Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9508039 | Deployment pattern realization with models of computing environments | Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, Alexander A. Totok | 2016-11-29 |
| 9280335 | Semantically rich composable software image bundles | Asaf Adi, Daniel C. Berg, Tamar Eilam, Dinakaran Joseph, Michael H. Kalantar +8 more | 2016-03-08 |
| 9047160 | Designing and building virtual images using semantically rich composable software image bundles | Asaf Adi, Daniel C. Berg, Tamar Eilam, Dinakaran Joseph, Michael H. Kalantar +8 more | 2015-06-02 |
| 8769493 | System for managing lifecycles for virtual image assets | Murray J. Beaton, Daniel C. Berg, Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou +4 more | 2014-07-01 |
| 8762945 | Method for managing lifecycles for virtual image assets | Murray J. Beaton, Daniel C. Berg, Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou +4 more | 2014-06-24 |
| 8677317 | Simplified deployment modeling | Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +9 more | 2014-03-18 |
| 8612976 | Virtual parts having configuration points and virtual ports for virtual solution composition and deployment | Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, John Arthur Pershing, Jr., Edward C. Snible +1 more | 2013-12-17 |
| 8417658 | Deployment pattern realization with models of computing environments | Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, Alexander A. Totok | 2013-04-09 |
| 8291378 | Simplified deployment modeling | Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +9 more | 2012-10-16 |
| 8281307 | Virtual solution composition and deployment system and method | Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, John Arthur Pershing, Jr., Edward C. Snible +1 more | 2012-10-02 |
| 8126693 | Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology | Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +8 more | 2012-02-28 |
| 8126692 | Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology | Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +8 more | 2012-02-28 |
| 7996823 | Mechanism to provide debugging and optimization in policy and knowledge controlled distributed computing systems, through the use of tagged policies and knowledge representation elements | David M. Chess, David Marc Levine, Edward C. Snible | 2011-08-09 |
| 7996905 | Method and apparatus for the automatic determination of potentially worm-like behavior of a program | David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White | 2011-08-09 |
| 7958552 | System to establish trust between policy systems and users | Hoi Y. Chan, Alla Segal, Ian N. Whalley | 2011-06-07 |
| 7861300 | Method and apparatus for determination of the non-replicative behavior of a malicious program | David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White | 2010-12-28 |
| 7487543 | Method and apparatus for the automatic determination of potentially worm-like behavior of a program | David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White | 2009-02-03 |
| 7480912 | Method for policy-based, autonomically allocated storage | David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian N. Whalley | 2009-01-20 |
| 7103913 | Method and apparatus for determination of the non-replicative behavior of a malicious program | David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White | 2006-09-05 |
| 6981279 | Method and apparatus for replicating and analyzing worm programs | David M. Chess, John Morar, Alla Segal, Morton Gregory Swimmer, Ian N. Whalley +1 more | 2005-12-27 |
| 6279128 | Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing | Jehoshua Bruck, Jeffrey O. Kephart, Gregory Bret Sorkin, Steve R. White, David M. Chess +2 more | 2001-08-21 |
| 5442699 | Searching for patterns in encrypted data | David M. Chess, Jeffrey O. Kephart, Gregory Bret Sorkin, Steve R. White | 1995-08-15 |
| 5440723 | Automatic immune system for computers and computer networks | David M. Chess, Jeffrey O. Kephart, Steven White | 1995-08-08 |