| 10846195 |
Configuring logging in non-emulated environment using commands and configuration in emulated environment |
James R. Heit, Robert L. Bergerson, John A. Peters |
2020-11-24 |
| 10797950 |
Systems and methods for dynamically configuring a network switch for monitoring |
John A. Peters, Robert L. Bergerson |
2020-10-06 |
| 10498624 |
Systems and methods for adaptive router failover in Linux-based computing systems |
James R. Heit, Robert L. Bergerson, John A. Peters |
2019-12-03 |
| 10447501 |
Systems and methods for establishing a VLAN on a computing system irrespective of the computer networking technology utilized by the computing system |
James R. Heit, John A. Peters, Robert L. Bergerson |
2019-10-15 |
| 9912750 |
Data path selection for network transfer using high speed RDMA or non-RDMA data paths |
John A. Peters, Robert L. Bergerson, James R. Heit |
2018-03-06 |
| 9380047 |
Insecure connection prohibition |
James R. Heit, Robert L. Bergerson |
2016-06-28 |
| 8042156 |
Mapping proprietary SSL APIs onto openssl APIs |
Robert L. Bergerson, James R. Heit, John A. Peters |
2011-10-18 |
| 8032742 |
Dynamic updating of trusted certificates and certificate revocation lists in a computing system |
Robert L. Bergerson, James R. Heit |
2011-10-04 |