| 9329952 |
Reducing application downtime during failover |
Manohar R. Bodke, Ravikiran Moningi, Ravi Shankar |
2016-05-03 |
| 9122889 |
Managing access to class objects in a system utilizing a role-based access control framework |
Saurabh Desai |
2015-09-01 |
| 8955057 |
Managing access to class objects in a system utilizing a role-based access control framework |
Saurabh Desai |
2015-02-10 |
| 8949566 |
Locking access to data storage shared by a plurality of compute nodes |
Madhusudanan Kandasamy, Murali Vaddagiri |
2015-02-03 |
| 8903096 |
Security key distribution in a cluster |
Jes Kiran Chittigala, Ravi Shankar |
2014-12-02 |
| 8838644 |
Extensible access control list framework |
Madhusudanan Kandasamy, Murali Vaddagiri |
2014-09-16 |
| 8832389 |
Domain based access control of physical memory space |
Saurabh Desai, George Mathew Koikara, Pruthvi Panyam Nataraj, Guha Prasad Venkataraman |
2014-09-09 |
| 8826244 |
Providing programming support to debuggers |
Madhusudanan Kandasamy |
2014-09-02 |
| 8819231 |
Domain based management of partitions and resource groups |
Uma Maheswara R. Chandolu, Lakshmanan Velusamy |
2014-08-26 |
| 8745597 |
Providing programming support to debuggers |
Madhusudanan Kandasamy |
2014-06-03 |
| 8631123 |
Domain based isolation of network ports |
Saurabh Desai, George Mathew Koikara, Pruthvi Panyam Nataraj, Guha Prasad Venkataraman |
2014-01-14 |
| 8595821 |
Domains based security for clusters |
Saurabh Desai, George Mathew Koikara, Pruthvi Panyam Nataraj, Guha Prasad Venkataraman |
2013-11-26 |
| 8429191 |
Domain based isolation of objects |
Saurabh Desai, George Mathew Koikara, Pruthvi Panyam Nataraj, Guha Prasad Venkataraman |
2013-04-23 |
| 8255431 |
Managing memory |
Madhusudanan Kandasamy, Murali Vaddagiri |
2012-08-28 |
| 8250552 |
High efficiency compilation framework for streamlining the execution of compiled code |
Madhusudanan Kandasamy, Manish Gupta, Dibyendu Das |
2012-08-21 |
| 8136147 |
Privilege management |
George Mathew Koikara |
2012-03-13 |
| 7908476 |
Virtualization of file system encryption |
Madhusudanan Kandasamy, George Mathew Koikara, Pruthvi Panyam Nataraj |
2011-03-15 |