Issued Patents All Time
Showing 426–450 of 523 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8988983 | Managing failure behavior for computing nodes of provided computer networks | — | 2015-03-24 |
| 8973108 | Use of metadata for computing resource access | Gregory Branchek Roth, Kevin Ross O'Neill, Brian Irl Pratt, Bradley Jeffery Behm, Nathan R. Fitch | 2015-03-03 |
| 8972603 | Managing encoded multi-part communications | — | 2015-03-03 |
| 8966622 | Techniques for protecting against denial of service attacks near the source | Andrew Bruce Dickinson | 2015-02-24 |
| 8966037 | Measuring spread of compute capacity | Jacob Shannan Carr, Christopher Richard Jacques de Kadt | 2015-02-24 |
| 8966027 | Managing replication of computing nodes for provided computer networks | Kevin Christopher Miller, Andrew J. Doane | 2015-02-24 |
| 8959633 | Detecting anomalous behavior patterns in an electronic environment | Aaron Douglas Dokey, Ian Roger Searle | 2015-02-17 |
| 8955149 | Impersonation authorizations | Graeme David Baer, Gregory Branchek Roth | 2015-02-10 |
| 8954978 | Reputation-based mediation of virtual control planes | Marvin M. Theimer | 2015-02-10 |
| 8954574 | Best practice analysis, migration advisor | Mahendra Manshi Chheda, Shawn E. Heidel, Robert B. Jaye, Justin K. Brindley-Koonce | 2015-02-10 |
| 8937960 | Managing communications for modified computer networks | Daniel Cohn, Andrew J. Doane | 2015-01-20 |
| 8938775 | Dynamic data loss prevention in a multi-tenant environment | Gregory Branchek Roth, Graeme David Baer | 2015-01-20 |
| 8931107 | Techniques for generating block level data captures | — | 2015-01-06 |
| 8924982 | Managing private use of program execution capacity | James Alfred Gordon Greenfield | 2014-12-30 |
| 8924542 | Methods and apparatus for scalable private services | Jacob Gabrielson | 2014-12-30 |
| 8918785 | Managing virtual machine network through security assessment | Donald L. Bailey | 2014-12-23 |
| 8892865 | Multiple authority key derivation | Gregory Branchek Roth, Marc R. Barbour, Bradley Jeffery Behm, Cristian M. Ilac | 2014-11-18 |
| 8873735 | Selective contact between customers and customer service agents | Andrew J. Doane | 2014-10-28 |
| 8869135 | Deploying updates to an application during periods of off-peak demand | Joseph E. Fitzgerald, Marvin M. Theimer, Benjamin Warren Mercier | 2014-10-21 |
| 8868766 | Optimizing communication among collections of computing resources | Marvin M. Theimer | 2014-10-21 |
| 8856957 | Federated identity broker | Gregory Branchek Roth, Kevin Ross O'Neill, Eric D. Crahen, Cristian M. Ilac | 2014-10-07 |
| 8850419 | Descaling computing resources | Joseph E. Fitzgerald, Marvin M. Theimer, Benjamin Warren Mercier | 2014-09-30 |
| 8844020 | Establishing secure remote access to private computer networks | Andrew J. Doane | 2014-09-23 |
| 8839222 | Selecting updates for deployment to a programmable execution service application | Joseph E. Fitzgerald, Marvin M. Theimer, Benjamin Warren Mercier | 2014-09-16 |
| 8813225 | Provider-arbitrated mandatory access control policies in cloud computing environments | Erik J. Fuller, Christopher J. Lefelhocz, Arijit Ganguly, Eric W. Schultze | 2014-08-19 |