Issued Patents All Time
Showing 176–200 of 296 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7386745 | Enabling a client device in a client device/data center environment to resume from a sleep state more quickly | Howard Locker, Randall Scott Springfield, Rod D. Waltermann | 2008-06-10 |
| 7370227 | Desktop computer blade fault identification system and method | Howard Locker, Randall Scott Springfield, Rod D. Waltermann | 2008-05-06 |
| 7366304 | Cruable U-NII wireless radio with secure, integral antenna connection via SM BIOS in U-NII wireless ready device | Kazuo Fujii, Ronald John Griffiths, Jr., Masaharu Itoh, Philip John Jakes, Kozo Matsunaga +1 more | 2008-04-29 |
| 7353428 | Polled automatic virus fix | Richard Wayne Cheston, Philip Lee Childs, Mark Charles Davis, Howard Locker, Paul Douglas Plaskonos | 2008-04-01 |
| 7352772 | Minimization of performance impact in overlying 802.11b and 802.11g networks | Philip John Jakes, Howard Locker | 2008-04-01 |
| 7337310 | Computer disposal apparatus, system, and method | Richard Wayne Cheston, Jan M. Janick, John P. Karidis, Howard Locker, Randall Scott Springfield | 2008-02-26 |
| 7330977 | Apparatus, system, and method for secure mass storage backup | Howard Locker, Randall Scott Springfield | 2008-02-12 |
| 7284084 | ROM scan memory expander | William E. Atherton, Richard A. Dayan, Scott N. Dunham, Eric R. Kern, Howard Locker +2 more | 2007-10-16 |
| 7269723 | Reducing the boot time of a client device in a client device/data center environment | Howard Locker, Randall Scott Springfield, Rod D. Waltermann | 2007-09-11 |
| 7269725 | Autonomic binding of subsystems to system to prevent theft | Howard Locker, Randall Scott Springfield | 2007-09-11 |
| 7257701 | Method and system for configuring an operating system in a computer system | Richard Wayne Cheston, Howard Locker, David B. Rhoades, Randall Scott Springfield, James Peter Ward | 2007-08-14 |
| 7257108 | Determining the physical location of resources on and proximate to a network | Richard Wayne Cheston, Dhruv M. Desai, Howard Locker, James Peter Ward | 2007-08-14 |
| 7222143 | Safely restoring previously un-backed up data during system restore of a failing system | Philip Lee Childs, Howard Locker, Michael Terrell Vanover, Steven R. Welch | 2007-05-22 |
| 7218944 | Frequency beacon to broadcast allowed frequency | Philip John Jakes, Howard Locker, James Peter Ward | 2007-05-15 |
| 7203183 | Access point initiated forced roaming based upon bandwidth | Philip John Jakes, Howard Locker, James Peter Ward | 2007-04-10 |
| 7200652 | Method and system for providing automatic notification of end of lease of computers and their locations | Richard Wayne Cheston, Howard Locker, James Peter Ward | 2007-04-03 |
| 7191464 | Method and system for tracking a secure boot in a trusted computing environment | Joseph Wayne Freeman, Steven Dale Goodman, Eric R. Kern, Randall Scott Springfield | 2007-03-13 |
| 7185229 | Method and system for performing remote maintenance operations on a battery powered computer | Howard Locker, Randall Scott Springfield | 2007-02-27 |
| 7174463 | Method and system for preboot user authentication | Joshua James Jankowsky, Howard Locker, Andy Lloyd Trotte, James Peter Ward | 2007-02-06 |
| 7155605 | Data processing system and method for maintaining secure data blocks | Howard Locker, Andy Lloyd Trotter, James Peter Ward | 2006-12-26 |
| 7146433 | Extending an allowable transmission distance between a wireless device and an access point by communication with intermediate wireless devices | Howard Locker, Andy Lloyd Trotter, James Peter Ward | 2006-12-05 |
| 7143067 | System and method for installing personal computer software | Richard Wayne Cheston, Richard A. Dayan, Dhruv M. Desai, Jan M. Janick, Howard Locker +2 more | 2006-11-28 |
| 7117013 | Cruable dual mode ISM and U-NII wireless radio with secure, integral antenna connection | Kazuo Fujii, Ronald John Griffiths, Jr., Masaharu Itoh, Philip John Jakes, Kozo Matsunaga +1 more | 2006-10-03 |
| 7113497 | Bandwidth management in a wireless network | Philip John Jakes, Howard Locker | 2006-09-26 |
| 7107460 | Method and system for securing enablement access to a data security device | Scott Elliott, James Hoff, Howard Locker, David Rivera, Randall Scott Springfield +1 more | 2006-09-12 |