| 12199828 |
Network topology monitoring |
Charles John Scates, Kilian David Joseph Collender, Jorge Alberto Diaz Garcia |
2025-01-14 |
| 12147893 |
Anomaly detection in network topology |
Jack Richard Buggins, Vinh Tuan Thai, Ian Manning |
2024-11-19 |
| 11899766 |
User authentication using original and modified images |
Madeleine Frost, Vinh Tuan Thai, Paul M. J. Barry |
2024-02-13 |
| 11875297 |
Generation of dashboard templates for operations management |
David Jon Griffin, Matthew Richard James Thornhill, Keith Jeremy Posner |
2024-01-16 |
| 11620298 |
Method for scalable mining of temporally correlated events |
Vinh Tuan Thai, Mark O'Riordan |
2023-04-04 |
| 11500673 |
Dynamically generating an optimized processing pipeline for tasks |
Diogo Alexandre Ferreira Ramos, Vinh Tuan Thai |
2022-11-15 |
| 11501222 |
Training operators through co-assignment |
David Jon Griffin, Matthew Richard James Thornhill |
2022-11-15 |
| 11494718 |
Runbook deployment based on confidence evaluation |
Matthew Richard James Thornhil, David Jon Griffin |
2022-11-08 |
| 11388039 |
Identifying problem graphs in an information technology infrastructure network |
Kilian David Joseph Collender, Jorge Alberto Diaz Garcia, Charles John Scates |
2022-07-12 |
| 11196633 |
Generalized correlation of network resources and associated data records in dynamic network environments |
Vinh Tuan Thai, Jack Richard Buggins, Ian Manning |
2021-12-07 |
| 11080121 |
Generating runbooks for problem events |
Matthew Richard James Thornhill, David Jon Griffin |
2021-08-03 |
| 10904383 |
Assigning operators to incidents |
Matthew Richard James Thornhill, David Jon Griffin |
2021-01-26 |