| 9251476 |
Managing calendar conflicts |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2016-02-02 |
| 9197629 |
Remote direct memory access authentication of a device |
Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-11-24 |
| 9167069 |
Alternate notification selection |
Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-10-20 |
| 9160832 |
Alternate notification selection |
Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-10-13 |
| 9148395 |
Displaying message content differential in popup window |
Susann Marie Keohane, Shawn P. Mullen, Gerald Francis McBrearty, Johnny Meng-Han Shieh |
2015-09-29 |
| 9130987 |
Logical partition media access control impostor detector |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-09-08 |
| 9122867 |
Techniques for presenting password feedback to a computer system user |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-09-01 |
| 9111081 |
Remote direct memory access authentication of a device |
Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-08-18 |
| 9098625 |
Viral trace |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-08-04 |
| 9088609 |
Logical partition media access control impostor detector |
Susann Marie Koehane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2015-07-21 |
| 9043882 |
Integration of home security into existing infrastructure |
Susann Marie Keohane, Johnny Meng-Han Shieh |
2015-05-26 |
| 8856519 |
Start method for application cryptographic keystores |
Shawn P. Mullen, Johnny Meng-Han Shieh |
2014-10-07 |
| 8725874 |
Dynamic determination of an ideal client-server for a collaborative application network |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2014-05-13 |
| 8621052 |
Performance tuning for software as a performance level service |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2013-12-31 |
| 8607071 |
Preventing replay attacks in encrypted file systems |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2013-12-10 |
| 8589698 |
Integrity service using regenerated trust integrity gather program |
Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2013-11-19 |
| 8468209 |
Method of rescinding previously transmitted e-mail messages |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2013-06-18 |
| 8458320 |
Alerting a user to an occurrence of a specified event |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2013-06-04 |
| 8375425 |
Password expiration based on vulnerability detection |
Susann Marie Keohane, Gerald Francis McBrearty, Patrick Mullen, Johnny Meng-Han Shieh |
2013-02-12 |
| 8332760 |
Dynamically mapping chat session invitation history |
Susann Marie Keohane, Gerald Francis McBrearty, Johnny Meng-Han Shieh |
2012-12-11 |
| 8271056 |
Managing battery needs in a portable device |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2012-09-18 |
| 8271268 |
Method to translate, cache and transmit text-based information contained in an audio signal |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2012-09-18 |
| 8131671 |
Uninterrupted data access during the migration of data between physical file systems |
Shawn P. Mullen, Gerald Francis McBrearty, Johnny Meng-Han Shieh, Susann Marie Keohane |
2012-03-06 |
| 8041680 |
Backing up a database |
Susann Marie Keohane, Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2011-10-18 |
| 8036926 |
Techniques for selecting calendar events by examining content of user's recent e-mail activity |
Gerald Francis McBrearty, Shawn P. Mullen, Johnny Meng-Han Shieh |
2011-10-11 |