| 11411968 |
Systems and methods for protecting a cloud computing device from malware |
Susan Hassall |
2022-08-09 |
| 11336639 |
Systems and methods for managing a need-to-know domain name system |
Leonid Belkind, Russell L. Daigle |
2022-05-17 |
| 11144656 |
Systems and methods for protection of storage systems using decoy data |
William Porr, Sahil Hasan |
2021-10-12 |
| 8738420 |
Method and apparatus for modeling satisfaction of a client |
— |
2014-05-27 |
| 8606823 |
Selecting an item from a cache based on a rank-order of the item |
Waynn Lue |
2013-12-10 |
| 8495238 |
Facilitating self-tuning traffic shaping without a central traffic manager |
Radhika Lakshmanan |
2013-07-23 |
| 8196128 |
System and method for providing a filtering classloader in a computer environment |
Srinagesh Susarla, Robert C. Woollen |
2012-06-05 |
| 7937297 |
RFID system using SOA |
Wayne Boland, Puneet Agarwal |
2011-05-03 |
| 7933962 |
Reducing reliance on a central data store while maintaining idempotency in a multi-client, multi-server environment |
Carmelo Kintana |
2011-04-26 |
| 7835954 |
Event boxcarring of RFID information sent from RFID edge server |
— |
2010-11-16 |
| 7805499 |
RFID edge server with security WSRM |
— |
2010-09-28 |
| 7660890 |
RFID edge server with socket multiplexing |
— |
2010-02-09 |
| 7503037 |
System and method for identifying bugs in software source code, using information from code coverage tools and source control tools to determine bugs introduced within a time or edit interval |
Michael Cico, Vishal Vishnoi |
2009-03-10 |
| 7495568 |
JMX administration of RFID edge server |
— |
2009-02-24 |
| 7394377 |
RFID edge server with security plug-ins |
— |
2008-07-01 |