Issued Patents All Time
Showing 226–250 of 283 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8966196 | Cloud management of device memory based on geographical location | John A. Feller, Trudy L. Hewitt, Francesco C. Schembari | 2015-02-24 |
| 8949556 | Cloud management of device memory based on geographical location | John A. Feller, Trudy L. Hewitt, Francesco C. Schembari | 2015-02-03 |
| 8949629 | Predicting battery power usage | Itzhack Goldberg, Liam Harpur, John Rice | 2015-02-03 |
| 8943432 | Dynamically configurable portlet | Adam Cook, Ryan E. Smith | 2015-01-27 |
| 8930906 | Selectively allowing changes to a system | Bernadette A. Carter, Lori Debra Landesman | 2015-01-06 |
| 8925060 | Selecting image or video files for cloud storage | John A. Feller, Trudy L. Hewitt, Francesco C. Schembari | 2014-12-30 |
| 8914658 | Hibernation during meetings | Itzhack Goldberg, Liam Harpur, John Rice | 2014-12-16 |
| 8898230 | Predicting availability of instant messaging users | Patrick J. O'Sullivan, Sean Callanan, Michael Muller | 2014-11-25 |
| 8881152 | Working sets of sub-application programs of application programs currently running on computing system | Yongcheng Li, Yuping Wu | 2014-11-04 |
| 8880622 | Message thread management using dynamic pointers | Feng-wei Chen, Heng Chu, Chad Smith | 2014-11-04 |
| 8873771 | Automatic volume adjustment | Bernadette A. Carter, Oriana Jeannette Love | 2014-10-28 |
| 8874675 | Message thread management using dynamic pointers | Feng-wei Chen, Heng Chu, Chad Smith | 2014-10-28 |
| 8856945 | Dynamic security question compromise checking based on incoming social network postings | Bernadette A. Carter, Lori Debra Landesman | 2014-10-07 |
| 8856943 | Dynamic security question compromise checking based on incoming social network postings | Bernadette A. Carter, Lori Debra Landesman | 2014-10-07 |
| 8849760 | Determining whether predefined data controlled by a server is replicated to a client machine | David L. Kaminsky, David M. Ogle | 2014-09-30 |
| 8839392 | Selecting image or video files for cloud storage | John A. Feller, Trudy L. Hewitt, Francesco C. Schembari | 2014-09-16 |
| 8819573 | Acclimatizing a user to a scheduling pattern change | Liam Harpur, Mark Kelly, John Rice | 2014-08-26 |
| 8788309 | Application of cost constraints in event scheduling | Patrick J. O'Sullivan, Carol S. Zimmet, Colm Farrell, Liam Harpur | 2014-07-22 |
| 8738613 | Relevancy ranking of search results in a network based upon a user's computer-related activities | Maryam Ahmed, Matthew C. Hillary, Kimberly D. McCall, M. Scott Thomason | 2014-05-27 |
| 8719605 | Method for detecting a trigger to a program not actively being reviewed by the user and performing a power saving action without placing the device as a whole into a sleep state | Itzhack Goldberg, Liam Harpur, John Rice | 2014-05-06 |
| 8700759 | Autonomic optimization of presence server performance | David M. Ogle, Patrick J. O'Sullivan, Scott H. Snyder | 2014-04-15 |
| 8688691 | Relevancy ranking of search results in a network based upon a user's computer-related activities | Maryam Ahmed, Matthew C. Hillary, Kimberly D. McCall, M. Scott Thomason | 2014-04-01 |
| 8655958 | System and method to prioritize chat alerts based on an organizational hierarchical chain | Sean Callanan, Sonya Purcell, Hugh Smyth | 2014-02-18 |
| 8650256 | Communications security by enforcing offline consumption and auto-termination of electronic messages | Liam Harpur, Michelle M. Purcell, John Rice | 2014-02-11 |
| 8646086 | Image vulnerability repair in a networked computing environment | Christopher J. Dawson, Yu Deng, Rick A. Hamilton, II, Jenny S. Li, Liangzhao Zeng | 2014-02-04 |