Issued Patents All Time
Showing 1–19 of 19 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11321164 | Anomaly recognition in information technology environments | Chris Moss, Simon J. Kofkin-Hansen, Jordan Shamir, Devin A. Conley, James Hoff +2 more | 2022-05-03 |
| 11003362 | Disaster recovery practice mode for application virtualization infrastructure | Ajay A. Apte, Hugh E. Hockett, James P. Robbins | 2021-05-11 |
| 10977207 | Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment | Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods | 2021-04-13 |
| 10931640 | Tunneling network traffic using object storage | Robert E. Warren, Robley Hall, Daniel N. de Araujo | 2021-02-23 |
| 10747710 | Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment | Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods | 2020-08-18 |
| 10095656 | Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment | Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods | 2018-10-09 |
| 10089205 | Disaster recovery practice mode for application virtualization infrastructure | Ajay A. Apte, Hugh E. Hockett, James P. Robbins | 2018-10-02 |
| 10078619 | Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment | Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods | 2018-09-18 |
| 9906370 | Trust relationship management amongst racks in a data center | Ajay A. Apte, John Y. Chang, Ching-Yun Chao, Patrick L. Davis, Rohan Gandhi +10 more | 2018-02-27 |
| 9569248 | Deploying virtual machine instances of a pattern to regions of a hierarchical tier using placement policies and constraints | Ajay A. Apte, Roy F. Brabson, Theodore O. Kirby, Donald R. Woods | 2017-02-14 |
| 9262144 | Deploying virtual machine instances of a pattern to regions of a hierarchical tier using placement policies and constraints | Ajay A. Apte, Roy F. Brabson, Theodore O. Kirby, Donald R. Woods | 2016-02-16 |
| 8918634 | Network node with network-attached stateless security offload device employing out-of-band processing | Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. | 2014-12-23 |
| 8826003 | Network node with network-attached stateless security offload device employing out-of-band processing | Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. | 2014-09-02 |
| 8407778 | Apparatus and methods for processing filter rules | — | 2013-03-26 |
| 8209420 | Management of duplicate TCP connections using sequence and acknowledgment numbers | — | 2012-06-26 |
| 7979895 | System and method for partitioning a multi-level security namespace | Walter B. Farrell, Patrick Michael LiVecchi | 2011-07-12 |
| 7953120 | Efficient synchronization of a sliding buffer window to prevent packet re-injection in an internet protocol (IP) network | — | 2011-05-31 |
| 7954138 | Method and system for multiplexing multiple level security server applications on the same internet address and port | Patrick Michael LiVecchi | 2011-05-31 |
| 7895646 | IKE daemon self-adjusting negotiation throttle | Jeffrey B. Cates, Wuchieh J. Jong, Keith J. Welter | 2011-02-22 |