Issued Patents All Time
Showing 176–200 of 230 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8190823 | Apparatus, system and method for storage cache deduplication | Mark Charles Davis | 2012-05-29 |
| 8171523 | Embedded email receiver authentication | Arnold S. Weksler, Scott Kelso, John Carl Mese, Nathan J. Peterson | 2012-05-01 |
| 8165177 | System and method for hybrid virtual machine monitor file system operations | Philip Lee Childs, Mark Charles Davis, Ke Ke | 2012-04-24 |
| 8151260 | Method for providing an image of software installed on a computer system | Neal Robert Caliendo, JR., Jeffrey Mark Estroff, Michaelle L. Fuccella-Walcutt, James Anthony Hunt, Howard Locker +4 more | 2012-04-03 |
| 8140795 | Hard disk drive with write-only region | David Carroll Challener | 2012-03-20 |
| 8131765 | Apparatus, system and method for caching writes by multiple clients to a virtualized common disk image | Scott Edwards Kelso, John Carl Mese, Nathan J. Peterson, Arnold S. Weksler | 2012-03-06 |
| 8131986 | System and method for boot loading of programs within a host operating environment having one or more linked guest operating systems | Mark Charles Davis, Scott Edwards Kelso, Ling Ma, Nathan J. Peterson | 2012-03-06 |
| 8099789 | Apparatus and method for enabling applications on a security processor | David Carroll Challener, John H. Nicholson, Joseph Michael Pennisi | 2012-01-17 |
| 8086840 | Apparatus, system, and method for improving user boot via a storage area network | Richard Wayne Cheston, Mark Charles Davis, Howard Locker | 2011-12-27 |
| 8086873 | Method for controlling file access on computer systems | Howard Locker, Daryl Cromer, Randall Scott Springfield | 2011-12-27 |
| 8055893 | Techniques for booting a stateless client | Howard Locker, Richard Wayne Cheston, Mark Charles Davis | 2011-11-08 |
| 8041958 | Method for preventing malicious software from execution within a computer system | David Carroll Challener, Mark Charles Davis, Peter Dirk Hortensius | 2011-10-18 |
| 8024579 | Authenticating suspect data using key tables | David Carroll Challener, John H. Nicholson, Joseph Michael Pennisi | 2011-09-20 |
| 8001245 | System and method for autonomically configurable router | Scott Edwards Kelso, John Carl Mese, Nathan J. Peterson, Arnold S. Weksler | 2011-08-16 |
| 7966376 | Preventing the capture of chat session text | Scott Edwards Kelso, John Carl Mese, Nathan J. Peterson, Arnold S. Weksler | 2011-06-21 |
| 7945795 | Enabling a client device in a client device/data center environment to resume from a sleep more quickly | Daryl Cromer, Howard Locker, Randall Scott Springfield | 2011-05-17 |
| 7934214 | Computer implemented method, system and computer program product for controlling software entitlement | Scott Edwards Kelso, Masahiko Nomura, David Sawin, Randall Scott Springfield | 2011-04-26 |
| 7930328 | Apparatus, system, and method for file system sharing | Mark Charles Davis, Joshua Neil Novak | 2011-04-19 |
| 7917916 | IT administrator initiated remote hardware independent imaging technology | Arnold S. Weksler, Neal Robert Caliendo, JR., Jeffrey Mark Estroff, Scott Edwards Kelso, John Carl Mese +2 more | 2011-03-29 |
| 7844845 | System and method for preventing user O.S. in VMM system from deenergizing device being used by service O.S. | Liang Chen, Mark Charles Davis, Seiichi Kawano | 2010-11-30 |
| 7845008 | Virus scanner for journaling file system | John Carl Mese, Scott Kelso, Mark Charles Davis, Arnold S. Weksler, Nathan J. Peterson | 2010-11-30 |
| 7827376 | System and method for protecting hidden protected area of HDD during operation | Nathan J. Peterson, Joseph Wayne Freeman, Randall Scott Springfield, Mark Charles Davis, Steven Dale Goodman +2 more | 2010-11-02 |
| 7818567 | Method for protecting security accounts manager (SAM) files within windows operating systems | David Carroll Challener, Philip Lee Childs, Norman A. Dion, II, James Anthony Hunt, Nathan J. Peterson +3 more | 2010-10-19 |
| 7818553 | Method and apparatus for preventing unauthorized modifications to rental computer systems | Daryl Cromer, Howard Locker, Randall Scott Springfield | 2010-10-19 |
| 7782201 | Techniques for preventing damage to a portable device | Arnold S. Weksler, Scott Edwards Kelso, Nathan J. Peterson | 2010-08-24 |