| 12386972 |
Cluster security based on virtual machine content |
— |
2025-08-12 |
| 11558395 |
Restricting access to cognitive insights |
— |
2023-01-17 |
| 11334672 |
Cluster security based on virtual machine content |
— |
2022-05-17 |
| 11200325 |
Dynamic data asset security using cognitive data analysis |
Nayna Jain, Divya K. Konoor, Pavitra Maras |
2021-12-14 |
| 11025673 |
Compliance configuration management |
— |
2021-06-01 |
| 10375115 |
Compliance configuration management |
— |
2019-08-06 |
| 10346327 |
Timer placement optimization |
Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar |
2019-07-09 |
| 10346329 |
Timer placement optimization |
Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar |
2019-07-09 |
| 10256975 |
Using encryption to propagate cognitive corrections |
— |
2019-04-09 |
| 10223146 |
Rearrangement management for a shared pool of configurable computing resources |
Amit Agarwal, Uma Maheswara R. Chandolu, Chetan L. Gaonkar |
2019-03-05 |
| 9904473 |
Memory and processor affinity in a deduplicated environment |
Keerthi B. Kumar |
2018-02-27 |
| 9152346 |
Storage and retrieval of high importance pages in an active memory sharing environment |
Keerthi B. Kumar |
2015-10-06 |
| 9152347 |
Storage and retrieval of high importance pages in an active memory sharing environment |
Keerthi B. Kumar |
2015-10-06 |
| 8972647 |
Kernel memory locking for systems that allow over-commitment memory |
Keerthi B. Kumar |
2015-03-03 |
| 8972648 |
Kernal memory locking for systems that allow over-commitment memory |
Keerthi B. Kumar |
2015-03-03 |