| 8438303 |
Audit logging and role based security using one way proxy architecture |
Arthur John Colvig, Krishna Harathi, Martine B. Wedlake |
2013-05-07 |
| 8087032 |
Automated recovery process initiation for data consumers of a common information model (CIM) managed component |
Aaron Amauba, Ross E. Hagglund, Martine B. Wedlake |
2011-12-27 |
| 7624336 |
Selection of status data from synchronous redundant devices |
James Davison, Daniel F. De Araujo, Paul Richards |
2009-11-24 |
| 7607043 |
Analysis of mutually exclusive conflicts among redundant devices |
Michael R. Groseclose, David A. Larson |
2009-10-20 |
| 7581046 |
Multi-image hardware access system for managing access to computer support systems |
Brandon L. Hunt, Brian A. Rinaldi |
2009-08-25 |
| 7496701 |
Managing virtual server control of computer support systems with heartbeat message |
Brandon L. Hunt, Brian A. Rinaldi, Richard A. Ripberger |
2009-02-24 |