| 9875135 |
Utility-optimized scheduling of time-sensitive tasks in a resource-constrained environment |
Jeffrey E. Piazza, Michael Theroux |
2018-01-23 |
| 9489499 |
Security context passing for stateless system management |
Denis Knjazihhin, Paul A. Reilly, Chet Birger, Carl A. Adams |
2016-11-08 |
| 9094217 |
Secure credential store |
Richard Guoyu Liao |
2015-07-28 |
| 8875143 |
Utility-optimized scheduling of time-sensitive tasks in a resource-constrained environment |
Jeff Piazza, Michael Theroux |
2014-10-28 |
| 8752137 |
Security context passing for stateless system management |
Denis Knjazihhin, Paul A. Reilly, Chet Birger, Carl A. Adams |
2014-06-10 |
| 8677446 |
Centrally managed impersonation |
Geert De Peuter |
2014-03-18 |
| 8589343 |
Systems and methods for digital file change monitoring |
— |
2013-11-19 |
| 8510810 |
Secure credential store |
Richard Guoyu Liao |
2013-08-13 |
| 8402127 |
System and method for offering virtual private clouds within a public cloud environment |
— |
2013-03-19 |
| 7512635 |
System and method for updating information on a computer system using a limited amount of space |
— |
2009-03-31 |