| 10855659 |
Commanding a new device into a provisioning state |
Fred Allison Bower, III |
2020-12-01 |
| 10853462 |
Authorizing file access with user I/O and hardware usage patterns |
John M. Petersen, Shareef F. Alshinnawi, Ajay Dholakia |
2020-12-01 |
| 10853089 |
Dynamically loading firmware based on geographic location |
Paul T. Artman |
2020-12-01 |
| 10831349 |
Implementing automated personalized, contextual alert displays |
Christopher J. Hardee, Sarbajit K. Rakshit, Adam Roberts |
2020-11-10 |
| 10819607 |
Reducing power consumption of a compute node experiencing a bottleneck |
Srihari V. Angaluri, Ajay Dholakia, Chulho Kim |
2020-10-27 |
| 10819681 |
Content filtering with temporary privilege escalation responsive to a predetermined environmental condition |
Heather Cudak, Nathan J. Peterson, Bryan L. Young, Jennifer Lee-Baron, John Scott Crowe +1 more |
2020-10-27 |
| 10810212 |
Validating provided information in a conversation |
Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young, Jennifer Lee-Baron, John Scott Crowe |
2020-10-20 |
| 10768699 |
Presentation to user of indication of object at which another person is looking |
Nathan J. Peterson, John Scott Crowe, Jennifer Lee-Baron |
2020-09-08 |
| 10765041 |
Automatically cooling computer system components for safe servicing |
Shareef F. Alshinnawi, Jeffrey S. Holland, Bejoy J. Kochuparambil, Aparna Vallury |
2020-09-01 |
| 10764321 |
Identifying and remediating at-risk resources in a computing environment |
Fred Allison Bower, III, Ajay Dholakia, William G. Holland, Scott Kelso |
2020-09-01 |
| 10699014 |
Preventing connecting to a locked device |
Amy Leigh Rose, John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson |
2020-06-30 |
| 10701202 |
Control of notifications on a mobile communication device based on driving conditions |
John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young |
2020-06-30 |
| 10694043 |
Allowing access to a device responsive to secondary signals previously associated with authorized primary input |
Shareef F. Alshinnawi, Joseph F. Herman, J. Mark Weber |
2020-06-23 |
| 10678853 |
Aligning visual content to search term queries |
Lydia M. Do, Christopher J. Hardee, Adam Roberts |
2020-06-09 |
| 10673641 |
Connecting to a conference device |
Amy Leigh Rose, John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Bryan L. Young |
2020-06-02 |
| 10666065 |
Regulating battery cells |
John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young |
2020-05-26 |
| 10620967 |
Context-based program selection |
Amy Leigh Rose, John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Bryan L. Young |
2020-04-14 |
| 10616064 |
Soft reservation techniques and systems for virtualized environments |
Nagananda Chumbalkar, Srihari V. Angaluri, Ajay Dholakia |
2020-04-07 |
| 10595086 |
Selection and display of differentiating key frames for similar videos |
Lydia M. Do, Christopher J. Hardee, Adam Roberts |
2020-03-17 |
| 10594862 |
Contextual contact substitution for mobile devices |
Christopher J. Hardee, Sarbajit K. Rakshit, Adam Roberts |
2020-03-17 |
| 10592659 |
Computing device application program behavior profile |
John Scott Crowe, Jennifer Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young |
2020-03-17 |
| 10580115 |
Scaling content on touch-based systems |
Lydia M. Do, Christopher J. Hardee, Adam Roberts |
2020-03-03 |
| 10552229 |
Systems and methods for determining placement of computing workloads within a network |
Shareef F. Alshinnawi, Ajay Dholakia, John M. Petersen |
2020-02-04 |
| 10552600 |
Securing a media storage device using application authority assignment |
John M. Petersen, Shareef F. Alshinnawi, Ajay Dholakia |
2020-02-04 |