Issued Patents All Time
Showing 1–25 of 45 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12159225 | Queue allocation in machine learning accelerators | Xiangyu Dong, Yazhou Zu | 2024-12-03 |
| 12014167 | Methods for optics module firmware in-field upgrade | Jianqiao Liu, Xiangyu Dong, Pedram Z. Dashti | 2024-06-18 |
| 11704110 | Methods for optics module firmware in-field upgrade | Jianqiao Liu, Xiangyu Dong, Pedram Z. Dashti | 2023-07-18 |
| 11467822 | Methods for optics module firmware in-field upgrade | Jianqiao Liu, Xiangyu Dong, Pedram Z. Dashti | 2022-10-11 |
| 11301324 | Method and apparatus for consistent and highly available data storage using local and fabric attached non-volatile memory storage devices | Richard Elling, Franz Michael Schuette | 2022-04-12 |
| 8713202 | Method and system for network configuration for virtual machines | Nicolas G. Droux, Erik Nordmark, Sunay Tripathi | 2014-04-29 |
| 8675644 | Enhanced virtual switch | Sunay Tripathi, Nicolas G. Droux | 2014-03-18 |
| 8625431 | Notifying network applications of receive overflow conditions | Nicolas G. Droux, Sunay Tripathi | 2014-01-07 |
| 8516493 | System and method for massively multi-core computing systems | Nitin Hande, Hua Ji | 2013-08-20 |
| 8458366 | Method and system for onloading network services | Darrin P. Johnson | 2013-06-04 |
| 8447880 | Network stack instance architecture with selection of transport layers | Darrin P. Johnson, Erik Nordmark | 2013-05-21 |
| 8406230 | Method and system for classifying packets in a network interface card and interface for performing the same | Yunsong Lu | 2013-03-26 |
| 8321862 | System for migrating a virtual machine and resource usage data to a chosen target host based on a migration policy | Sumedha Swamy | 2012-11-27 |
| 8312431 | System and computer readable medium for verifying access to signed ELF objects | Darren James Moffat, Paul Sangster | 2012-11-13 |
| 8260588 | Virtualizing complex network topologies | Sunay Tripathi, Nicolas G. Droux | 2012-09-04 |
| 8200960 | Tracking of resource utilization during cryptographic transformations | Mark Powers, Bhargava K. Yenduri, Darrin P. Johnson | 2012-06-12 |
| 8194667 | Method and system for inheritance of network interface card capabilities | Darrin P. Johnson | 2012-06-05 |
| 8174984 | Managing traffic on virtualized lanes between a network switch and a virtual machine | Sunay Tripathi, Nicolas G. Droux | 2012-05-08 |
| 8175271 | Method and system for security protocol partitioning and virtualization | Darrin P. Johnson | 2012-05-08 |
| 8166294 | Cryptographic framework | Paul Sangster, Darren James Moffat | 2012-04-24 |
| 8087066 | Method and system for securing a commercial grid network | Darrin P. Johnson | 2011-12-27 |
| 8036127 | Notifying network applications of receive overflow conditions | Nicolas G. Droux, Sunay Tripathi | 2011-10-11 |
| 8024563 | Programming interface for a kernel level SSL proxy | Aleksandr Guzovskiy, Bhargava K. Yenduri | 2011-09-20 |
| 8005022 | Host operating system bypass for packets destined for a virtual machine | Sunay Tripathi, Tim P. Marsland, Nicolas G. Droux | 2011-08-23 |
| 8006297 | Method and system for combined security protocol and packet filter offload and onload | Darrin P. Johnson, Darren J. Reed | 2011-08-23 |