| 11070374 |
Methods and systems that efficiently and securely store encryption keys |
Ittai Abraham, Yotam Harchol |
2021-07-20 |
| 11057209 |
Methods and systems that efficiently and securely store data |
Ittai Abraham, Yotam Harchol |
2021-07-06 |
| 11003377 |
Transactions in a decentralized control plane of a computing system |
Georgios Chrysanthakopoulos, Pieter Noordhuis, Dahlia Malkhi, Nikos Vasilakis |
2021-05-11 |
| 10970057 |
Methods and apparatus to generate a customized application blueprint |
Lital Hassine, Avshi Avital |
2021-04-06 |
| 10678585 |
Methods and apparatus to automatically configure monitoring of a virtual machine |
Dan Zada, Mayan Weiss, Amir Wiener, Ella Rozanov |
2020-06-09 |
| 10127069 |
Methods and apparatus to automatically configure monitoring of a virtual machine |
Dan Zada, Mayan Weiss, Amir Wiener, Ella Rozanov |
2018-11-13 |
| 9678731 |
Methods and apparatus to generate a customized application blueprint |
Lital Hassine, Avshi Avital |
2017-06-13 |
| 9519513 |
Methods and apparatus to automatically configure monitoring of a virtual machine |
Dan Zada, Mayan Weiss, Amir Wiener, Ella Rozanov |
2016-12-13 |
| 9317387 |
Methods and systems for reducing metrics used to monitor resources |
— |
2016-04-19 |
| 9268592 |
Methods and apparatus to generate a customized application blueprint |
Lital Hassine, Avshi Avital |
2016-02-23 |
| 8997196 |
Flexible end-point compliance and strong authentication for distributed hybrid enterprises |
Oleg Ananiev, Eli Tovbeyn, Daniel Kershaw, Eugene (John) Neystadt |
2015-03-31 |
| 7778959 |
Protecting storages volumes with mock replication |
Robert M. Fries, Shiraz Somji |
2010-08-17 |
| 7698593 |
Data protection management on a clustered server |
— |
2010-04-13 |