| 10341194 |
System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment |
Dominic Zippilli, Emily Dresner-Thornber, Denison Wright, Wayne Crissman, Matthew Brinkman +8 more |
2019-07-02 |
| 10310828 |
System and method for providing and executing a domain-specific language for cloud services infrastructure |
Dominic Zippilli, Alex Schoof, Jared Tobin, Jasper VAN DER JEUGT, Maciej WOS +4 more |
2019-06-04 |
| 9847878 |
System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet |
Dominic Zippilli, Matthew Brinkman |
2017-12-19 |
| 9515997 |
Inline data encryption |
Michael Westman, Jeffrey Harry Widom |
2016-12-06 |
| 9508095 |
System and method for optimizing the selection of cloud services based on price and performance |
Dominic Zippilli, Matthew Brinkman, Andrew Wright, Tyler Drombosky |
2016-11-29 |
| 9461823 |
System and method for limiting exploitable or potentially exploitable sub-components in software components |
Dominic Zippilli, Matthew Brinkman |
2016-10-04 |
| 9385866 |
System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised |
Dominic Zippilli, Matthew Brinkman |
2016-07-05 |
| 9014373 |
System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet |
Dominic Zippilli, Matthew Brinkman |
2015-04-21 |
| 9003525 |
System and method for limiting exploitable or potentially exploitable sub-components in software components |
Dominic Zippilli, Matthew Brinkman |
2015-04-07 |
| 8819836 |
System and method for limiting exploitable of potentially exploitable sub-components in software components |
Dominic Zippilli, Matthew Brinkman |
2014-08-26 |
| 8755522 |
System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet |
Dominic Zippilli, Matthew Brinkman |
2014-06-17 |