| 12373608 |
Role-based component access control |
Manuel R. Hernandez Santos, Eric Maddocks Pettersen, Clifton E. Kerr, Christopher L. Wood, Steven L. Vanderlinden |
2025-07-29 |
| 11630137 |
Reliable hardware metering |
Samer El-Haj-Mahmoud, Sumeet Kochar |
2023-04-18 |
| 11601321 |
Data center management over a power plane |
Connor B. Reed, Christopher L. Wood |
2023-03-07 |
| 11474578 |
Data exchange using fan unit signal lines |
Christopher L. Wood, Connor B. Reed, Clifton E. Kerr |
2022-10-18 |
| 10244458 |
Controlling Wi-Fi access in a public location |
William M. Megarity, Luke D. Remis, Gregory D. Sellman |
2019-03-26 |
| 9961811 |
Controlling access to components in a server housing to enforce use of a grounding strap |
James G. McLean, William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood |
2018-05-01 |
| 9476929 |
Propagating pin corrections through physically mating devices |
Eric R. Kern, Caroline M. Metry |
2016-10-25 |
| 9450910 |
Network address allocation |
William M. Megarity, Luke D. Remis, Christopher L. Wood |
2016-09-20 |
| 9363934 |
Controlling access to components in a server housing to enforce use of a grounding strap |
James G. McLean, William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood |
2016-06-07 |
| 9311860 |
Liquid crystal display using backlight intensity to compensate for pixel damage |
William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood |
2016-04-12 |
| 9298662 |
Providing expansion card settings |
Patrick L. Caporale, Caroline M. Metry, Pravin Patel |
2016-03-29 |
| 9292210 |
Thermally sensitive wear leveling for a flash memory device that includes a plurality of flash memory modules |
William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood |
2016-03-22 |
| 9127813 |
Responding to moisture at one or more zones around an outer surface of a liquid-carrying pipe |
Vinod Kamath, Christopher L. Wood |
2015-09-08 |
| 9047190 |
Intrusion protection for a client blade |
Raymond T. Greggs, James G. McLean, Caroline M. Metry, Edward S. Suffern |
2015-06-02 |
| 9002010 |
Secure communication of information over a wireless link |
Rajiv N. Kantesaia, William G. Pagan, Marc V. Stracuzza, Michael N. Womack |
2015-04-07 |
| 8769812 |
Propagating pin corrections through physically mating devices |
Eric R. Kern, Caroline M. Metry |
2014-07-08 |
| 8769088 |
Managing stability of a link coupling an adapter of a computing system to a port of a networking device for in-band data communications |
Patrick L. Caporale, Caroline M. Metry, Pravin Patel |
2014-07-01 |
| 8365176 |
Data center job migration and scheduling based on server chassis fan speed threshold |
Jeffery M. Franke, John K. Whetzel |
2013-01-29 |
| 8201266 |
Security system to prevent tampering with a server blade |
Raymond T. Greggs, James G. McLean, Caroline M. Metry |
2012-06-12 |
| 8194661 |
Autoconfiguration of an IPv6 component in a segmented network |
Joseph E. Bolan, Phuong T. Nguyen, Norman C. Strole |
2012-06-05 |
| 8140837 |
Automatically making selective changes to firmware or configuration settings |
William G. Pagan, Marc V. Stracuzza, Michael N. Womack |
2012-03-20 |
| 7995719 |
Coordination of a voicemail response with calendar scheduling |
Caroline M. Metry |
2011-08-09 |
| 7925457 |
Flow meter and airflow measurement using an airfoil |
James G. McLean, Raymond T. Greggs, Carloine Magdy Metry |
2011-04-12 |
| 7779276 |
Power management in a power-constrained processing system |
Joseph E. Bolan, Vijay Kumar, Malcolm S. Ware |
2010-08-17 |
| 7644291 |
Device throttling system from neighboring device |
Jeffery M. Franke, Donald Johnson, Brooks Johnston |
2010-01-05 |