2023
|
Invention
|
Cluster capacity management for hyper converged infrastructure updates.
Disclosed are various im... |
|
Invention
|
Platform independent gpu profiles for more efficient utilization of gpu resources.
Disclosed ar... |
|
Invention
|
Gateway enrollment for internet of things device management.
Disclosed are various examples for ... |
|
Invention
|
Pod deployment in a guest cluster executing as a virtual extension of management cluster in a vir... |
|
Invention
|
Information technology (it) topology solutions according to operational goals.
Disclosed are var... |
|
Invention
|
Global cache for container images in a clustered container host system.
Container images are man... |
|
Invention
|
Internet of things solution deployment in hybrid environment.
Example methods are provided to de... |
|
Invention
|
Techniques for non-disruptive system upgrade.
The disclosure provides an approach for a non-disr... |
2022
|
Invention
|
Efficiently performing intrusion detection.
Some embodiments of the invention provide a method f... |
|
Invention
|
Determining whether to rate limit traffic.
Some embodiments provide a method for a gateway datap... |
|
Invention
|
Microservice scheduling.
A method for microservice scheduling can include determining a network ... |
|
Invention
|
Enabling efficient guest access to peripheral component interconnect express (pcie) configuration... |
|
Invention
|
Browser-driven capture of application installations for application virtualization.
Techniques a... |
|
Invention
|
In-place garbage collection for state machine replication.
Garbage collection processing in a di... |
|
Invention
|
Remote deployment of provisioned packages.
Disclosed are various approaches for remotely deployi... |
|
Invention
|
Recovery of a software-defined data center.
Examples described herein include systems and method... |
|
Invention
|
Offline email synchronization.
Examples described herein include systems and methods for perform... |
|
Invention
|
Efficient fuzz testing of low-level virtual devices.
Examples described herein include systems a... |
|
Invention
|
Management of blacklists and duplicate addresses in software defined networks.
Described herein ... |
|
Invention
|
Rate limiting of cloud account change events and state management.
Rate limiting of cloud accoun... |
|
Invention
|
Forwarding element with physical and virtual data planes.
Some embodiments of the invention prov... |
|
Invention
|
Handling multipath ipsec in nat environment.
Some embodiments provide a method for establishing ... |
|
Invention
|
Expand and contract framework for reduced downtime during upgrade of an application hosted in a d... |
|
Invention
|
Policy-governed cryptographic selection system. This disclosure relates generally to configuring ... |
|
Invention
|
Context aware cipher solutions in secure communications. This relates generally to configuring an... |
|
G/S
|
providing on-line publications, namely, data sheets, white papers, reports, and brochures books i... |
|
G/S
|
Providing downloadable data sheets, white papers, reports, and brochures relating to security in ... |
|
G/S
|
Providing technical information in the field of network and cloud security via the global compute... |
|
G/S
|
Educational, instructional and training services; arranging and conducting educational and traini... |
|
G/S
|
Educational services, namely conducting programs and training services in the field of cloud comp... |
|
Invention
|
Data criticality-based network policy creation and consumption.
Some embodiments of the inventio... |
2021
|
Invention
|
Logical switch level load balancing of l2vpn traffic.
The disclosure provides an approach for lo... |
|
Invention
|
Reverse deletion of a chain of snapshots.
A method for the reverse deletion of a plurality of sn... |
|
Invention
|
Dynamic tracing of runtime data in a distributed system.
An administrator agent and local worker... |
|
Invention
|
Force provisioning virtual objects in degraded stretched clusters.
The present disclosure is rel... |
|
Invention
|
Importance sampling via machine learning (ml)-based gradient approximation.
Techniques for imple... |
|
Invention
|
Reconciling host cluster membership during recovery.
A method for reconciling host membership in... |
|
Invention
|
Automated processes and systems for performing log message curation.
Automated computer-implemen... |
|
Invention
|
Optimizing a reservation user interface.
Various examples are described for optimizing a reserva... |
|
Invention
|
Systems, methods, and apparatus for high availability application migration in a virtualized envi... |
|
Invention
|
Fast provisioning of machines using network cloning.
Some embodiments of the invention provide a... |
|
Invention
|
Smart workflow action-based checklist.
Systems and methods are described for creating tasks for ... |
|
Invention
|
Detection of threats based on responses to name resolution requests.
Some embodiments provide a ... |
|
Invention
|
Enhanced robust input protocol for secure multi-party computation (mpc) via hierarchical pseudora... |
|
Invention
|
Maintaining a fault-tolerance threshold of a clusterstore during maintenance activities.
A metho... |
|
Invention
|
Two-level logical to physical mapping mechanism in a log-structured file system.
Example methods... |
|
Invention
|
Supporting random access uploads to an object store.
An object storage system can receive chunks... |
|
Invention
|
System for software service upgrade.
Examples are disclosed for upgrading services of a software... |
|
Invention
|
Limiting the security impact of compromised endpoint computing devices in a distributed malware d... |
|
Invention
|
System and method for migrating partial tree structures of virtual disks between sites using a co... |
|
Invention
|
Migrating stateful workloads between container clusters with different storage backends.
Techniq... |
|
Invention
|
Intelligent creation of customized responses to customer feedback.
Systems and methods are descr... |
|
Invention
|
Enhanced accessibility user interface for space assignment on a floorplan. Various examples are d... |
2020
|
G/S
|
Downloadable security software to secure distributed applications such as microservices and other... |
|
G/S
|
Building, executing, securing and managing computer applications and application components; a pl... |
2019
|
G/S
|
platforms for enabling the orchestration of microservices. Building, executing, securing and mana... |
|
G/S
|
Platforms for enabling the orchestration of microservices. Building, executing, securing and mana... |
|
G/S
|
Downloadable computer software in the field of network security for managing, securing and optimi... |
|
G/S
|
Computer technical services in the nature of application service provider services, namely, devel... |
|
G/S
|
Computer software for use in data storage; computer software for the automation, collection, mana... |
2018
|
G/S
|
Computer software for use in accessing and managing computer networks |
|
G/S
|
Computer software that provides monitoring, analysis,
auditing, management, detecting, classifyi... |
|
G/S
|
Downloadable computer software for the management and configuration of scalable systems for cloud... |
|
G/S
|
Computer and user interface software, all for use in monitoring, analyzing, auditing, managing, d... |
|
G/S
|
Computer consultation in the field of computer security; computer security consultancy in the fie... |
|
G/S
|
Computer consultation in the field of computer security; Computer security consultancy in the fie... |
|
G/S
|
Downloadable software for creating and managing a cloud-based software-defined data center of com... |
|
G/S
|
Downloadable software for enabling an enterprise to centrally deliver, manage and secure virtual ... |
|
G/S
|
Software as a Service (SaaS) which monitors endpoints of a data center for known-good behavior an... |
|
G/S
|
Downloadable software for user-identity management and application delivery from a catalogue of a... |
2017
|
G/S
|
Computer services, namely, providing virtual and nonvirtual application servers, web servers, fil... |
|
G/S
|
Downloadable electronic publications in the nature of articles, reports, newsletters and whitepap... |
|
G/S
|
Software as a service (SAAS) services featuring software to provide platform mobility for softwar... |
|
G/S
|
Computer software development tools; Computer software for application and database integration; ... |
|
G/S
|
Computer software development tools; Computer software for use in implementing, deploying, execut... |
|
G/S
|
Downloadable software in the nature of mobile applications for use in on-device information acces... |
2016
|
G/S
|
computer software for accessing, browsing, sharing, defining, maintaining, virtualizing and commu... |
|
G/S
|
Computer software development tools for implementing data security features in internet applicati... |
|
G/S
|
printed publications, namely, articles, brochures, newsletters, and books, in the field of comput... |
2015
|
G/S
|
Computer software development tools; Downloadable computer software for implementing data securit... |
|
G/S
|
providing online, non-downloadable software for packaging, creating and distributing other comput... |
|
G/S
|
Educational services, namely, providing classes, seminars, conferences, and workshops in the fiel... |
|
G/S
|
Downloadable software development tools for enterprise network security, for use with virtualized... |