| 11321164 |
Anomaly recognition in information technology environments |
Chris Moss, Simon J. Kofkin-Hansen, Jordan Shamir, Devin A. Conley, James Hoff +2 more |
2022-05-03 |
| 11003362 |
Disaster recovery practice mode for application virtualization infrastructure |
Ajay A. Apte, Hugh E. Hockett, James P. Robbins |
2021-05-11 |
| 10977207 |
Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment |
Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods |
2021-04-13 |
| 10931640 |
Tunneling network traffic using object storage |
Robert E. Warren, Robley Hall, Daniel N. de Araujo |
2021-02-23 |
| 10747710 |
Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment |
Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods |
2020-08-18 |
| 10095656 |
Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment |
Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods |
2018-10-09 |
| 10089205 |
Disaster recovery practice mode for application virtualization infrastructure |
Ajay A. Apte, Hugh E. Hockett, James P. Robbins |
2018-10-02 |
| 10078619 |
Dynamic association of application workload tiers to infrastructure elements in a cloud computing environment |
Ajay A. Apte, Roy F. Brabson, Orvalle Theodore Kirby, Jason R. McGee, Donald R. Woods |
2018-09-18 |
| 9906370 |
Trust relationship management amongst racks in a data center |
Ajay A. Apte, John Y. Chang, Ching-Yun Chao, Patrick L. Davis, Rohan Gandhi +10 more |
2018-02-27 |
| 9569248 |
Deploying virtual machine instances of a pattern to regions of a hierarchical tier using placement policies and constraints |
Ajay A. Apte, Roy F. Brabson, Theodore O. Kirby, Donald R. Woods |
2017-02-14 |
| 9262144 |
Deploying virtual machine instances of a pattern to regions of a hierarchical tier using placement policies and constraints |
Ajay A. Apte, Roy F. Brabson, Theodore O. Kirby, Donald R. Woods |
2016-02-16 |
| 8918634 |
Network node with network-attached stateless security offload device employing out-of-band processing |
Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. |
2014-12-23 |
| 8826003 |
Network node with network-attached stateless security offload device employing out-of-band processing |
Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. |
2014-09-02 |
| 8407778 |
Apparatus and methods for processing filter rules |
— |
2013-03-26 |
| 8209420 |
Management of duplicate TCP connections using sequence and acknowledgment numbers |
— |
2012-06-26 |
| 7979895 |
System and method for partitioning a multi-level security namespace |
Walter B. Farrell, Patrick Michael LiVecchi |
2011-07-12 |
| 7953120 |
Efficient synchronization of a sliding buffer window to prevent packet re-injection in an internet protocol (IP) network |
— |
2011-05-31 |
| 7954138 |
Method and system for multiplexing multiple level security server applications on the same internet address and port |
Patrick Michael LiVecchi |
2011-05-31 |
| 7895646 |
IKE daemon self-adjusting negotiation throttle |
Jeffrey B. Cates, Wuchieh J. Jong, Keith J. Welter |
2011-02-22 |