| 10846195 |
Configuring logging in non-emulated environment using commands and configuration in emulated environment |
James R. Heit, Jason C. Schultz, John A. Peters |
2020-11-24 |
| 10797950 |
Systems and methods for dynamically configuring a network switch for monitoring |
John A. Peters, Jason C. Schultz |
2020-10-06 |
| 10498624 |
Systems and methods for adaptive router failover in Linux-based computing systems |
James R. Heit, Jason C. Schultz, John A. Peters |
2019-12-03 |
| 10454881 |
Systems and methods for configuring an IPv4 process without associating the IPv4 process with an IP loopback address |
Mark V. Deisinger |
2019-10-22 |
| 10447501 |
Systems and methods for establishing a VLAN on a computing system irrespective of the computer networking technology utilized by the computing system |
Jason C. Schultz, James R. Heit, John A. Peters |
2019-10-15 |
| 10425395 |
Single sign on system for secure networks |
Glen E. Newton, James R. Heit, Steven R Hallquist |
2019-09-24 |
| 9912750 |
Data path selection for network transfer using high speed RDMA or non-RDMA data paths |
Jason C. Schultz, John A. Peters, James R. Heit |
2018-03-06 |
| 9380047 |
Insecure connection prohibition |
Jason C. Schultz, James R. Heit |
2016-06-28 |
| 8042156 |
Mapping proprietary SSL APIs onto openssl APIs |
James R. Heit, John A. Peters, Jason C. Schultz |
2011-10-18 |
| 8032742 |
Dynamic updating of trusted certificates and certificate revocation lists in a computing system |
James R. Heit, Jason C. Schultz |
2011-10-04 |
| 7363631 |
Interface for accessing an open distributed transaction processing system log file |
Scot S. Hall, Jacqueline M. Schrab, Susan A. Senger |
2008-04-22 |