| 11036575 |
Software handling of errors |
Kerry Wayne Johnson |
2021-06-15 |
| 10848520 |
Managing access to resources |
Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse |
2020-11-24 |
| 10600146 |
Symbology monitoring system |
Patrick Christopher Lee |
2020-03-24 |
| 10509692 |
Loosely-coupled lock-step chaining |
Kerry Wayne Johnson, Peter Shook |
2019-12-17 |
| 10417077 |
Software handling of hardware errors |
Kerry Wayne Johnson |
2019-09-17 |
| 9799009 |
Method and system for determining exposures presented by an orchestrated process |
John Bell, Raymond Bruce Wallace, Laurence A. J. Beaulieu |
2017-10-24 |
| 9720915 |
Presenting metadata from multiple perimeters |
Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse |
2017-08-01 |
| 9613219 |
Managing cross perimeter access |
Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse |
2017-04-04 |
| 8799227 |
Presenting metadata from multiple perimeters |
Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse |
2014-08-05 |
| 6741572 |
Architectures for communication networks |
Alan Graves |
2004-05-25 |
| 6731990 |
Predicting values of a series of data |
Malcolm Edward Carter, Otakar Fojt, Michael Maurice Dodson, Jason Levesley |
2004-05-04 |
| 6282170 |
Network restoration routing optimization |
Mark Bentall, Brian Charles Hargrave Turton |
2001-08-28 |