| 12218980 |
Using an end-to-end policy controller to split policies between enforcement points in a network |
Andrew E. Ossipov, Robert Tappenden, Janardhanan Radhakrishnan |
2025-02-04 |
| 9609501 |
Managed access to mobile endpoints |
Kiritkumar B. Joshi, Viren K. Malaviya, Anand Oswal, Sachin Gorde |
2017-03-28 |
| D757697 |
Router |
Craig Donald Dubrule, Mahbubul Alam, Hugo J. W. Vliegen |
2016-05-31 |
| 9152465 |
Prioritzed branch computing system |
Huseni Saboowala, Anand Oswal |
2015-10-06 |
| D728539 |
Router |
Craig Donald Dubrule, Mahbubul Alam, Hugo J. W. Vliegen |
2015-05-05 |
| 8891552 |
Managed access to mobile endpoints |
Kiritkumar B. Joshi, Viren K. Malaviya, Anand Oswal, Sachin Gorde |
2014-11-18 |
| 8780796 |
System and method for providing network initiated mobile access in a network environment |
Dhiraj D. Ballal, Sachin Gorde, Kiritkumar B. Joshi, Virendra Malaviya |
2014-07-15 |
| 8581728 |
Inventory devices and methods |
Arthur G. Howarth, Prasad Miriyala |
2013-11-12 |
| 8391218 |
Multiple routable IP addresses for a cellular router |
Kiritkumar B. Joshi, Virendra Malaviya, Sachin Gorde, Vikas Butaney |
2013-03-05 |
| 8355041 |
Telepresence system for 360 degree video conferencing |
Wen-hsiung Chen, Patrik Buckingham, Prasad Miriyala |
2013-01-15 |
| 8212674 |
Inventory devices and methods |
Arthur G. Howarth, Prasad Miriyala |
2012-07-03 |
| 8063782 |
Remote inventory of devices |
Prasad Miriyala, Arthur G. Howarth, Roland Saville |
2011-11-22 |
| 7786861 |
Detecting theft and disabling stolen equipment |
Arthur G. Howarth, Roland Saville, Prasad Miriyala |
2010-08-31 |