| 11502824 |
Encryption by default in an elastic computing system |
Sandeep Kumar, Danny Wei, Varun Verma, Oscar Allen Grim Courchaine, Kristina Kraemer Brenneman +2 more |
2022-11-15 |
| 11204811 |
Methods and systems for estimating time remaining and right sizing usable capacities of resources of a distributed computing system |
Rachil Chandran, Keshav Mathur, James-Christian F. Ang, Kien Chiew Wong, Leah Nutman |
2021-12-21 |
| 11080093 |
Methods and systems to reclaim capacity of unused resources of a distributed computing system |
Rachil Chandran, Harutyun Beybutyan, James-Christian F. Ang, Leah Nutman, Keshav Mathur |
2021-08-03 |
| 11032156 |
Crash-consistent multi-volume backup generation |
Sandeep Kumar, Ankit Singh, James Pinkerton, Marc Stephen Olson |
2021-06-08 |
| 10924275 |
Creating multiple encrypted volumes from a single source |
Sandeep Kumar, Arvind Chandrasekar, James Pinkerton, Marc Stephen Olson, Danny Wei +1 more |
2021-02-16 |
| 10867052 |
Encryption intermediary for volume creation |
Sandeep Kumar, Arvind Chandrasekar, Danny Wei, Pavan Kumar Korlepara, Marc Stephen Olson |
2020-12-15 |
| 10817203 |
Client-configurable data tiering service |
Manu Anand, Aman Singhal, Visakh Sakthidharan Nair, Ajit Balachandran, Kumar Shubhankar |
2020-10-27 |
| 10728025 |
Encryption by default in an elastic computing system |
Sandeep Kumar, Danny Wei, Varun Verma, Oscar Allen Grim Courchaine, Kristina Kraemer Brenneman +2 more |
2020-07-28 |
| 7930051 |
Move lot size balancing system and method |
David B. Adair, James V. Burrell, Charles Chao, Mohan K. Gupta, Melissa Hirota +9 more |
2011-04-19 |
| 7376477 |
Move lot size balancing system and method |
Dave B. Adair, James V. Burrell, Charles Chao, Mohan K. Gupta, Melissa Hirota +9 more |
2008-05-20 |
| 6047325 |
Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks |
Michael Ford |
2000-04-04 |
| 6041347 |
Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network |
Bret Harsham |
2000-03-21 |