Paul T. Artman, Fred Allison Bower, III, Ajay Dholakia | 2018-10-16 |
| 10097150 | Systems and methods to increase volume of audio output by a device | Nathan J. Peterson, Jennifer Lee-Baron, Amy Leigh Rose, John Scott Crowe | 2018-10-09 |
| 10097571 | Tracking cloud workloads to isolate security breach exposure | Fred Allison Bower, III, Ajay Dholakia, William G. Holland, Scott Kelso | 2018-10-09 |
| 10095503 | File usability based on a system configuration | Nagananda Chumbalkar, Nathan J. Peterson | 2018-10-09 |
| 10063604 | Systems and methods for facilitating video communication using virtual avatars | John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young | 2018-08-28 |
| 10063589 | Microcheckpointing as security breach detection measure | Ajay Dholakia, Scott Kelso, Fred Allison Bower, III | 2018-08-28 |
| 10055175 | Parsing a multidimensional object for printing in various runs | David G. Dean, Christopher J. Hardee, John P. Nuzzo, Matthew A. Trzyna, John M. Weber | 2018-08-21 |
| 10051128 | Rerouting electronic communications to trusted user's device while a primary user is occupied | Nathan J. Peterson, Amy Leigh Rose, John Scott Crowe, Bryan L. Young, Jennifer Lee-Baron | 2018-08-14 |
| 10044652 | Context driven modification of attachments in a messaging session | Lydia M. Do, Christopher J. Hardee, Adam Roberts | 2018-08-07 |
| 10043507 | Dynamic positioning of fans to reduce noise | Bryan L. Young, Amy Leigh Rose, Jennifer Lee-Baron, John Scott Crowe, Nathan J. Peterson | 2018-08-07 |
| 10027597 | Collaborative route reservation and ranking in high performance computing fabrics | Christopher J. Hardee, Jarrod B. Johnson, Bryan M. Reese | 2018-07-17 |
| 9996521 | Validation of formulas with external sources | Christopher J. Hardee, Adrian X. Rodriguez | 2018-06-12 |
| 9998404 | Automatically orienting hardware ports in a computing device | Shareef F. Alshinnawi, Edward S. Suffern, J. Mark Weber | 2018-06-12 |
| 9977631 | Parsing a multidimensional object for printing in various runs | David G. Dean, Christopher J. Hardee, John P. Nuzzo, Matthew A. Trzyna, John M. Weber | 2018-05-22 |
| 9959133 | Identification and removal of zombie virtual machines | Jennifer Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young, John Scott Crowe | 2018-05-01 |
| 9958927 | Selecting active power supplies based on power supply cable length | Luke D. Remis, Brian C. Totten, Michael DeCesaris | 2018-05-01 |
| 9954726 | Controlling networking device temperatures by reducing data transfer rates from associated nodes | Shareef F. Alshinnawi, Jeffrey S. Holland, Mark McCool, Pradeep Ramineni | 2018-04-24 |
| 9940156 | Decreasing hardware resource amount assigned to virtual machine as utilization of hardware resource decreases below a threshold | John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young | 2018-04-10 |
| 9942473 | Apparatuses and methods for capture of expected data in visual media | Shareef F. Alshinnawi, Brian E. Finley, David R. Kinnie, Marc Fisher, Jamie Johnston | 2018-04-10 |
| 9940688 | Video adapter alignment | Shareef F. Alshinnawi, Samuel Fanchiang, Edward S. Suffern, John M. Weber | 2018-04-10 |
| 9935931 | Authorizing user access to resource by determining whether other, authorized users have indicated that the user should be permitted access | David D. Chudy, James G. McLean, Cristian Medina | 2018-04-03 |