$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Model-based virtual system provisioning 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/44
  • G06F-009/455
  • G06F-009/445
출원번호 US-0857480 (2015-09-17)
등록번호 US-9811368 (2017-11-07)
발명자 / 주소
  • Vinberg, Anders B.
  • Fries, Robert M.
  • Grealish, Kevin
  • Hunt, Galen C.
  • Hydrie, Aamer
  • Lassettre, Edwin R.
  • Mensching, Rob
  • Outhred, Geoffrey
  • Parchem, John M.
  • Tabbara, Bassam
  • Vega, Rene Antonio
  • Welland, Robert V.
  • Winner, Eric J.
  • Woolsey, Jeffrey A.
출원인 / 주소
  • Microsoft Technology Licensing, LLC
대리인 / 주소
    Baker & Hostetler LLP
인용정보 피인용 횟수 : 0  인용 특허 : 392

초록

Model-based virtual system provisioning includes accessing a model of a workload to be installed on a virtual machine of a system as well as a model of the system. A workload refers to some computing that is to be performed, and includes an application to be executed to perform the computing, and op

대표청구항

1. A method comprising: accessing a model of a workload to be installed on a virtual machine of a system, wherein the model of the workload includes constraint information associated with the workload;accessing a model of the system, wherein the model of the system includes constraint information as

이 특허에 인용된 특허 (392)

  1. Murthy V. Devarakonda ; Daniel Manuel Dias ; German Sergio Goldszmidt ; Guerney Douglass Holloway Hunt ; Arun Kwangil Iyengar ; Richard Pervin King ; Rajat Mukherjee, Affinity-based router and routing method.
  2. Eshghi,Kave; Frolund,Svend, Allowing requests of a session to be serviced by different servers in a multi-server data service system.
  3. Williams,Lyndsay, Altering a display on a viewing device based upon a user proximity to the viewing device.
  4. Aoki, Ryuichi, Apparatus and method for depositing encryption keys.
  5. Branson, Michael John; DeStefano, George Francis; Haugen, Ronald Joseph; Hintermeister, Gregory Richard; Hurlebaus, Gregory Scott; Lindberg, Erik Duane; Sandifer, David Henry; Townsend, Susette Marie, Apparatus and method for synchronizing software between computers.
  6. Harple ; Jr. Daniel L. ; Pizzarro Richard H., Apparatus for collaborative computing.
  7. Harple Daniel L. ; Pizzarro Richard H., Apparatus for collaborative computing.
  8. Makoto Saito JP, Apparatus for data copyright management system.
  9. Fung,Henry T., Apparatus, architecture, and method for integrated modular server system providing dynamically power-managed and work-load managed network devices.
  10. Farkas,Keith Istvan; Ranganathan,Parthasarathy, Application management based on power consumption.
  11. Heller, Howard A.; Proctor, Jr., James A., Applying session services based on packet flows.
  12. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  13. Brown,Mathilde C.; Chase,Charlie D.; Grealish,Kevin; Hunt,Galen C.; Hydrie,Aamer; Noble,David; Outhred,Geoffrey; Peterson,Glenn R.; Tabbara,Bassam; Torone,Alexander; Welland,Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  14. Brown,Mathilde C.; Chase,Charlie D.; Grealish,Kevin; Hunt,Galen C.; Hydrie,Aamer; Noble,David; Outhred,Geoffrey; Peterson,Glenn R.; Tabbara,Bassam; Torone,Alexander; Welland,Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  15. Brown,Mathilde C.; Chase,Charlie D.; Grealish,Kevin; Hunt,Galen C.; Hydrie,Aamer; Noble,David; Outhred,Geoffrey; Peterson,Glenn R.; Tabbara,Bassam; Torone,Alexander; Welland,Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  16. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  17. Kryskow, Jr.,Joseph M.; Hudnall,Richard E.; Kopp,Lowell, Auto control of network monitoring and simulation.
  18. Bixler David C. ; Hilger Eufemia P. ; Smith Jeffrey A. ; Wittlin Mark R. ; Siegel Neil G., Automated configuration of internet-like computer networks.
  19. Suorsa,Raymond E., Automated provisioning framework for internet site servers.
  20. Suorsa,Raymond E.; LeVasseur,Joshua T., Automated provisioning of computing networks according to customer accounts using a network database data model.
  21. Suorsa,Raymond E.; Poskanzer,Harold; Ferguson,Glenn; LeVasseur,Joshua T., Automated provisioning of computing networks using a network database model.
  22. Hunt Galen C., Automatic detection of per-unit location constraints.
  23. Hegde, Gopal D., Automatic filtering and creation of virtual LANs among a plurality of switch ports.
  24. Crisan, Adrian, Automatic system configuration management.
  25. Belenkaya,Bronislava G.; Sakharova,Valentina I.; Polevov,Vyacheslav N., Biodegradable absorbents and methods of preparation.
  26. Underwood, Roy Aaron, Business components framework.
  27. Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
  28. Saitoh Fumihiko (Ryuuohchou JPX), Character recognition system using the generalized hough transformation and method.
  29. Timothy Roy Block ; Rodney Lee Rabe, Cluster node distress signal.
  30. Asai, Rieko; Omura, Takeshi; Horiuchi, Masaki, Cluster server apparatus.
  31. Nguyen, Nam; Kosacek, Michael, Cluster-based system and method of recovery from server failures.
  32. Hayball Clive Colin,GBX ; Tattersfield Peter Jamieson,GBX ; Bragg Nigel Lawrence,GBX, Communications network having management system architecture supporting reuse.
  33. Le,Bich C.; Khandekar,Dilip; Raghuram,Sirishkumar, Computer image capture, customization and deployment.
  34. Rittie Kevin J. ; Chmilewski Michael ; Walsh Jeff ; MacAnespie Alan, Computer implemented object oriented visualization system and method.
  35. Corynen, Guy Charles, Computer method and user interface for decision analysis and for global system optimization.
  36. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  37. Kodosky,Jeffrey L.; Shah,Darshan; Rogers,Steven W., Configuration diagram which graphically displays program relationship.
  38. Goh, Cheh; Marco, Casassa Mont; Baldwin, Adrian John, Configuring computer systems.
  39. McGuire, Jacob, Console mapping tool for automated deployment and management of network devices.
  40. Lu, Leonard L.; Hsing, Deh-phone K.; Cheng, Bo-Chao; Wu, Tsong-Ho, Content-aware application switch and methods thereof.
  41. Chandra, Tushar Deepak; Fakhouri, Sameh Afif; Fong, Liana Liyow; Jerome, William Francis; Krishnakumar, Srirama Mandyam; Naik, Vijay Krishnarao; Pershing, Jr., John Arthur; Turek, John Joseph Edward, Controlling a number of instances of an application running in a computing environment.
  42. Beams,Brian R.; Harris,Scott B., Creating collaborative application sharing.
  43. Krause Michael R., Creation and migration of distributed streams in clusters of networked computers.
  44. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  45. Bandhole,Jagadish; Nanja,Sekaran; Balasubramaniam,Shan, Cross-spectrum application model for dynamic computing environments in software lifecycle.
  46. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  47. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  48. Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
  49. Christopher James Holloway GB, Data communications system using public key cryptography in a web environment.
  50. Makoto Saito JP, Data copyright management system.
  51. Humenansky,Brian S; Bowen,David S; Pearson,George Duncan; Sandles,Jon M; Aschenbrener,Clarence A; Antrobus,Mark, Deploying multiple enterprise planning models across clusters of application servers.
  52. Leathers,Burton; Legault,Christian, Deployment manager for organizing and deploying an application in a distributed computing environment.
  53. Or,Yan; Casier,Johan; Garimella,Krishna; Bellur,Umesh; Koper,John; Joshi,Shashank; Sundaresan,Vinu, Deployment of applications in a multitier compute infrastructure.
  54. Kloth Raymond, Derived VLAN mapping technique.
  55. Bowman Amuah,Michel K., Development architecture framework.
  56. Leung,Ying Tat; Parija,Gyana Ranjan; Sharma,Samir, Diagnosis of equipment failures using an integrated approach of case based reasoning and reliability analysis.
  57. Aseem Vaid ; Sanjeev Putta ; Gregory Rakoshitz, Directory enabled policy management tool for intelligent traffic management.
  58. Kuga Kaeko (Kyoto JPX), Display apparatus.
  59. Erickson,Rodger D., Distributed cache for state transfer operations.
  60. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  61. Azer Bestavros ; Mark E. Crovella, Distributed routing.
  62. Couland Ghislaine,FRX ; Hunt Guerney Douglass Holloway ; Levy-Abegnoli Eric Michel,FRX ; Jean-Marie Mauduit Daniel Georges,FRX, Distributed scalable device for selecting a server from a server cluster and a switched path to the selected server.
  63. Bruck, Jehoshua; Bohossian, Vasken; Fan, Chenggong; LeMahieu, Paul; Love, Philip, Distributed server cluster for controlling network traffic.
  64. Bruck, Jehoshua; Bohossian, Vasken; Fan, Chenggong Charles; LeMahieu, Paul; Love, Philip, Distributed server cluster with graphical user interface.
  65. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  66. Narisi, Anthony; Coyne, Lois B.; Jennion, Susan; Kain, Michael T.; Parker, Charles Austin, Distributed transport communications manager with messaging subsystem for high-speed communications between heterogeneous computer systems.
  67. Kubota, Yasuo; Shiba, Nobuo, Distributed-object development system and computer-readable recording medium recorded with program for making computer execute distributed-object development.
  68. David Zager ; Robert Kostes, Dynamic modeling of complex networks and prediction of impacts of faults therein.
  69. Stuart Eichert ; Danny M. Nessett ; Wenjun Luo ; Elaine Lusher, Dynamic policy management apparatus and method using active network devices.
  70. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; Yu Philip Shi-Lung, Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy.
  71. Liu Howard T. (San Marino CA) Silvester John A. (Los Angeles CA), Dynamic resource allocation scheme for distributed heterogeneous computer systems.
  72. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter apparatus and method.
  73. Azagury,Alain; Koren,Yair; Rochwerger,Benny; Tal,Arie, Efficient application deployment on dynamic clusters.
  74. Westberg Lars,SEX, Efficient transport of internet protocol packets using asynchronous transfer mode adaptation layer two.
  75. Bishop,David A.; Hoover,Kelvin M., Enterprise management system.
  76. Carley,Kevin W.; Harrington,Lisa Marie; Dikeman,Jennifer Scot; Moody,Megan Davies; Gregory,Mary Michelle, Error and load summary reporting in a health care solution environment.
  77. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  78. McNeill Thomas G. ; Ekstrom Joseph J. ; Moss Stephen S., Establishing connectivity in networks.
  79. Brandon L. Buteau ; Christine S. Moulton, Evaluation of enterprise architecture model including relational database.
  80. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  81. Aziz, Ashar; Markson, Tom; Patterson, Martin, Extensible computing system.
  82. Schoening Charles B. ; Smith ; Jr. Richard J. ; Schleimer Stephen I., Extensible network management system.
  83. Mashayekhi, Victor; Hsieh, Jenwei; Rooholamini, Mohamad Reza, Failover system and method for cluster environment.
  84. Mashayekhi,Victor; Hsieh,Jenwei; Rooholamini,Mohamad Reza, Failover system and method for cluster environment.
  85. Mashayekhi,Victor; Hsieh,Jenwei; Rooholamini,Mohamad Reza, Failover system and method for cluster environment.
  86. Hunt,Galen C.; Simon,Jeff, Filters to isolate untrusted ports of switches.
  87. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  88. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  89. Axnix,Christine; Kuebl,Klaus Jurgen; Muehlbach,Andreas; Probst,Juergen Josef; Hollenback,Carl J.; Kubala,Jeffrey P., Flexible temporary capacity upgrade/downgrade in a computer system without involvement of the operating system.
  90. Zinky, John A.; Schantz, Richard R.; Bakken, David E.; Loyall, Joseph P., Framework for providing quality of service requirements in a distributed object-oriented computer system.
  91. Beelitz Alan E. ; Maia Paul J., Generation of a compatible order for a computer system.
  92. Patterson,Martin, Graphical editor for defining and creating a computer system.
  93. Scott L. Wiegel, Graphical network security policy management.
  94. Kodosky,Jeffrey L.; Shah,Darshan; Rogers,Steven W., Graphically deploying programs on devices in a system.
  95. Fearn,Paul; Olsson,Stig Arne; Vijayan,Geetha, Graphics for end to end component mapping and problem-solving in a network environment.
  96. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  97. Kamiwada, Toru; Fujita, Takushi, Gui display, and recording medium including a computerized method stored therein for realizing the gui display.
  98. James W. Arendt ; Ching-Yun Chao ; Rodolfo Ausgusto Mancisidor, Highly scalable and highly available cluster system management scheme.
  99. Tormasov,Alexander; Lunev,Dennis; Beloussov,Serguei; Protassov,Stanislav; Pudgorodsky,Yuri, Hosting service providing platform system and method.
  100. Akriche Jean,FRX ; Lanquetin Jean-Marie,FRX ; Leteinturier Alain,FRX ; Sitbon Gerard,FRX ; Touzan Jean-Fran.cedilla.ois,FRX, Information processing system architecture.
  101. Chandy, K. Mani; Kiniry, Joseph; Rifkin, Adam; Zimmerman, Daniel; Tanaka, Wesley; Weisman, Luke, Infospheres distributed object system.
  102. Sierer,Brian H.; Sommerville,Jason D.; Klemett,Kristofer J.; Salem,Narendrakumar U.; Wendland,Wesley N., Installing software using programmatic component dependency analysis.
  103. Rowley,Kevin; Brandenburg,Dale P.; Clinton,Greg C.; Jones,Derrick C.; Mody,Pankaj H., Installing supervisory process control and manufacturing software from a remote location and maintaining configuration data links in a run-time environment.
  104. Dynarski, Richard J.; Harper, Matthew; Bezaitis, Andrew; Xu, Yingchun; Peirce, Jr., Kenneth L., Instant activation of point-to point protocol (PPP) connection using existing PPP state.
  105. Avery, IV, Albert M.; Adelson, Jay Steven; Vogt, Derrald Curtis, Internet co-location facility security system.
  106. Abramson, Nathan; Chung, Joseph T., Internet server session backup apparatus.
  107. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system with verification by comparison.
  108. Ando Hiroyuki,JPX ; Morita Ichirou,JPX ; Kuroda Yasutsugu,JPX ; Torii Naoya,JPX ; Yamazaki Masashi,JPX ; Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Sei, Key recovery system.
  109. Kazemi,Saied; Wright,Alan; Ngo,Dai; Sabdar,Reza; Sadri,Reza; Higgins,Steven, Load balancing in a dynamic session redirector.
  110. Okano, Tetsuya; Ochi, Akiyoshi; Mochizuki, Tomotsugu; Takaba, Koichi, Load balancing system.
  111. LeBlanc Frederick W. ; Dupray Dennis J. ; Karr Charles L., Location of a mobile station using a plurality of commercial wireless infrastructures.
  112. Goldszmidt,German; Lorrain,Jean A.; Maruyama,Kiyoshi; Verma,Dinesh Chandra, METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS, FOR MEETING SERVICE LEVEL AGREEMENTS (SLAS) WITH MINIMAL RESOURCES, AND ALLOWING COMMON POOLS OF RESOURCES.
  113. Fakhouri,Sameh A.; Jerome,William F.; Kummamuru,Krishna; Naik,Vijay K.; Pershing, Jr.,John A.; Raina,Ajay; Varma,Pradeep; Badovinatz,Peter R.; Kumar,Vijay, Managing a cluster of networked resources and resource groups using rule-base constraints in a scalable clustering environment.
  114. Yadav, Satyendra; Tang, Puqi, Managing data traffic on multiple ports.
  115. Agarwal,Vikas; Chafle,Girish; Karnik,Neeran Mohan; Kumar,Arun; Kundu,Ashish; Shahabuddin,Johara; Varma,Pradeep, Managing server resources for hosted applications.
  116. Roberts,Jason; Mohammed,Mazhar; Wittel,Walter; Shepard,Marc, Managing software updates and a software distribution service.
  117. Davis,Andrew T.; Parikh,Jay G.; Thirumalai,Srikanth; Weihl,William E.; Tsimelzon,Mark, Managing web tier session state objects in a content delivery network (CDN).
  118. Goss Lois, Manufacturing system and method for assembly of computer systems in a build-to-order environment.
  119. Schmit, Geoffrey; Schwan, Brent; Brumley, Jonathan; Makowski, Thomas A.; Bartz, Christopher T., Measurement system software architecture for easily creating high-performance measurement applications.
  120. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  121. Cuomo,Gennaro A.; Fraenkel,Michael L.; Martin,Brian Keith, Method and apparatus for affinity of users to application servers.
  122. Boland, Vernon K., Method and apparatus for allocating network resources and changing the allocation based on dynamic workload changes.
  123. Downs Terry ; Kisor Gregory Hurst, Method and apparatus for allocating tasks to remote networked processors.
  124. Birkholz,Suellen Kae; Egan,Carol Ann; Ewert,Clair L.; Fritsch,James R.; Gressett,John David; Olson Williams,Lonny R., Method and apparatus for automating software upgrades.
  125. Bhat Kabekode V. (Naperville IL), Method and apparatus for capacity planning for multiprocessor computer systems in client/server environments.
  126. Lynch,John; Franke,David, Method and apparatus for configuring systems.
  127. Aziz, Ashar; Markson, Tom; Patterson, Martin; Gray, Mark, Method and apparatus for controlling an extensible computing system.
  128. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  129. Abu El Ata Nabil A., Method and apparatus for designing and analyzing information systems using multi-layer mathematical models.
  130. Wood Michael, Method and apparatus for determining accurate topology features of a network.
  131. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for determining an identity of a network device.
  132. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  133. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L., Method and apparatus for dynamically altering configurations of clustered computer systems.
  134. Balfanz,Dirk; Smetters,Diana K.; Stewart,Paul Joseph; Durfee,Glenn E.; Grinter,Rebecca E.; Wong,Hao Chi, Method and apparatus for establishing and using a secure credential infrastructure.
  135. Bal, Subhash; Iyer, Raghunath; Iyer, Sundar; Rao, Ramana, Method and apparatus for high-speed network rule processing.
  136. Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  137. Lovy,David M.; Fagan,Brant M.; Bojanek,Robert J., Method and apparatus for identifying problems in computer networks.
  138. Lovy,David M.; Fagan,Brant M.; Bojanek,Robert J., Method and apparatus for identifying problems in computer networks.
  139. Mangipudi,Krishna; Basani,Vijay, Method and apparatus for implementing a service-level agreement.
  140. Vilhuber,Jan; Pritikin,Max, Method and apparatus for integrated provisioning of a network device with configuration information and identity certification.
  141. Colasurdo, David B.; Hasti, Srinivas; Montero, Gabriel G., Method and apparatus for maintaining session affinity across multiple server groups.
  142. Ching-Yun Chao ; Patrick M. Goal ; Richard James McCarty, Method and apparatus for managing clustered computer systems.
  143. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L.; Block, Robert, Method and apparatus for managing operations of clustered computer systems.
  144. Mayer,Alain Jules, Method and apparatus for network wide policy-based analysis of configurations of devices.
  145. Tremain,Geoffrey Donald, Method and apparatus for providing computer services.
  146. Henson Ken, Method and apparatus for providing customer configured machines at an internet site.
  147. Pawan Goyal ; Gisli Hjalmtysson, Method and apparatus for providing quality of service using the internet protocol.
  148. Gusler, Carl Phillip; Hamilton, II, Rick Allen, Method and apparatus for providing user support based on contextual information.
  149. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
  150. Bailey, R. Andrew; Giambrone, Leonard T., Method and apparatus for remote installation of an operating system over a network connection.
  151. Joel M. Halpern ; Zdenek Becka ; Wan Chen, Method and apparatus for routing server redundancy in a network having carrier scale internetworking.
  152. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
  153. Ben Nun, Michael; Ravid, Sagi; Barak, Itzhak; Weill, Ofer, Method and apparatus for scalable process flow load balancing of a multiplicity of parallel packet processors in a digital communication network.
  154. Schmidt Thomas J., Method and apparatus for secure remote programming of firmware and configurations of a computer over a network.
  155. Challener David Carroll ; Desai Dhruv Manmohandas ; Rohatgi Pankaj ; Safford David Robert, Method and apparatus for securing communication utilizing a security processor.
  156. Pullara,Sam; Halpern,Eric M.; Peddada,Prasad; Messinger,Adam; Jacobs,Dean Bernard, Method and apparatus for session replication and failover.
  157. Olkin Jeffrey C. ; Porter Mark A., Method and apparatus for storing and transferring data on a network.
  158. Einkauf Robert L. (Fremont CA) Riley Glen M. (Los Gatos CA) Von De Bur James M. (San Jose CA), Method and apparatus for storing interface information in a computer system.
  159. Robert A. Dolin, Jr. ; Robert L. Einkauf ; Glen M. Riley, Method and apparatus for treating a logical programming expression as an event in an event-driven computer environment.
  160. Gehrmann, Christian, Method and arrangement in a communication network.
  161. Al-Hilali Hilal ; Clarke Perry ; Guimbellot David Edward ; Howell David Andrew, Method and computer program product for estimating total resource usage requirements of a server application in a hypothetical user configuration.
  162. Otsuka Kazuhiro,JPX ; Horikoshi Tsutomu,JPX ; Suzuki Satoshi,JPX, Method and equipment for extracting image features from image sequence.
  163. Bond, William C., Method and estimator for providing capacacity modeling and planning.
  164. Graupner,Sven; Kotov,Vadim; Trinks,Holger, Method and framework for generating an optimized deployment of software applications in a distributed computing environment using layered model descriptions of services and servers.
  165. Kampe, Mark A.; Gien, Michel; Penkler, David; Jacquemot, Christian; Herrmann, Frederic; Armand, Francois; Fenart, Jean-Marc; Campbell, David F.; Baltz, Lawrence E., Method and system for achieving high availability in a networked computer system.
  166. Lin,Paul; Hon,Henry, Method and system for controlling access to data stored on a data storage device.
  167. Kassan,Peter; Youchnow,Steven, Method and system for correlating job accounting information with software license information.
  168. Pace,Charles P.; Pizzorni,Paolo R.; Deforest,Darin S.; Chen,Shuang, Method and system for deploying an asset over a multi-tiered network.
  169. Poli, Christopher; Makofka, Douglas S.; Lehrman, Ira S.; Del Sordo, Christopher S.; Bates, IV, Thomas F., Method and system for downloading and managing the enablement of a list of code objects.
  170. Gorczyca Robert ; Rashid Aamir Arshad ; Rodgers Kevin Forress ; Warnsman Stuart ; Weaver Thomas Van, Method and system for dynamically reconfiguring a cluster of computer systems.
  171. Berg,Mitchell T., Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation.
  172. Ma, Lucern K.; Duvvury, Murali, Method and system for high reliability cluster management.
  173. Vrhel, Jr., Thomas; Barajas, Gaston M., Method and system for installing and testing build-to-order components in a defined configuration computer system.
  174. Lawson, Todd C.; Cave, Warren D.; Fisher, Kamika Layne, Method and system for intelligent global event notification and control within a distributed computing environment.
  175. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  176. Sen, Ranjan K., Method and system for maintaining service dependency relationships in a computer system.
  177. Marinelli,Claudio; Pichetti,Luigi, Method and system for managing configuration changes in a data processing system.
  178. Hosein, Patrick A., Method and system for network traffic rate control based on fractional tokens.
  179. Solden,Sherry; Harcourt,Edwin A.; La Rue, Jr.,William W.; Dunlop,Douglas D.; Hoover,Christopher; Chao,Qizhang; Agrawal,Poonam; Beverly,Aaron; Chiodo,Massimiliano L.; Bhatnagar,Neeti K.; Desai,Soumya;, Method and system for performance level modeling and simulation of electronic systems having both hardware and software elements.
  180. Clark, Bonnie S; Espinoza, Emma M; Harris, Catherine E; Hassel, Margaret M; Neroda, Anita Elizabeth; Paquette, Michael Thane; Roper, Danny Lee; Ukena, Carolyn Marie; Votava, Stephen James, Method and system for presenting billing information according to a customer-defined hierarchal structure.
  181. Peterson, Glenn R.; Gamache, Rod; Massa, Michael T.; Kusters, Norbert P., Method and system for remote access to computer devices via client managed server buffers exclusively allocated to the client.
  182. Short Robert T. ; Gamache Rod ; Massa Michael T. ; Vert John D., Method and system for resource monitoring of disparate resources in a server cluster.
  183. Waugh, Donald Craig; Roberts, Michael Albert; Alibhai, Rahim, Method and system for restricting access to the private key of a user in a public key infrastructure.
  184. Dobbins Kurt ; Andlauer Phil ; Skubisz Michael, Method for establishing restricted broadcast groups in a switched network.
  185. Rajamadam C. Venkatram ; Ravi Viswanath ; Unmesh Sahasrabuddhe ; Ashish Warty ; Rahul Khandkar, Method for generating secure symmetric encryption and decryption.
  186. Shimabukuro Jun (Kawasaki JPX) Nagamatsu Yuji (Sagamihara JPX) Ikeuchi Yoshimi (Yokohama JPX) Kondo Kazuyuki (Yokohama JPX), Method for making test environmental programs.
  187. Litwin, Jr.,Louis Robert; Ramaswamy,Kumar; Pugel,Michael Anthony, Method for providing security on a powerline-modem network.
  188. Bavant,Marc; Delattre,Michel, Method for the routing of IP frames between the users of a variable graph network.
  189. Han Mi-Sook,KRX ; Lee Eon-Kyung,KRX ; Oh Moon-Kyun,KRX, Method of assigning connection identifier in asynchronous transfer mode switching system.
  190. Staelin Carl, Method of automatically generating a software installation package.
  191. Dent, Paul W.; Rydbeck, Nils, Method of bilateral identity authentication.
  192. Martin Sean James,GBX ; Stanford-Clark Andrew James,GBX, Method of load balancing across the processors of a server.
  193. Sheikh, Tahir Q.; Johnson, Karl S.; Nguyen, Ken, Method of remote access and control of environmental conditions.
  194. Shamir Yoram,ILX ; Barkai Sharon,ILX ; Shani Sarit,ILX, Method of resolving split virtual LANs utilizing a network management system.
  195. Zara,Anna M.; Singhal,Sharad, Method to map an inventory management system to a configuration management system.
  196. Chiu, Willy W.; Halim, Nagui; Hellerstein, Joseph L.; Krueger, Jr., LeRoy Albert; Mills, III, W. Nathaniel; Squillante, Mark S., Method, computer program product, and system for deriving web transaction performance metrics.
  197. Maves Walter,CAX ; McGuirk Fred,CAX ; Bennett James,CAX ; Clarke Matthew,CAX, Method, system and data structures for computer software application development and execution.
  198. Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
  199. Pace,Charles P.; Pizzorni,Paolo R.; Chen,Shuang, Method, system, and structure for distributing and executing software and data on different network and computer devices, platforms, and environments.
  200. Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
  201. Ronald Leonard Westfall CA; Paul Terry CA; John M. Siu CA; Aaron S. Mar CA, Methods and apparatus for deploying quality of service policies on a data communication network.
  202. Keller,Alexander; Kar,Gautam; Hassinger,Sebastian D., Methods and apparatus for impact analysis and problem determination.
  203. Coleman,David Wiley; Froehlich,Steven E.; Hellerstein,Joseph L.; Hsiung,Lawrence S.; Lassettre,Edwin Richie; Mummert,Todd William; Raghavachari,Mukund; Russell,Lance Warren; Surendra,Maheswaran; Wadia,Noshir Cavas; Ye,Peng, Methods and apparatus for managing computing deployment in presence of variable workload.
  204. Keller, Alexander; Blumenthal, Uri; Jackson, Lorraine; Kar, Gautam, Methods and apparatus for managing dependencies in distributed systems.
  205. Coates,Joshua L.; Bozeman,Patrick E.; Gautier,Taylor, Methods and apparatus for off loading content servers through direct file transfer from a storage center to an end-user.
  206. Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
  207. Wheeler,Graham A., Methods for authenticating potential members invited to join a group.
  208. Thomsen, Brant D., Methods of determining whether a network interface card entry within the system registry pertains to physical hardware or to a virtual device.
  209. Callis, Gregory M.; Franks, Jon Kevin; Huynh, Lap Thiet; Nguyen, Loan; Shannon, Diane Iupe; Yang, David Yu Pin, Methods systems and computer program products for processing an event based on policy rules using hashing.
  210. Kumar, Arush; Larsen, Loren Douglas; Lynch, Jeffrey James, Methods, systems and computer program products for selecting an aggregator interface.
  211. So,Tricci Y.; Roberts,Lawrence G.; Lakhani,Faizel Z.; McBrayne,John A.; Croke,Gary G., Micro-flow label switching.
  212. Roberts, Lawrence G., Micro-flow management.
  213. Cohen, Alain; Cathey, George; Malloy, Patrick J., Mixed mode network simulator.
  214. Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
  215. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  216. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  217. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  218. Brown,Kyle Gene; Larsen,Grant J.; Majumdar,Arunava; McElroy,Thomas Francis; Vasudeva,Guruprasad Chitrapur, Model-driven software deployment in an application server.
  219. Contreras, Alfredo; White, Jeffrey Alan; Williams, William Bradley, Modeling objects, systems, and simulations by establishing relationships in an event-driven graph in a computer implemented graphics system.
  220. Krontz Jeoff M. ; Emerson Theodore F., Modem sharing.
  221. Whitted,William H.; Aigner,Gerald, Modular data center.
  222. O'Brien, Eric David; Tryon, Jr., James Robert, Modular framework for dynamically processing network events using action sets in a distributed computing environment.
  223. Stone, Bradley A., Monitoring and control engine for multi-tiered service-level management of distributed web-application servers.
  224. Chase,Jeffrey S.; Doyle,Ronald P.; Ims,Steven D., Multi-tier service level agreement method and system.
  225. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R., Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects.
  226. Hirschfeld,Robert A.; McCrory,Dave D., Near on-line server.
  227. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  228. Curtis David C. ; Curtis Kathleen P. ; Denunzio David D. ; Reed William P. ; Wolak Robert A., Network configuration management system for digital communication networks.
  229. Rimmer, Todd, Network data flow optimization.
  230. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  231. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  232. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  233. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  234. Hasan,Taqi; Gannesan,Elango; Rochkind,Allen B.; Golla,Sagar, Network management system.
  235. Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
  236. Engel Ferdinand ; Jones Kendall S. ; Robertson Kary ; Thompson David M. ; White Gerard, Network monitoring.
  237. Dowd,Alan; Markham,Thomas R.; Foote Lennox,Tomo; Apostal,David; Lu,Raymond, Network security modeling system and method.
  238. Hinson, Gerald L.; Al-Ghosein, Mohsen; Dumitru, Donald W.; McCrady, Donald J.; Pollack, Seth B.; Swartz, Stephen T., Object connectivity through loosely coupled publish and subscribe events.
  239. Mohsen Al-Ghosein ; Jan S. Gray ; Amit Mital ; Rodney Limprecht, Object load balancing.
  240. Iyer, Mahadevan; Apsani, Lavanya; Malviya, Pankaj, Object model for network policy management.
  241. Yamamoto, Rieko; Nakayama, Yuko; Uehara, Tadahiro, Object-oriented software development support apparatus and development support method.
  242. Sero,Pascal; Dangeard,Marc; Walsh,Kevin, One click deployment.
  243. Fuller, III,David W.; Santori,Michael L.; Sierer,Brian; Ranganathan,Ganesh; Pasquarette,John; Peck,Joseph E.; Novacek,Matthew; Andrade,Hugo A.; Petersen,Newton, Online specification of a system which compares determined devices and installed devices.
  244. Sherman,Nathan C., Optical out-of-band key distribution.
  245. Lu,Leonard L.; Hsing,Deh Phone K.; Cheng,Bo Chao; Wu,Tsong Ho, Packet switch with load surge-control and methods thereof.
  246. Demizu Noritoshi,JPX, Packet-Transmission control method and packet-transmission control apparatus.
  247. Volpano,Dennis Michael, Personal virtual bridged local area networks.
  248. Araujo Kenneth ; Wang Peter Si-Sheng, Point-to-point protocol with a signaling channel.
  249. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network.
  250. Rayes,Ammar; Cheung,Michael, Policy-based network security management.
  251. Rawlins,Diana; Yao,Lei; McDysan,David E., Policy-based synchronization of per-class resources between routers in a data network.
  252. Keith, Jr., Robert O., Pre-install compliance system.
  253. Ross, Niall; White, Anthony Richard Phillip, Problem model for alarm correlation.
  254. Dardinski,Steven; Eldridge,Keith; Hall,Robert; Johnson,Mark; McKay,Brian; Meskonis,Paul; Volk,Scott, Process control configuration system with connection validation and configuration.
  255. Sonty Atashi C. (Pittsford NY) Faria Jose A. (Rochester NY) Willett Alan W. (Rochester NY) Ciulla Kim P. (Honcoye Falls NY) Comparetta Christopher (Pittsford NY) Latone Jack T. (Rochester NY), Process for configuration management.
  256. Black,Darryl; Winiewicz,Anne K, Processing network management data in accordance with metadata files.
  257. Darr,Timothy P.; Beaumont,Raymond L.; Sharma,Nirad P., Product configuration using configuration patterns.
  258. Pfeil John M. ; Mennenga Kenneth A., Production of statistically-based network maps.
  259. Doli ; Jr. Robert A. (Menlo Park CA) Einkauf Robert L. (Fremont CA) Riley Glen M. (Los Gatos CA), Programming language structures for use in a network for communicating, sensing and controlling information.
  260. Gong Li, Protection domains to provide security in a computer system.
  261. St. Pierre, Robert P., Protocol for a remote control device to enable control of network attached devices.
  262. Peter K. Craft ; Olive M. Philbrick ; Laurence B. Boucher ; David A. Higgen, Protocol processing stack for use with intelligent network interface device.
  263. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., Providing automatic policy enforcement in a multi-computer service application.
  264. Christensen Brent Ray ; Davis Howard Rollin ; Harral Adam Lee, Proxy cache cluster.
  265. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  266. Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
  267. Stein, Mitchell Jay, Reactive user interface control based on environmental sensing.
  268. Saeki Takao (Ann Arbor MI), Real time implementation of the hough transform.
  269. Brownell,Vern; Manca,Pete; Sprachman,Ben; Curtis,Paul; Milne,Ewan; Smith,Max; Greenspan,Alan; Geng,Scott; Busby,Dan; Duffy,Edward; Schulter,Peter, Reconfigurable, virtual processing system, cluster, network and method.
  270. Drake, Daniel R.; Sizemore, Robert C., Remote validation of installation input data.
  271. Garg,Pankaj K.; Santos,Cipriano A.; Tang,Hsiu Khuern; Zhang,Alex, Resource allocation for multiple applications.
  272. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  273. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  274. Wipfel Robert A ; Murphy David, Resource management in a clustered computer system.
  275. McNally Michael ; Vetter Brian Jay, Resource model configuration and deployment in a distributed computer network.
  276. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  277. Walsh,Robert; O'Sullivan,Bryan, Revision control system for large-scale systems management.
  278. Van Renesse, Robbert, Scalable computer network resource monitoring and location system.
  279. Layton, Jeffrey S.; Dube, Shawn J., Scalable environmental data calculation method customized by system configuration.
  280. Saunders Keith A.,GBX, Secure data processing method and system.
  281. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  282. Slick,Royce E.; Zhang,William; Purpura,Don Francis; Iwamoto,Neil Y.; Mazzagatte,Craig, Secure printing with authenticated printer key.
  283. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  284. Shavit Nir N., Secure software system and related techniques.
  285. Gage William W. A.,CAX ; Wollensak Martin,CAX ; Himbeault Lee,CAX, Secure virtual LANs.
  286. Anderson,Jeffrey Wayne; Chu,Simon; Dayan,Richard Alan; Donovan,Peter Thomas, Server blade network boot method that minimizes required network bandwidth.
  287. Hirschfeld,Robert A.; Pollan,C. Evan; McCrory,Dave D., Server file management.
  288. Hunt, Galen C., Service installation on a base function and provision of a pass function with a service-free base function semantic.
  289. Nishiki, Kenya; Ota, Masataka; Yoshida, Kenichi, Service management system.
  290. Stelting, Stephen A.; Sierra, Katherine J., Service mapping method of enterprise application modeling and development for multi-tier service environments.
  291. Hussain,Zahid; Millet,Tim, Service processing switch.
  292. Bahl,Pradeep, Session load balancing and use of VIP as source address for inter-cluster traffic through the use of a session identifier.
  293. Black, Darryl; Perry, Thomas R.; Glaser, David, Shared database usage in network devices.
  294. Charron,Frederic; Modica,Stephanie, Site integration management system for operational support service in an internet data center.
  295. Lee,William W.; Pelenur,Julian, Smart generator.
  296. Diab,Salleh, Software application development environment facilitating development of a software application.
  297. Shing Norman (New Hyde Park NY) Erlikh Leonid (Brooklyn NY) Lim Nicholas R. (London NJ GB2) Lambert Jeffrey L. (East Brunswick NJ) Moskowitz Joel M. (New York NY) Wadhwa Vivek K. (Paramus NJ) Hughes , Software distribution system to build and distribute a software release.
  298. John C. Delo ; Malcolm S. Haar ; Chetan A. Parulekar ; Tracy D. Ferrier ; Benjamin Chamberlain ; David E. Gonzalez ; David R. Mckinnis, Software implementation installer mechanism.
  299. Lee,Sharon Marie; Eismann,Leonard Eugene; McDonald,Kathryn Ann, Solution generation method for thin client sizing tool.
  300. Shah, Rajendra; Shanumgam, Udayakumar; Apsani, Lavanya, State transition protocol for high availability units.
  301. Ukeda,Masaharu; Tsunoda,Motoyasu; Mizushima,Nagamasa; Katayama,Kunihiro, Storage device.
  302. Radhakrishnan,Rakesh, Strategic technology architecture roadmap.
  303. Myrick,Conrad B.; Hixon, Jr.,Harry W.; Koll,Christopher M.; Whittle, Jr.,Ralph L., Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business.
  304. Considine,John; Hall,Howard; Cochrane,Christopher, Switching system.
  305. Luke,Stanley; Hall,Howard; Cochrane,Christopher; Ferrari,Stephen; Condylis,Mitchell; Merhar,Milan, Switching system.
  306. Grosner,George; Wood,Douglas, Switching system method for discovering and accessing SCSI devices in response to query.
  307. Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
  308. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  309. Pancha, Girish; Wilson, A. Adam; Suresh, Sankaran; Lord, Spencer A., System and method for coupling remote data stores and mobile devices via an internet based server.
  310. Tabbara,Bassam, System and method for custom installation of an operating system on a remote client.
  311. Winterbottom,Philip, System and method for deploying new equipment and services in conjunction with a legacy provisioning system.
  312. Rappaport, Theodore; Skidmore, Roger; Henty, Benjamin, System and method for design, tracking, measurement, prediction and optimization of data communication networks.
  313. Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V.; Tabbara, Bassam; Levi, Steven P.; Rehof, Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
  314. Hunt,Galen C.; Hydrie,Aamer; Welland,Robert V.; Tabbara,Bassam; Levi,Steven P.; Rehof,Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
  315. Modiri Ramin ; Moiin Hossein,GBX, System and method for determining cluster membership in a heterogeneous distributed system.
  316. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
  317. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
  318. Tang, Cheng; Naik, Chickayya G., System and method for distributing multicasts in virtual local area networks.
  319. Primak, Leonard; Chen, Kailai; Gnip, John, System and method for dynamic content routing.
  320. Murphy,Richard C.; Carter,Scott M.; Ornelas,Mario G.; Deshpande,Shrikant, System and method for dynamic resource configuration using a dependency graph.
  321. Nassar, Ayman, System and method for dynamic simultaneous connection to multiple service providers.
  322. Friedrich Richard J. ; Matinka Joseph J. ; Sienknecht Tracy F., System and method for efficiently monitoring quality of service in a distributed processing environment.
  323. Vu, Ky Quy, System and method for encryption using transparent keys.
  324. Levy Abegnoli,Eric; Thubert,Pascal, System and method for implementing a clustered load balancer.
  325. Hunt,Galen C.; Hydrie,Aamer; Welland,Robert V.; Tabbara,Bassam; Levi,Steven P.; Rehof,Jakob, System and method for logical modeling of distributed computer systems.
  326. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  327. Courts Howard R. ; Dholakia Neil K. ; Dunn Craig L. ; Huddleston Brian J. ; Huddleston Erik L. ; Macartney-Filgate Bruce C. ; McHyde Timothy J. ; Poorte Jacob, System and method for maintaining a state for a user session using a web system having a global session server.
  328. Jorgenson,Daniel Scott, System and method for maintaining consistent independent server-side state among collaborating servers.
  329. Brassard,Michel; Pitman,Neil, System and method for managing architectural layers within a software model.
  330. Dimitroff, John; Nguyen, Minh Chau Alvin, System and method for managing data flow and measuring service in a storage network.
  331. Abu El Ata,Nabil A.; Zelechoski,Peter M., System and method for multi-phase system development with predictive modeling.
  332. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  333. Dutta, Partha P.; Vidovic, Nino; Vrsalovic, Dalibor F., System and method for network load balancing.
  334. Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
  335. Dumarot Daniel Peter ; Stevenson David Alan ; Dono Nicholas Richard ; Moulic James Randall ; Pickover Clifford Alan ; Schneider Bengt-Olaf ; Smith Adelbert, System and method for optimizing computer software and hardware.
  336. Randal Lee Bertram ; Frederick Scott Hunter Krauss ; Gregory J. McKnight, System and method for predicting computer system performance and for making recommendations for improving its performance.
  337. Malmer,Fredrik; Arvidsson,Erik Viktor; Morris,Drew E.; Pishevar,Shervin, System and method for providing a web-based operating system.
  338. Hochmuth,Roland M.; Martin,Robert Paul; Sene,Alassane; Prouty,Bryan; Yoshida,Stuart, System and method for providing secure access to network logical storage partitions.
  339. Bishop, David A.; Darcy, Paul B., System and method for remote management.
  340. Tabbara, Bassam; Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Welland, Robert V., System and method for restricting data transfers and managing software components of distributed computers.
  341. Tabbara,Bassam; Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Welland,Robert V., System and method for restricting data transfers and managing software components of distributed computers.
  342. Tabbara,Bassam; Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Welland,Robert V., System and method for restricting data transfers and managing software components of distributed computers.
  343. Halpern,Eric M.; Peddada,Prasad; Revanuru,Naresh, System and method for server load balancing and server affinity.
  344. Gibson William,GB2 ; Marshall David R. ; Turner Steve,GB2 ; Dawson William N. ; Hogan Patrick M., System and method for the creation and use of surrogate information system objects.
  345. Ferguson, Donald F.; Byrappagari, Anand; Dixon, Graeme, System and method for upgrading software in a distributed computer system.
  346. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Tabbara, Bassam; Van Antwerp, Mark D.; Welland, Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
  347. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
  348. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
  349. Hediger, John; Smith, Mark E., System and user interface for generation and processing of software application installation instructions.
  350. Miyamoto,Carleton; Lin,Chang; Blume,William; Bandhole,Jagadish, System for dynamic provisioning of secure, scalable, and extensible networked computer environments.
  351. Slater, Charles; Chennapragada, Krishna Rao, System for managing cluster of network switches using IP address for commander switch and redirecting a managing request via forwarding an HTTP connection to an expansion switch.
  352. Peter J. Wilson GB; Paul J. Moran GB, System for providing fair access for VLANs to a shared transmission medium.
  353. Raghavendra Sondur ; Akhil Arora ; Rajeev Angal ; Balaji Pagadala ; Bart Fisher, System for representing device topology in a computer network operable independent of network management software.
  354. Leon L. Lumelsky ; Nelson R. Manohar, System for seamless streaming of data stored on a network of distributed primary and target servers using segmentation information exchanged among all servers during streaming.
  355. Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
  356. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  357. Masuoka Yoshimasa,JPX ; Kagimasa Toyohiko,JPX ; Kitai Katsuyoshi,JPX ; Noda Fumio,JPX, System using environment manager with resource table in each computer for managing distributed computing resources managed for each application.
  358. Fung,Henry T., System, architecture, and method for logical server and other network devices in a dynamically configurable multi-server network environment.
  359. Anerousis, Nikolaos; Hjalmtysson, Gisli, System, method and apparatus for network service load and reliability management.
  360. Bowman-Amuah Michel K., System, method and article of manufacture for configuration management in a development architecture framework.
  361. Michel K. Bowman-Amuah, System, method and article of manufacture for managing an environment of a development architecture framework.
  362. Rappaport, Theodore S.; Gold, Brian T.; Skidmore, Roger R., System, method, and apparatus for portable design, deployment, test, and optimization of a communication network.
  363. Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
  364. Acharya,Anurag; Cocosel,Bogdan; Popescu,Catalin T.; Jhong,Eugene L.; Sim,Peng Toh, Systems and methods for automatic repair and replacement of networked machines.
  365. Berman Jeremy S., Systems and methods for generating and displaying a symbolic representation of a network model.
  366. Wong, Joseph D.; Put, Peter A., Systems and methods for providing an automated diagnostic audit for cluster computer systems.
  367. Wong, Joseph D.; Put, Peter A., Systems and methods for providing automated diagnostic services for a cluster computer system.
  368. Wong,Joseph D.; Put,Peter A., Systems and methods for providing automated diagnostic services for a cluster computer system.
  369. Weldon,Phyllis Marie Dyer; Shankle, III,Edwin Bruce; Klein, Jr.,James Arthur, Systems, methods and computer program products for designing, deploying and managing interactive voice response (IVR) systems.
  370. Marin Gerald A. ; Onvural Raif O. ; Roginsky Allen Leonid ; Srinivasan Vijay, Systems, methods and computer program products for distributing connection information between ATM nodes.
  371. Leymann Frank,DEX ; Roller Dieter,DEX, Task-oriented automatic distribution of software.
  372. Watson Gary E., Telephone tone security device.
  373. Deborah L. Caswell ; Srinivas Ramanathan ; James D. Hunter ; Scott S. Neal ; Frederick A. Sieker ; Mark D. Smith, Template-driven approach for generating models on network services.
  374. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  375. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  376. Vassallo,Godfrey, Tracking system and method for electrically powered equipment.
  377. Lee, David C.; Wang, Peter S. S.; O'Connell, Anne G., Transparent access to network attached devices.
  378. Hendel Ariel ; Hejza Leo A. ; Kumar Sampath H. K., Trunking ethernet-compatible networks.
  379. Mandato,Davide, Universal QoS adaptation framework for mobile multimedia applications.
  380. Lawler James M. ; Navarro Tina M., Universal data measurement, analysis and control system.
  381. Narayanaswamy,Sreedhara Srinivasulu; Boyd,Gerald L., Universal deployment tool.
  382. Ekstrom Joseph J. ; Gille J. Bernard, User-based binding of network stations to broadcast domains.
  383. Desai, Keyur B., Using and generating finite state machines to monitor system status.
  384. Hydrie,Aamer; Hunt,Galen C.; Levi,Steven P.; Tabbara,Bassam; Welland,Robert V., Using packet filters and network virtualization to restrict network communications.
  385. Tanimoto Shigeaki,JPX ; Nakajima Hikoyuki,JPX ; Isoda Kunihiko,JPX ; Nagai Kouichi,JPX ; Masui Takashi,JPX, VLAN control system and method.
  386. Yuasa Hiroyoshi,JPX ; Satake Tadashi,JPX ; Cardona Mario Jose,JPX ; Fujii Hisataka,JPX ; Yasuda Akira,JPX ; Yamashita Koji,JPX ; Suzaki Satoru,JPX ; Ikezawa Hideki,JPX ; Ohno Masami,JPX ; Matsuzaki A, Virtual LAN system.
  387. Miyake, Shigeru; Morisada, Tomohiro; Tezuka, Satoru; Miyazaki, Satoshi; Kurosaki, Yoshiyuki, Virtual network displaying system.
  388. Cabrera,Luis F.; Christensen,Erik B.; Della Libera,Giovanni M.; Kaler,Christopher G.; Levin,David E.; Lovering,Bradford H.; Lucco,Steven E.; Millet,Stephen J.; Shewchuk,John P.; Wahbe,Robert S.; Wortendyke,David A., Virtual network with adaptive dispatcher.
  389. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.
  390. Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
  391. Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.
  392. Kamal Emile Dimitri ; John Edward Kulakowski ; Rodney Jerome Means, Wireless communication between multiple intelligent pickers and with a central job queue in an automated data storage library.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로