2023
|
Invention
|
Guest cluster deployed as virtual extension of management cluster in a virtualized computing syst... |
|
Invention
|
Container orchestration in a clustered and virtualized computer system.
An example virtualized c... |
|
Invention
|
Green load balancing in global load balancing deployments. The disclosure provides an approach fo... |
|
Invention
|
Detecting anomalies in a distributed application.
Anomalies are detected in a distributed applic... |
|
Invention
|
Aggregating metrics of network elements of a software-defined network for different applications ... |
|
Invention
|
Workload placement for virtual gpu enabled systems.
Disclosed are aspects of workload selection ... |
|
Invention
|
Conditional time-based one time password token issuance based on locally aggregated device risk. ... |
|
Invention
|
Management of multi-type storage including hyperconverged storage. Described herein are systems, ... |
|
Invention
|
Provisioning and deploying ran applications in a ran system. Some embodiments of the invention pr... |
|
Invention
|
Use of crds as descriptors for application ui in an o-ran system. Some embodiments use one or mor... |
|
Invention
|
Wan optimization in the public cloud. Some embodiments of the invention provide a method for WAN ... |
|
Invention
|
Methods for resilient multi cloud gateway interconnects. Some embodiments of the invention provid... |
|
Invention
|
Multi-tenant network management service. Some embodiments provide a method for deploying network ... |
|
Invention
|
Split control plane for private mobile network. Some embodiments of the invention provide a metho... |
|
Invention
|
Optimized system design for deploying and managing containerized workloads at scale. An example m... |
|
Invention
|
A general network policy for namespaces. Disclosed herein is a system and method for controlling ... |
|
Invention
|
Method for modifying an sd-wan using metric-based heat maps. Some embodiments provide a method fo... |
|
Invention
|
Autonomous clusters in a virtualization computing environment. Systems, apparatus, articles of ma... |
|
Invention
|
Offloading stateful services from guest machines to host resources. Some embodiments of the inven... |
|
Invention
|
Telecommunications infrastructure generation and provisioning for transport networks. Some embodi... |
|
Invention
|
Routing based on geolocation costs. Some embodiments provide a method of implementing context-awa... |
|
Invention
|
Sharing network manager between multiple tenants. Some embodiments provide a method for one of mu... |
|
Invention
|
Accelerating data message classification with smart nics. Some embodiments provide a method for p... |
|
Invention
|
Logical memory addressing by smart nic across multiple devices. Some embodiments provide a method... |
|
Invention
|
Priority-based network bandwidth allocation.
Example methods and systems for priority-based netw... |
|
Invention
|
Validation-based service request handling.
Example methods and systems for validation-based serv... |
|
Invention
|
Authentication orchestration across remote appliances. Bootstrapping a new remote appliance based... |
|
Invention
|
On-demand remote applications. Techniques for delivering remote applications to servers in an on-... |
|
Invention
|
Hosting dpu management operating system using dpu software stack. Disclosed are various examples ... |
|
Invention
|
Containerized execution of unknown files in a distributed malware detection system. A method for ... |
|
Invention
|
Automated discovery of vulnerable endpoints in an application server. The disclosure provides an ... |
|
Invention
|
Remediation method to trace and clean up malicious files in a distributed malware detection syste... |
|
Invention
|
Parallelizing data processing unit provisioning. Disclosed are various embodiments for coordinati... |
|
Invention
|
In-memory scanning for fileless malware on a host device. The disclosure herein describes the pro... |
|
Invention
|
Accountable decentralized anonymous payments.
Disclosed are examples of accountable decentralize... |
|
Invention
|
Automating secured deployment of containerized workloads on edge devices. Computer-implemented me... |
|
Invention
|
Version control interface supporting time travel access of a data lake. A version control interfa... |
|
Invention
|
Data lake with transactional semantics. A version control interface provides for accessing a data... |
|
Invention
|
Method to realize scanner redirection between a client and an agent using different scanning prot... |
|
Invention
|
End user privacy management of accessed device data. Disclosed are various examples for controlli... |
|
Invention
|
Security threat analysis.
Example methods and systems for security threat analysis are described... |
|
Invention
|
Dynamic encoding method modification for optimizing client performance.
Systems and methods are ... |
|
Invention
|
Managing cryptographic compliance on a computing device using a distributed ledger.
Disclosed ar... |
2022
|
Invention
|
Populating entropy pool with entropy from external sources.
To populate an entropy pool with ent... |
|
Invention
|
Methods for resilient multi cloud gateway interconnects.
Some embodiments of the invention provi... |
|
Invention
|
Methods and apparatus to store cluster information in a distributed datastore.
Methods, apparatu... |
|
Invention
|
Evaluation of network correctness requirement.
Some embodiments provide a method for evaluating ... |
|
G/S
|
Downloadable data sheets, white papers, reports, and brochures relating to security in networking... |
|
Invention
|
Coordinated operating system rollback.
Disclosed are various embodiments for coordinating the ro... |
|
G/S
|
Educational services, namely, conducting programs and training services in the field of cloud com... |
|
Invention
|
Mapping vlan of container network to logical network in hypervisor to support flexible ipam and r... |
2020
|
G/S
|
Downloadable security software to secure distributed applications such as microservices and other... |
2019
|
G/S
|
Downloadable computer software in the field of network security for managing, securing and optimi... |
|
G/S
|
Computer technical services in the nature of application service provider services, namely, devel... |
2018
|
G/S
|
Computer security services, namely, restricting and controlling access privileges of users of com... |
|
G/S
|
Computer software for use in accessing and managing computer networks |
|
G/S
|
Computer software that provides monitoring, analysis,
auditing, management, detecting, classifyi... |
|
G/S
|
Downloadable computer software for the management and configuration of scalable systems for cloud... |
|
G/S
|
Computer and user interface software, all for use in monitoring, analyzing, auditing, managing, d... |
|
G/S
|
Computer consultation in the field of computer security; Computer security consultancy in the fie... |
|
Invention
|
Computing environment pooling. Methods, systems, and computer-readable media that manage cloud co... |
|
G/S
|
Downloadable software for creating and managing a cloud-based software-defined data center of com... |
|
G/S
|
Software as a Service (SaaS) which monitors endpoints of a data center for known-good behavior an... |
2017
|
G/S
|
Computer services, namely, providing virtual and nonvirtual application servers, web servers, fil... |
|
G/S
|
Cloud computing featuring software for use in providing security for computer systems, servers, c... |
|
G/S
|
Downloadable electronic publications in the nature of articles, reports, newsletters and whitepap... |
|
G/S
|
Software as a service (SAAS) services featuring software to provide platform mobility for softwar... |
|
G/S
|
Computer programs and software for use in providing threat prevention, analysis, detection, and r... |
|
G/S
|
Computer software development tools; Computer software for use in implementing, deploying, execut... |
2015
|
G/S
|
Computer software development tools; Downloadable computer software for implementing data securit... |
|
G/S
|
providing online, non-downloadable software for packaging, creating and distributing other comput... |
|
G/S
|
Computer software for use in managing network communications traffic over the Internet or among n... |
|
G/S
|
Computer software for the management of storage and network resources; computer software for auto... |
|
G/S
|
computer software for use in the storage, transmission, processing, and management of data in the... |
|
G/S
|
Computer software for the management of digital storage and network resources; computer software ... |
|
G/S
|
Computer servers; IO devices; graphics processing unit (GPU) device drivers; computer storage sof... |
2014
|
G/S
|
Downloadable software platform for the management and monitoring of computing resources and the d... |
|
G/S
|
Software platform for network virtualization and security; Computer software platform for the eff... |
|
G/S
|
Software as a service (SAAS) services featuring software for use in monitoring data centers, name... |
2013
|
G/S
|
Distributorships in the field of packaged application software, open source software and software... |
|
G/S
|
Providing multiple user access to proprietary and non-proprietary collections of information by m... |
|
G/S
|
computer programs, downloadable computer programs and mobile device software for analyzing networ... |
|
G/S
|
computer programs and downloadable computer programs for use in managing, monitoring, analyzing, ... |
2012
|
G/S
|
Providing remote access to electronic computer data Computer programs that manage computing resou... |
|
G/S
|
Computer programs for the management of computing resources via the Internet and web, intranet, p... |
|
G/S
|
Software for use in operational and security monitoring and alerting, cyber defense and cyber- se... |
|
G/S
|
Enterprise computing services, namely, providing temporary use of non-downloadable software for u... |
2011
|
G/S
|
Software for providing interface and management features that enable a cloud computing management... |
|
G/S
|
Operating system software used across servers, storage and networks to aggregate hardware resourc... |