| 9508039 |
Deployment pattern realization with models of computing environments |
Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, Alexander A. Totok |
2016-11-29 |
| 9280335 |
Semantically rich composable software image bundles |
Asaf Adi, Daniel C. Berg, Tamar Eilam, Dinakaran Joseph, Michael H. Kalantar +8 more |
2016-03-08 |
| 9047160 |
Designing and building virtual images using semantically rich composable software image bundles |
Asaf Adi, Daniel C. Berg, Tamar Eilam, Dinakaran Joseph, Michael H. Kalantar +8 more |
2015-06-02 |
| 8769493 |
System for managing lifecycles for virtual image assets |
Murray J. Beaton, Daniel C. Berg, Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou +4 more |
2014-07-01 |
| 8762945 |
Method for managing lifecycles for virtual image assets |
Murray J. Beaton, Daniel C. Berg, Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou +4 more |
2014-06-24 |
| 8677317 |
Simplified deployment modeling |
Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +9 more |
2014-03-18 |
| 8612976 |
Virtual parts having configuration points and virtual ports for virtual solution composition and deployment |
Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, John Arthur Pershing, Jr., Edward C. Snible +1 more |
2013-12-17 |
| 8417658 |
Deployment pattern realization with models of computing environments |
Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, Alexander A. Totok |
2013-04-09 |
| 8291378 |
Simplified deployment modeling |
Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +9 more |
2012-10-16 |
| 8281307 |
Virtual solution composition and deployment system and method |
Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, John Arthur Pershing, Jr., Edward C. Snible +1 more |
2012-10-02 |
| 8126693 |
Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology |
Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +8 more |
2012-02-28 |
| 8126692 |
Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology |
Daniel C. Berg, Brad L. Blancett, Tamar Eilam, Michael D. Elder, Chad M. Holliday +8 more |
2012-02-28 |
| 7996823 |
Mechanism to provide debugging and optimization in policy and knowledge controlled distributed computing systems, through the use of tagged policies and knowledge representation elements |
David M. Chess, David Marc Levine, Edward C. Snible |
2011-08-09 |
| 7996905 |
Method and apparatus for the automatic determination of potentially worm-like behavior of a program |
David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White |
2011-08-09 |
| 7958552 |
System to establish trust between policy systems and users |
Hoi Y. Chan, Alla Segal, Ian N. Whalley |
2011-06-07 |
| 7861300 |
Method and apparatus for determination of the non-replicative behavior of a malicious program |
David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White |
2010-12-28 |
| 7487543 |
Method and apparatus for the automatic determination of potentially worm-like behavior of a program |
David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White |
2009-02-03 |
| 7480912 |
Method for policy-based, autonomically allocated storage |
David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian N. Whalley |
2009-01-20 |
| 7103913 |
Method and apparatus for determination of the non-replicative behavior of a malicious program |
David M. Chess, John Morar, Alla Segal, Ian N. Whalley, Steve R. White |
2006-09-05 |
| 6981279 |
Method and apparatus for replicating and analyzing worm programs |
David M. Chess, John Morar, Alla Segal, Morton Gregory Swimmer, Ian N. Whalley +1 more |
2005-12-27 |
| 6279128 |
Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing |
Jehoshua Bruck, Jeffrey O. Kephart, Gregory Bret Sorkin, Steve R. White, David M. Chess +2 more |
2001-08-21 |
| 5442699 |
Searching for patterns in encrypted data |
David M. Chess, Jeffrey O. Kephart, Gregory Bret Sorkin, Steve R. White |
1995-08-15 |
| 5440723 |
Automatic immune system for computers and computer networks |
David M. Chess, Jeffrey O. Kephart, Steven White |
1995-08-08 |