Issued Patents All Time
Showing 26–50 of 200 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9438692 | Identity and policy enforced inter-cloud and intra-cloud channel | Bruce L. Bergeson, Carolyn B. McClain, Vernon Roger Holm | 2016-09-06 |
| 9369494 | Techniques for establishing a trusted cloud service | Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson | 2016-06-14 |
| 9317407 | Techniques for validating services for deployment in an intelligent workload management system | Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen | 2016-04-19 |
| 9288264 | System and method for implementing a cloud workflow | Carolyn B. McClain, Lloyd Leon Burch, Dale Robert Olds | 2016-03-15 |
| 9224126 | Collaborative decision making | Ashish Anant Vaidya, Scott Alan Isaacson | 2015-12-29 |
| 9201962 | Techniques for identifying and linking related content | — | 2015-12-01 |
| 9183374 | Techniques for identity-enabled interface deployment | Douglas Garry Earl | 2015-11-10 |
| 9183524 | Imaged-based method for transport and authentication of virtualized workflows | — | 2015-11-10 |
| 9146985 | Techniques for evaluating patent impacts | — | 2015-09-29 |
| 9135444 | Trusted platform module (TPM) assisted data center management | Tammy Anita Green, Scott Alan Isaacson | 2015-09-15 |
| 9122533 | System and method for reducing cloud IP address utilization using a distributor registry | Carolyn B. McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch | 2015-09-01 |
| 9123006 | Techniques for parallel business intelligence evaluation and management | Lee Edward Lowry, Vernon Roger Holm, Atul Mahajan | 2015-09-01 |
| 9104706 | Meta-directory control and evaluation of events | Scott Alan Isaacson | 2015-08-11 |
| 9071443 | Automated service platform prospecting | Carolyn B. McClain | 2015-06-30 |
| 9058579 | Techniques for instantiating and configuring projects | Michel Shane Simpson, Volker Gunnar Scheuber-Heinz, Lee Edward Lowry | 2015-06-16 |
| 9032094 | Network application layer routing | Ravishankar Krishnamurthy, Duraisamy Veeravadivel | 2015-05-12 |
| 9026638 | Stealth entropy collection | Kasman E. Thomas | 2015-05-05 |
| 8996686 | Content delivery validation service | — | 2015-03-31 |
| 8978125 | Identity controlled data center | — | 2015-03-10 |
| 8977775 | Techniques for identity and policy based routing | Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch | 2015-03-10 |
| 8973011 | Multi-core resource utilization planning | — | 2015-03-03 |
| 8972898 | Techniques for representing and navigating information in three dimensions | — | 2015-03-03 |
| 8966448 | Techniques for debugging an application | Brian C. Cooper | 2015-02-24 |
| 8966017 | Techniques for cloud control and management | Robert Wipfel, Carolyn B. McClain | 2015-02-24 |
| 8930945 | Environment managers via virtual machines | Kevin Marinus Boogert | 2015-01-06 |