| 11228615 |
Transparent enforcement of data policies |
Scott Daniel Wisniewski, David Lucey, David B. Murray |
2022-01-18 |
| 11057359 |
Key encryption key rotation |
Scott Daniel Wisniewski, David B. Murray, Harish Krishnamurthy |
2021-07-06 |
| 10956600 |
Highly available encryption framework for multiple different computing environments |
Lei Ye, David B. Murray, Vineet Chaudhary |
2021-03-23 |
| 8984244 |
Concurrent virtual machine snapshots and restore |
Andrew Nicholas, Aaron S. Giles, Eric P. Traut, Idan Avraham, Osama M. Salem |
2015-03-17 |
| 8607009 |
Concurrent virtual machine snapshots and restore |
Andrew Nicholas, Aaron S. Giles, Eric P. Traut, Idan Avraham, Osama M. Salem |
2013-12-10 |
| 8191115 |
Method and apparatus for extensible security authorization grouping |
Dennis W. Minium, Bulat Shelepov |
2012-05-29 |
| 7827565 |
Integration architecture for non-integrated tools |
Dennis W. Minium, Ozan Hafizogullari |
2010-11-02 |
| 7302425 |
Distributed pre-cached query results and refresh method |
Simon Bernstein, Nishant V. Dani |
2007-11-27 |
| 6665819 |
Data capture and analysis for embedded systems |
Yadhu Gopalan, David Sauntry, James A. Stulz |
2003-12-16 |