$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for distributed management of shared computers

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-015/173
  • G06F-011/00
출원번호 US-0978873 (2004-11-01)
등록번호 US-7406517 (2008-07-29)
발명자 / 주소
  • Hunt,Galen C.
  • Hydrie,Aamer
  • Levi,Steven P.
  • Stutz,David S.
  • Tabbara,Bassam
  • Welland,Robert V.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee & Hayes, PLLC
인용정보 피인용 횟수 : 88  인용 특허 : 100

초록

A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application opera

대표청구항

The invention claimed is: 1. A computer implemented method comprising: establishing boundaries between a first cluster of computers for a first entity and a second cluster of computers for a second entity housed at a co-location facility, wherein the boundaries are established by a cluster operatio

이 특허에 인용된 특허 (100)

  1. Harple Daniel L. ; Pizzarro Richard H., Apparatus for collaborative computing.
  2. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  3. Bixler David C. ; Hilger Eufemia P. ; Smith Jeffrey A. ; Wittlin Mark R. ; Siegel Neil G., Automated configuration of internet-like computer networks.
  4. Hunt Galen C., Automatic detection of per-unit location constraints.
  5. Hegde, Gopal D., Automatic filtering and creation of virtual LANs among a plurality of switch ports.
  6. Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
  7. Saitoh Fumihiko (Ryuuohchou JPX), Character recognition system using the generalized hough transformation and method.
  8. Nguyen, Nam; Kosacek, Michael, Cluster-based system and method of recovery from server failures.
  9. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  10. Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
  11. Mark Robert Funk ; Gera Goft IL; Dimitry Kloper IL; Shlomit Pinter IL; Esther Yeger-Lotem IL, Delivery of configuration change in a group.
  12. Kloth Raymond, Derived VLAN mapping technique.
  13. Hossein Moiin ; Ronald Widyono ; Ramin Modiri, Determining cluster membership in a distributed computer system.
  14. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  15. Pulsipher Eric A. ; Smith Darren D. ; Ruffatto Dominic L., Distributed internet monitoring system and method.
  16. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  17. Stuart Eichert ; Danny M. Nessett ; Wenjun Luo ; Elaine Lusher, Dynamic policy management apparatus and method using active network devices.
  18. Liu Howard T. (San Marino CA) Silvester John A. (Los Angeles CA), Dynamic resource allocation scheme for distributed heterogeneous computer systems.
  19. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  20. Hacherl Donald J., Floating single master operation.
  21. Scott L. Wiegel, Graphical network security policy management.
  22. Michael F. Deering ; Nathaniel David Naegle ; Scott R. Nelson, Graphics system configured to perform parallel sample to pixel calculation.
  23. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  24. James W. Arendt ; Ching-Yun Chao ; Rodolfo Ausgusto Mancisidor, Highly scalable and highly available cluster system management scheme.
  25. Goldszmidt,German; Lorrain,Jean A.; Maruyama,Kiyoshi; Verma,Dinesh Chandra, METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS, FOR MEETING SERVICE LEVEL AGREEMENTS (SLAS) WITH MINIMAL RESOURCES, AND ALLOWING COMMON POOLS OF RESOURCES.
  26. Walker ; Jr. Kenneth ; Wilson Gregory Alan, Method and apparatus for an account managed object class model in a distributed computing environment.
  27. Abu El Ata Nabil A., Method and apparatus for designing and analyzing information systems using multi-layer mathematical models.
  28. Wood Michael, Method and apparatus for determining accurate topology features of a network.
  29. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L., Method and apparatus for dynamically altering configurations of clustered computer systems.
  30. Bal, Subhash; Iyer, Raghunath; Iyer, Sundar; Rao, Ramana, Method and apparatus for high-speed network rule processing.
  31. Chopra, Vikram; Desai, Ajay; Iyer, Raghunath; Iyer, Sundar; Jiandani, Moti; Shelat, Ajit; Yadav, Navneet, Method and apparatus for high-speed network rule processing.
  32. Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  33. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L.; Block, Robert, Method and apparatus for managing operations of clustered computer systems.
  34. Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
  35. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
  36. Schmidt Thomas J., Method and apparatus for secure remote programming of firmware and configurations of a computer over a network.
  37. Otsuka Kazuhiro,JPX ; Horikoshi Tsutomu,JPX ; Suzuki Satoshi,JPX, Method and equipment for extracting image features from image sequence.
  38. Ma, Lucern K.; Duvvury, Murali, Method and system for high reliability cluster management.
  39. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  40. Short Robert T. ; Gamache Rod ; Massa Michael T. ; Vert John D., Method and system for resource monitoring of disparate resources in a server cluster.
  41. Bavant,Marc; Delattre,Michel, Method for the routing of IP frames between the users of a variable graph network.
  42. Saito Naoki ; Bennett Nicholas N. ; Burridge Robert, Method of determining dips and azimuths of fractures from borehole images.
  43. Sheikh, Tahir Q.; Johnson, Karl S.; Nguyen, Ken, Method of remote access and control of environmental conditions.
  44. Shamir Yoram,ILX ; Barkai Sharon,ILX ; Shani Sarit,ILX, Method of resolving split virtual LANs utilizing a network management system.
  45. Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
  46. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  47. Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
  48. Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
  49. Thomsen, Brant D., Methods of determining whether a network interface card entry within the system registry pertains to physical hardware or to a virtual device.
  50. Callis, Gregory M.; Franks, Jon Kevin; Huynh, Lap Thiet; Nguyen, Loan; Shannon, Diane Iupe; Yang, David Yu Pin, Methods systems and computer program products for processing an event based on policy rules using hashing.
  51. Kumar, Arush; Larsen, Loren Douglas; Lynch, Jeffrey James, Methods, systems and computer program products for selecting an aggregator interface.
  52. Rowland Patricia J. ; Kreeger Kevin A. ; Sanders Albert R., Model-based feature tracking system.
  53. Sarit Mukherjee ; Ibrahim Kamel ; Prasant Mohapatra, Multimedia file systems using file managers located on clients for managing network attached storage devices.
  54. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  55. Rimmer, Todd, Network data flow optimization.
  56. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  57. Engel Ferdinand ; Jones Kendall S. ; Robertson Kary ; Thompson David M. ; White Gerard, Network monitoring.
  58. Waldo James H. (Dracut MA) Arnold Kenneth C. (Newton Centre MA) Erdos Marlena E. (Somerville MA) Robinson Douglas B. (Hollis NH) Hoffman D. Jeffrey (Nashua NH) Smith Lamar D. (San Jose CA) Showman Pe, Object oriented distributed computing system processing request to other object model with code mapping by object manage.
  59. Pfeil John M. ; Mennenga Kenneth A., Production of statistically-based network maps.
  60. Gong Li, Protection domains to provide security in a computer system.
  61. Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
  62. Ernest C. Coskrey, IV ; Vernon K. Boland ; Harold B. Raynor ; Steven R. McDowell, Quorum arbitrator for a high availability system.
  63. van Ingen, Catharine; Kusters, Norbert P.; Gamache, Rod N.; Rinne, Robert D., Quorum resource arbiter within a storage network.
  64. Saeki Takao (Ann Arbor MI), Real time implementation of the hough transform.
  65. Epstein, III, Edwin A.; Souvannavong, Souk; Lu, Chia-Sheng, Resistance cell architecture.
  66. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  67. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  68. Wipfel Robert A ; Murphy David, Resource management in a clustered computer system.
  69. McNally Michael ; Vetter Brian Jay, Resource model configuration and deployment in a distributed computer network.
  70. Ernest C. Coskrey, IV, Resource protection in a cluster environment.
  71. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  72. Van Renesse, Robbert, Scalable computer network resource monitoring and location system.
  73. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  74. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  75. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Sending instructions from a service manager to forwarding agents on a need to know basis.
  76. Matsunaga Shinichi,JPX, Straight line detecting method.
  77. Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
  78. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  79. Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V.; Tabbara, Bassam; Levi, Steven P.; Rehof, Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
  80. Modiri Ramin ; Moiin Hossein,GBX, System and method for determining cluster membership in a heterogeneous distributed system.
  81. Nassar, Ayman, System and method for dynamic simultaneous connection to multiple service providers.
  82. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  83. Moiin Hossein, System and method for modifying membership in a clustered distributed computer system and updating system configuration.
  84. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  85. Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
  86. Bishop, David A.; Darcy, Paul B., System and method for remote management.
  87. Miyamoto,Carleton; Lin,Chang; Blume,William; Bandhole,Jagadish, System for dynamic provisioning of secure, scalable, and extensible networked computer environments.
  88. Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
  89. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  90. Michel K. Bowman-Amuah, System, method and article of manufacture for managing an environment of a development architecture framework.
  91. Paul Weschler, System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles.
  92. Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
  93. Christopher Sean Johnson, Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for implementing language capabilities using the same.
  94. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  95. Lee, David C.; Wang, Peter S. S.; O'Connell, Anne G., Transparent access to network attached devices.
  96. Ekstrom Joseph J. ; Gille J. Bernard, User-based binding of network stations to broadcast domains.
  97. Tanimoto Shigeaki,JPX ; Nakajima Hikoyuki,JPX ; Isoda Kunihiko,JPX ; Nagai Kouichi,JPX ; Masui Takashi,JPX, VLAN control system and method.
  98. Yuasa Hiroyoshi,JPX ; Satake Tadashi,JPX ; Cardona Mario Jose,JPX ; Fujii Hisataka,JPX ; Yasuda Akira,JPX ; Yamashita Koji,JPX ; Suzaki Satoru,JPX ; Ikezawa Hideki,JPX ; Ohno Masami,JPX ; Matsuzaki A, Virtual LAN system.
  99. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.
  100. Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.

이 특허를 인용한 특허 (88)

  1. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  2. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  3. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  4. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  5. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  6. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  7. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  8. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  9. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  10. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  11. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  12. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  13. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  14. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  15. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  16. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  17. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  18. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  19. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  20. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  21. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  22. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  23. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  24. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  25. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  26. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  27. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  28. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  29. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  30. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  31. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  32. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  33. Krishnappa, Nagendra; Yarangatta, Asha Ramamurthy; Chakravarti, Avishek, Method and system for forming a cluster of networked nodes.
  34. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  35. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  36. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  37. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  38. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  39. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  40. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  41. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  42. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  43. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  44. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  45. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  46. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  47. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  48. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  49. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  50. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  51. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  52. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  53. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  54. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  55. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  56. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  57. Sebes, E. John, Solidifying the executable software set of a computer.
  58. Sebes, E. John, Solidifying the executable software set of a computer.
  59. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  60. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  61. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  62. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  63. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  64. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  65. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  66. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  67. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  68. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  69. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  70. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  71. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  72. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  73. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  74. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  75. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  76. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  77. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  78. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  79. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  80. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  81. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  82. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  83. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  84. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  85. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  86. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  87. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  88. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트