| 9231827 |
Formalizing, diffusing and enforcing policy advisories and monitoring policy compliance in the management of networks |
David Hindawi, David Leigh Donoho, Lisa Lippincott, James M. Brown, Peter Lincroft +2 more |
2016-01-05 |
| 9152602 |
Mechanisms for evaluating relevance of information to a managed device and performing management operations using a pseudo-agent |
Lisa Lippincott, Peter Lincroft, Peter Benjamin Loer, Jeremy Scott Spiegel, Gregory Toto |
2015-10-06 |
| 9055386 |
Endpoint-hosted hypervisor management |
James B. Evans, Jonathan S. Fan, Benjamin John Kus, Peter Benjamin Loer, Jason E. Mealins +2 more |
2015-06-09 |
| 8966110 |
Dynamic bandwidth throttling |
Lisa Lippincott, Peter Lincroft |
2015-02-24 |
| 8677358 |
Endpoint-hosted hypervisor management |
James B. Evans, Jonathan S. Fan, Benjamin John Kus, Peter Benjamin Loer, Jason E. Mealins +2 more |
2014-03-18 |
| 8621460 |
Endpoint-hosted hypervisor management |
James B. Evans, Jonathan S. Fan, Benjamin John Kus, Peter Benjamin Loer, Jason E. Mealins +2 more |
2013-12-31 |
| 8495157 |
Method and apparatus for distributed policy-based management and computed relevance messaging with remote attributes |
Amrit T. Williams, Gregory Toto, Peter Benjamin Loer |
2013-07-23 |
| 8161149 |
Pseudo-agent |
Lisa Lippincott, Peter Lincroft, Peter Benjamin Loer, Jeremy Scott Spiegel, Gregory Toto |
2012-04-17 |
| 8055617 |
Enterprise console |
David Hindawi, David Leigh Donoho, Lisa Lippincott, James M. Brown, Peter Lincroft +2 more |
2011-11-08 |
| 7962610 |
Statistical data inspector |
Lisa Lippincott, John Edward Firebaugh |
2011-06-14 |
| 7607572 |
Formalizing, diffusing, and enforcing policy advisories and monitoring policy compliance in the management of networks |
David Hindawi, David Leigh Donoho, Lisa Lippincott, James M. Brown, Peter Lincroft +2 more |
2009-10-27 |
| 7398272 |
Enterprise console |
David Hindawi, David Leigh Donoho, Lisa Lippincott, James M. Brown, Peter Lincroft +2 more |
2008-07-08 |
| 6879979 |
Method to remotely query, safely measure, and securely communicate configuration information of a networked computational device |
David Hindawi, David Leigh Donoho, Lisa Lippincott, Orion Hindawi, Peter Benjamin Loer +1 more |
2005-04-12 |