| 12379922 |
Software and/or computing hardware development security through permission profile assessment of a retrieval request for a design dependency tree based on a unique identifier such as an IP address |
Fergus Slorach, Peter Theunis |
2025-08-05 |
| 12117925 |
Immutable protection of software and/or computing hardware testing data |
Peter Theunis |
2024-10-15 |
| 11669439 |
Computing hardware and software design testing auditability, including for critical control systems, functional safety, and autonomous vehicle component certification |
Peter Theunis |
2023-06-06 |
| 11650813 |
Enhanced product development efficiency, communication, and/or security through component-based event generation and/or subscription |
Fergus Slorach |
2023-05-16 |
| 11640352 |
Testing software and/or computing hardware design through test fragmentation into one or more discrete computing environments |
Peter Theunis |
2023-05-02 |
| 11461223 |
Efficient computing hardware and software component design testing through test fragmentation and isolated execution within a discrete computing environment |
Peter Theunis |
2022-10-04 |
| 11200050 |
Secure and efficient product development through subscription to an event associated with a restricted design dependency tree |
Fergus Slorach |
2021-12-14 |
| 10877746 |
Component dependency tree normalization through contextual dependency |
Fergus Slorach |
2020-12-29 |
| 10782962 |
Component design security through restriction of a design component dependency tree |
Fergus Slorach |
2020-09-22 |
| 7600078 |
Speculatively performing read transactions |
Ling Cen, Tessil Thomas |
2009-10-06 |