At Quest, we are proud of our inventions and take appropriate steps to protect our intellectual property. The following is a list of Quest patents. This list may not be all inclusive, and other inventions not listed here may be protected by one or more patents.
Patent No. | Title |
---|---|
7,096,392 | METHOD AND SYSTEM FOR AUTOMATED, NO DOWNTIME, REAL-TIME, CONTINUOUS DATA PROTECTION |
7,231,391 | LOOSELY COUPLED DATABASE CLUSTERS WITH CLIENT CONNECTION FAIL-OVER |
7,287,186 | SHARED NOTHING VIRTUAL CLUSTER |
7,363,549 | METHOD AND SYSTEM FOR AUTOMATED, NO DOWNTIME, REAL-TIME, CONTINUOUS DATA PROTECTION |
7,428,590 | SYSTEMS AND METHODS FOR REFLECTING MESSAGES ASSOCIATED WITH A TARGET PROTOCOL WITHIN A NETWORK |
7,469,278 | VALIDATION OF PORTABLE COMPUTER TYPE PRIOR TO CONFIGURATION OF A LOCAL RUN-TIME ENVIRONMENT |
7,512,682 | DATABASE CLUSTER SYSTEMS AND METHODS FOR MAINTAINING CLIENT CONNECTIONS |
7,519,870 | METHOD AND SYSTEM FOR NO DOWNTIME, INITIAL DATA UPLOAD FOR REAL-TIME, CONTINUOUS DATA PROTECTION |
7,539,655 | METHOD AND APPARATUS FOR MEASUREMENT, ANALYSIS, AND OPTIMIZATION OF CONTENT DELIVERY |
7,565,336 | METHOD AND APPARATUS FOR MEASUREMENT, ANALYSIS, AND OPTIMIZATION OF CONTENT DELIVERY |
7,565,661 | METHOD AND SYSTEM FOR REAL-TIME EVENT JOURNALING TO PROVIDE ENTERPRISE DATA SERVICES |
7,606,839 | SYSTEMS AND METHODS FOR PROVIDING CLIENT CONNECTION FAIL-OVER |
7,617,501 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING POLICIES ON A COMPUTER HAVING A FOREIGN OPERATING SYSTEM |
7,617,501 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING POLICIES ON A COMPUTER HAVING A FOREIGN OPERATING SYSTEM |
7,643,484 | NETWORK ABSTRACTION AND ISOLATION LAYER RULES-BASED FEDERATION AND MASQUERADING |
7,664,822 | SYSTEMS AND METHODS FOR AUTHENTICATION OF TARGET PROTOCOL SCREEN NAMES |
7,680,834 | METHOD AND SYSTEM FOR NO DOWNTIME RESYCHRONIZATION FOR REAL-TIME, CONTINUOUS DATA PROTECTION |
7,681,104 | METHOD FOR ERASURE CODING DATA ACROSS A PLURALITY OF DATA STORES IN A NETWORK |
7,681,105 | METHOD FOR LOCK-FREE CLUSTERED ERASURE CODING AND RECOVERY OF DATA ACROSS A PLURALITY OF DATA STORES IN A NETWORK |
7,689,602 | METHOD OF CREATING HIERARCHICAL INDICES FOR A DISTRIBUTED OBJECT SYSTEM |
7,707,401 | SYSTEMS AND METHODS FOR A PROTOCOL GATEWAY |
7,756,981 | SYSTEMS AND METHODS FOR REMOTE ROGUE PROTOCOL ENFORCEMENT |
7,760,640 | ELECTRONIC MESSAGE DELIVERY SYSTEM INCLUDING A NETWORK DEVICE |
7,769,004 | NETWORK ABSTRACTION AND ISOLATION LAYER FOR MASQUERADING MACHINE IDENTITY OF A COMPUTER |
7,774,832 | SYSTEMS AND METHODS FOR IMPLEMENTING PROTOCOL ENFORCEMENT RULES |
7,783,510 | COMPUTER STORAGE CAPACITY FORECASTING SYSTEM USING CLUSTER-BASED SEASONALITY ANALYSIS |
7,788,127 | FORCAST MODEL QUALITY INDEX FOR COMPUTER STORAGE CAPACITY PLANNING |
7,788,521 | METHOD AND SYSTEM FOR VIRTUAL ON-DEMAND RECOVERY FOR REAL-TIME, CONTINUOUS DATA PROTECTION |
7,814,190 | IT AUTOMATION FILTERING AND LABELING SYSTEM AND APPLIANCE |
7,814,260 | TAPE IMAGE ON NON-TAPE STORAGE DEVICE |
7,814,460 | HIERARCHICAL MODULAR SOFTWARE PACKAGES AND ASSOCIATED DEVELOPMENT TOOL |
7,818,427 | IT AUTOMATION SCRIPTING MODULE AND APPLIANCE |
7,818,565 | SYSTEMS AND METHODS FOR IMPLEMENTING PROTOCOL ENFORCEMENT RULES |
7,818,801 | FILE SYSTEM EVENT TRACKING |
7,831,614 | SYSTEM AND METHOD FOR GENERATING SQL USING TEMPLATES |
7,836,014 | HYBRID REAL-TIME DATA REPLICATION |
7,864,083 | EFFICIENT DATA COMPRESSION & DECOMPRESSION OF NUMERIC SEQUENCES |
7,870,354 | DATA REPLICATION FROM ONE-TO-ONE OR ONE-TO-MANY HETEROGENEOUS DEVICES |
7,881,544 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,882,265 | SYSTEMS AND METHODS FOR MANAGING MESSAGES IN AN ENTERPRISE NETWORK |
7,885,988 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,890,615 | ARCHITECTURE AND PROTOCOL FOR EXTENSIBLE AND SCALABLE COMMUNICATION |
7,895,332 | IDENTITY MIGRATION SYSTEM APPARATUS AND METHOD |
7,904,913 | MANAGEMENT INTERFACE FOR A SYSTEM THAT PROVIDES AUTOMATED, REAL-TIME, CONTINUOUS DATA PROTECTION |
7,904,919 | APPARATUS, SYSTEMS AND METHODS TO PROVIDE AUTHENTICATION SERVICES TO A LEGACY APPLICATION |
7,904,949 | APPARATUS, SYSTEMS AND METHODS TO PROVIDE AUTHENTICATION SERVICES TO A LEGACY APPLICATION |
7,913,043 | METHOD FOR BACKUP STORAGE DEVICE SELECTION |
7,936,932 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,941,599 | IT AUTOMATION APPLIANCE IMAGING SYSTEM AND METHOD |
7,961,959 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,961,960 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,970,216 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,974,478 | METHODS AND APPARATUS FOR REDUCING STORAGE SIZE |
7,979,245 | MODEL-BASED SYSTEMS AND METHODS FOR MONITORING COMPUTING RESOURCE PERFORMANCE |
7,979,404 | EXTRACTING DATA CHANGES AND STORING DATA HISTORY TO ALLOW FOR INSTANTANEOUS ACCESS TO AND RECONSTRUCTION OF ANY POINT-IN-TIME DATA |
7,979,441 | METHOD OF CREATING HIERARCHICAL INDICES FOR A DISTRIBUTED OBJECT SYSTEM |
7,979,494 | SYSTEMS AND METHODS FOR MONITORING MESSAGING SYSTEMS |
7,979,650 | DISCOVERING DATA STORAGE FOR BACKUP |
8,001,074 | FUZZY-LEARNING-BASED EXTRACTION OF TIME-SERIES BEHAVIOR |
8,015,454 | COMPUTER SYSTEMS AND METHODS FOR PREDICTIVE PERFORMANCE MANAGEMENT OF DATA TRANSACTIONS |
8,046,550 | SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS OF VIRTUAL MACHINE FILES |
8,060,476 | BACKUP SYSTEMS AND METHODS FOR A VIRTUAL COMPUTING ENVIRONMENT |
8,060,889 | METHOD AND SYSTEM FOR REAL-TIME EVENT JOURNALING TO PROVIDE ENTERPRISE DATA SERVICES |
8,086,710 | IDENTITY MIGRATION APPARATUS AND METHOD |
8,087,075 | DISCONNECTED CREDENTIAL VALIDATION USING PRE-FETCHED SERVICE TICKETS |
8,108,429 | SYSTEM FOR MOVING REAL-TIME DATA EVENTS ACROSS A PLURALITY OF DEVICES IN A NETWORK FOR SIMULTANEOUS DATA PROTECTION, REPLICATION, AND ACCESS SERVICES |
8,135,930 | REPLICATION SYSTEMS AND METHODS FOR A VIRTUAL COMPUTING ENVIRONMENT |
8,140,748 | IT AUTOMATION APPLIANCE IMAGING SYSTEM AND METHOD |
8,145,864 | DISCOVERING DATA STORAGE FOR BACKUP |
8,151,140 | METHOD AND SYSTEM FOR VIRTUAL ON-DEMAND RECOVERY FOR REAL-TIME, CONTINUOUS DATA PROTECTION |
8,166,265 | SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS OF VIRTUAL MACHINE FILES |
8,171,201 | SYSTEMS AND METHODS FOR IMPROVING VIRTUAL MACHINE PERFORMANCE |
8,171,247 | METHOD FOR BACKUP STORAGE DEVICE SELECTION |
8,175,862 | MODEL-BASED SYSTEMS AND METHODS FOR MONITORING RESOURCES |
8,185,598 | SYSTEMS AND METHODS FOR MONITORING MESSAGING SYSTEMS |
8,195,628 | METHOD AND SYSTEM FOR DATA REDUCTION |
8,195,833 | SYSTEMS AND METHODS FOR MANAGING MESSAGES IN AN ENTERPRISE NETWORK |
8,200,641 | DICTIONARY FOR DATA DEDUPLICATION |
8,219,534 | MULTIPLE FILE COMPACTION FOR NETWORK ATTACHED STORAGE |
8,224,831 | VIRTUALIZATION OF METADATA FOR FILE OPTIMIZATION |
8,229,962 | LOCATION-AWARE TASK MANAGEMENT SYSTEMS AND METHODS |
8,234,253 | SYSTEMS AND METHODS FOR PERFORMING RECOVERY OF DIRECTORY DATA |
8,245,242 | SYSTEMS AND METHODS FOR MANAGING POLICIES ON A COMPUTER |
8,255,654 | METHOD FOR BACKUP STORAGE DEVICE SELECTION |
8,260,750 | INTELLIGENT BACKUP ESCALATION SYSTEM |
8,266,231 | SYSTEMS AND METHODS FOR MONITORING MESSAGING SYSTEMS |
8,271,755 | DISCOVERING DATA STORAGE FOR BACKUP |
8,301,737 | ARCHITECTURE AND PROTOCOL FOR EXTENSIBLE AND SCALABLE COMMUNICATION |
8,311,985 | REMOTE BACKUP AND RESTORE SYSTEM AND METHOD |
8,331,391 | NETWORK ABSTRACTION AND ISOLATION LAYER FOR MASQUERADING MACHINE IDENTITY OF A COMPUTER |
8,332,346 | FUZZY-LEARNING-BASED EXTRACTION OF TIME-SERIES BEHAVIOR |
8,332,571 | SYSTEMS AND METHODS FOR IMPROVING VIRTUAL MACHINE PERFORMANCE |
8,332,942 | FILE SYSTEM EVENT TRACKING |
8,335,902 | SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS OF VIRTUAL MACHINE FILES |
8,346,908 | IDENTITY MIGRATION APPARATUS AND METHOD |
8,347,148 | COMPUTER SYSTEMS AND METHODS FOR PREDICTIVE PERFORMANCE MANAGEMENT OF DATA TRANSACTIONS |
8,352,523 | RECOVERING A FILE SYSTEM TO ANY POINT-IN-TIME IN THE PAST WITH GUARANTEED STRUCTURE, CONTENT CONSISTENCY AND INTEGRITY |
8,364,460 | SYSTEMS AND METHODS FOR ANALYZING PERFORMANCE OF VIRTUAL ENVIRONMENTS |
8,364,648 | RECOVERING A DATABASE TO ANY POINT-IN-TIME IN THE PAST WITH GUARANTEED DATA CONSISTENCY |
8,365,017 | METHOD AND SYSTEM FOR VIRTUAL ON-DEMAND RECOVERY |
8,375,003 | BACKUP SYSTEMS AND METHODS FOR A VIRTUAL COMPUTING ENVIRONMENT |
8,375,248 | METHOD AND SYSTEM FOR VIRTUAL ON-DEMAND RECOVERY |
8,381,231 | DEPLOYMENT AND MANAGEMENT OF VIRTUAL CONTAINERS |
8,386,443 | REPRESENTING AND STORING AN OPTIMIZED FILE SYSTEM USING A SYSTEM OF SYMLINKS, HARDLINKS AND FILE ARCHIVES |
8,396,843 | ACTIVE FILE INSTANT CLONING |
8,396,899 | EFFICIENT SEGMENT DETECTION FOR DEDUPLICATION |
8,423,520 | METHODS AND APPARATUS FOR EFFICIENT COMPRESSION AND DEDUPLICATION |
8,429,198 | METHOD OF CREATING HIERARCHICAL INDICES FOR A DISTRIBUTED OBJECT SYSTEM |
8,429,649 | SYSTEMS AND METHODS FOR DATA MANAGEMENT IN A VIRTUAL COMPUTING ENVIRONMENT |
8,429,712 | CENTRALIZED USER AUTHENTICATION SYSTEM APPARATUS AND METHOD |
8,438,352 | DATA REPLICATION FROM ONE-TO-ONE OR ONE-TO-MANY HETEROGENEOUS DEVICES |
8,452,731 | REMOTE BACKUP AND RESTORE |
8,453,145 | SYSTEMS AND METHODS FOR INSTANT PROVISIONING OF VIRTUAL MACHINE FILES |
8,499,001 | SYSTEMS AND METHODS FOR INDEX SELECTION IN COLLECTIONS OF DATA |
8,510,275 | FILE AWARE BLOCK LEVEL DEDUPLICATION |
8,516,002 | DEFLATE FILE DATA OPTIMIZATION |
8,521,705 | ACCELERATED DEDUPLICATION |
8,527,543 | SYSTEM FOR CATEGORIZING DATABASE STATEMENTS FOR PERFORMANCE TUNING |
8,533,744 | SYSTEMS AND METHODS FOR MANAGING POLICIES ON A COMPUTER |
8,543,555 | DICTIONARY FOR DATA DEDUPLICATION |
8,544,023 | MANAGEMENT INTERFACE FOR A SYSTEM THAT PROVIDES AUTOMATED, REAL-TIME, CONTINUOUS DATA PROTECTION |
8,584,218 | DISCONNECTED CREDENTIAL VALIDATION USING PRE-FETCHED SERVICE TICKETS |
8,601,539 | SYSTEMS AND METHODS FOR MANAGING USER PERMISSIONS |
8,612,401 | HEAT INDICES FOR FILE SYSTEMS AND BLOCK STORAGE |
8,639,827 | SELF-SERVICE SYSTEMS AND METHODS FOR GRANTING ACCESS TO RESOURCES |
8,639,974 | METHOD AND SYSTEM FOR VIRTUAL ON-DEMAND RECOVERY |
8,640,232 | FILE SYSTEM EVENT TRACKING |
8,650,167 | METHOD AND SYSTEM FOR DATA REDUCTION |
8,650,578 | SYSTEM AND METHOD FOR INTERCEPTING PROCESS CREATION EVENTS |
8,655,898 | VIRTUALIZATION OF METADATA FOR FILE OPTIMIZATION |
8,671,116 | EFFICIENT SEGMENT DETECTION FOR DEDUPLICATION |
8,687,490 | ELECTRONIC MESSAGE DELIVERY SYSTEM INCLUDING A NETWORK DEVICE |
8,688,644 | SYSTEMS AND METHODS FOR PERFORMING RECOVERY OF DIRECTORY DATA |
8,694,466 | OBJECT DEDUPLICATION AND APPLICATION AWARE SNAPSHOTS |
8,700,667 | LOCATION-AWARE TASK MANAGEMENT SYSTEMS AND METHODS |
8,712,970 | RECOVERING A DATABASE TO ANY POINT-IN-TIME IN THE PAST WITH GUARANTEED DATA CONSISTENCY |
8,713,583 | SYSTEMS AND METHODS FOR MANAGING POLICIES ON A COMPUTER |
8,738,972 | SYSTEMS AND METHODS FOR REAL-TIME MONITORING OF VIRTUALIZED ENVIRONMENTS |
8,762,349 | INTELLIGENT DEDUPLICATION DATA PREFETCHING |
8,825,985 | DATA TRANSFER REDUCTION IN SCALE OUT ARCHITECTURES |
8,838,654 | DATA MODELING SYSTEM FOR RUNTIME SCHEMA EXTENSIBILITY |
8,849,773 | METHODS AND APPARATUS FOR ACTIVE OPTIMIZATION OF DATA |
8,849,774 | HEAT INDICES FOR FILE SYSTEMS AND BLOCK STORAGE |
8,856,790 | SYSTEMS AND METHODS FOR DATA MANAGEMENT IN A VIRTUAL COMPUTING ENVIRONMENT |
8,862,559 | SCALABLE MECHANISM FOR DETECTION OF COMMONALITY IN A DEDUPLICATED DATA SET |
8,887,009 | COMPUTER SYSTEMS AND METHODS FOR PREDICTIVE PERFORMANCE MANAGEMENT OF DATA TRANSACTIONS |
8,892,415 | MODEL-BASED SYSTEMS AND METHODS FOR MONITORING RESOURCES |
8,892,528 | ACCELERATED DEDUPLICATION |
8,898,114 | MULTITIER DEDUPLICATION SYSTEMS AND METHODS |
8,898,136 | SYSTEM FOR CATEGORIZING DATABASE STATEMENTS FOR PERFORMANCE TUNING |
8,903,983 | METHOD, SYSTEM AND APPARATUS FOR MANAGING, MODELING, PREDICTING, ALLOCATING AND UTILIZING RESOURCES AND BOTTLENECKS IN A COMPUTER NETWORK |
8,935,701 | UNIFIED MANAGEMENT PLATFORM IN A COMPUTER NETWORK |
8,938,419 | HYBRID REAL-TIME DATA REPLICATION |
8,938,781 | SYSTEMS AND METHODS FOR MANAGING USER PERMISSIONS |
8,965,850 | METHOD OF AND SYSTEM FOR MERGING, STORING AND RETRIEVING INCREMENTAL BACKUP DATA |
8,965,852 | METHODS AND APPARATUS FOR NETWORK EFFICIENT DEDUPLICATION |
8,966,045 | IIDENTITY MIGRATION APPARATUS AND METHOD |
8,966,503 | SYSTEM AND METHOD FOR CORRELATING ANOMALOUS EVENTS |
8,972,347 | RECOVERING A FILE SYSTEM TO ANY POINT-IN-TIME IN THE PAST WITH GUARANTEED STRUCTURE, CONTENT CONSISTENCY AND INTEGRITY |
8,978,098 | CENTRALIZED USER AUTHENTICATION SYSTEM APPARATUS AND METHOD |
8,996,468 | BLOCK STATUS MAPPING SYSTEM FOR REDUCING VIRTUAL MACHINE BACKUP STORAGE |
9,020,909 | ACTIVE FILE INSTANT CLONING |
9,032,403 | SYSTEMS AND METHODS FOR INSTANT PROVISIONING OF VIRTUAL MACHINE FILES |
9,047,272 | SYSTEMS AND METHODS FOR INDEX SELECTION IN COLLECTIONS OF DATA |
9,047,574 | STORAGE CAPACITY PLANNING |
9,064,027 | CROSS-ENTERPRISE IT INFORMATION SHARING PLATFORM |
9,098,624 | DEEP TYPE PARSING |
9,122,627 | METHOD FOR LOCK-FREE CLUSTERED ERASURE CODING AND RECOVERY OF DATA ACROSS A PLURALITY OF DATA STORES IN A NETWORK |
9,122,718 | DYNAMIC DIRECTORY CONTROL EXECUTION |
9,130,847 | SYSTEMS AND METHODS FOR MANAGING POLICIES ON A COMPUTER |
9,137,331 | ADAPTIVE REPLICATION |
9,141,442 | AUTOMATED CONNECTOR CREATION FOR PROVISIONING SYSTEMS |
9,164,820 | SYSTEM AND METHOD FOR CORRECTING SCRAMBLED MESSAGES |
9,165,027 | DYNAMIC DIRECTORY CONTROL REGISTRATION |
9,183,272 | SYSTEM AND METHOD FOR ACCESSING DIMENSIONAL DATABASES |
9,195,823 | SYSTEM AND METHOD FOR INTERCEPTING PROCESS CREATION EVENTS |
9,201,800 | RESTORING TEMPORAL LOCALITY IN GLOBAL AND LOCAL DEDUPLICATION STORAGE SYSTEMS |
9,201,890 | STORAGE OPTIMIZATION MANAGER |
9,202,043 | SELF-SERVICE SYSTEMS AND METHODS FOR GRANTING ACCESS TO RESOURCES |
9,210,044 | AUTOMATED REMEDIATION WITH AN APPLIANCE |
9,215,142 | COMMUNITY ANALYSIS OF COMPUTING PERFORMANCE |
9,245,248 | DATA METRIC RESOLUTION PREDICTION SYSTEM AND METHOD |
9,250,819 | LEARNING MACHINE TO OPTIMIZE RANDOM ACCESS IN A STORAGE SYSTEM |
9,251,161 | OBJECT DEDUPLICATION AND APPLICATION AWARE SNAPSHOTS |
9,256,609 | FIXED SIZE EXTENTS FOR VARIABLE SIZE DEDUPLICATION SEGMENTS |
9,262,432 | SCALABLE MECHANISM FOR DETECTION OF COMMONALITY IN A DEDUPLICATED DATA SET |
9,274,758 | SYSTEM AND METHOD FOR CREATING CUSTOMIZED PERFORMANCE-MONITORING APPLICATIONS |
9,275,172 | SYSTEMS AND METHODS FOR ANALYZING PERFORMANCE OF VIRTUAL ENVIRONMENTS |
9,288,060 | SYSTEM AND METHOD FOR DECENTRALIZED AUTHENTICATION OF SUPPLICANT DEVICES |
9,288,201 | DISCONNECTED CREDENTIAL VALIDATION USING PRE-FETCHED SERVICE TICKETS |
9,311,318 | BACKUP SYSTEMS AND METHODS FOR A VIRTUAL COMPUTING ENVIRONMENT |
9,311,322 | HEAT INDICES FOR FILE SYSTEMS AND BLOCK STORAGE |
9,311,375 | SYSTEMS AND METHODS FOR COMPACTING A VIRTUAL MACHINE FILE |
9,317,574 | SYSTEM AND METHOD FOR MANAGING AND IDENTIFYING SUBJECT MATTER EXPERTS |
9,323,778 | VIRTUAL DISK UTILITY |
9,349,016 | SYSTEM AND METHOD FOR USER-CONTEXT-BASED DATA LOSS PREVENTION |
9,367,558 | METHODS AND APPARATUS FOR EFFICIENT COMPRESSION AND DEDUPLICATION |
9,372,942 | SYSTEM AND METHOD FOR FACILITATING DATA VISUALIZATION VIA A MAP-REDUCE FRAMEWORK |
9,389,879 | SYSTEM AND METHOD FOR MANIPULATING USER-INTERFACE DISPLAY ITEMS FOR WEB WIDGETS |
9,390,240 | SYSTEM AND METHOD FOR QUERYING DATA |
9,396,311 | MINI APPLIANCE ENSURING SOFTWARE LICENSE COMPLIANCE |
9,400,799 | DATA BLOCK MIGRATION |
9,405,699 | SYSTEMS AND METHODS FOR OPTIMIZING COMPUTER PERFORMANCE |
9,405,776 | REMOTE BACKUP AND RESTORE |
9,430,622 | MINI APPLIANCE |
9,442,818 | SYSTEM AND METHOD FOR DYNAMIC DATA COLLECTION |
9,442,951 | MAINTAINING DEDUPLICATION DATA IN NATIVE FILE FORMATS |
9,448,948 | EFFICIENT REPLICA CLEANUP DURING RESYNCHRONIZATION |
9,449,013 | APPLICATION TRANSPARENT DEDUPLICATION DATA |
9,449,014 | RESYNCHRONIZATION OF REPLICATED DATA |
9,460,178 | SYNCHRONIZED STORAGE SYSTEM OPERATION |
9,465,642 | SYSTEMS AND METHODS FOR INSTANT PROVISIONING OF VIRTUAL MACHINE FILES |
9,479,414 | SYSTEM AND METHOD FOR ANALYZING COMPUTING PERFORMANCE |
9,495,222 | SYSTEMS AND METHODS FOR PERFORMANCE INDEXING |
9,495,437 | SYSTEM AND METHOD FOR ACCESSING DIMENSIONAL DATABASES |
9,501,744 | SYSTEM AND METHOD FOR CLASSIFYING DATA |
9,507,820 | DATA MODELING SYSTEM FOR RUNTIME SCHEMA EXTENSIBILITY |
9,547,562 | BOOT RESTORE SYSTEM FOR RAPIDLY RESTORING VIRTUAL MACHINE BACKUPS |
9,557,879 | SYSTEM FOR INFERRING DEPENDENCIES AMONG COMPUTING SYSTEMS |
9,558,246 | SYSTEM AND METHOD FOR TIME-BASED CLUSTERING OF DATA-ACCESS INSTANCES |
9,559,859 | HOME HUB |
9,563,632 | GARBAGE COLLECTION AWARE DEDUPLICATION |
9,563,782 | SYSTEMS AND METHODS OF SECURE SELF-SERVICE ACCESS TO CONTENT |
9,569,287 | SYSTEM AND METHOD FOR INTERACTIVE TUTORIALS |
9,569,446 | CATALOGING SYSTEM FOR IMAGE-BASED BACKUP |
9,569,456 | ACCELERATED DEDUPLICATION |
9,569,626 | SYSTEMS AND METHODS OF REPORTING CONTENT-EXPOSURE EVENTS |
9,571,348 | SYSTEM AND METHOD FOR INFERRING AND ADAPTING A NETWORK TOPOLOGY |
9,578,060 | SYSTEM AND METHOD FOR DATA LOSS PREVENTION ACROSS HETEROGENEOUS COMMUNICATIONS PLATFORMS |
9,594,643 | HANDLING RESTORES IN AN INCREMENTAL BACKUP STORAGE SYSTEM |
9596249 | DETECTING SHARED OR COMPROMISED CREDENTIALS THROUGH ANALYSIS OF SIMULTANEOUS ACTIONS |
9,600,488 | HEAT INDICES FOR FILE SYSTEMS AND BLOCK STORAGE |
9,600,490 | INTELLIGENT DEDUPLICATION DATA PREFETCHING |
9,613,043 | OBJECT DEDUPLICATION AND APPLICATION AWARE SNAPSHOTS |
9635045 | DETECTING UNAUTHORIZED, RISKY, OR INEFFICIENT USAGE OF PRIVILEGED CREDENTIALS THROUGH ANALYSIS OF REMOTE SHELL PROTOCOL BANDWIDTH |
9,640,177 | METHOD AND APPARATUS TO EXTRAPOLATE SARCASM AND IRONY USING MULTI-DIMENSIONAL MACHINE LEARNING BASED LINGUISTIC ANALYSIS |
9641534 | PROVIDING CONTROLLED ACCESS TO ADMIN CREDENTIALS DURING A MIGRATION |
9,641,555 | SYSTEMS AND METHODS OF TRACKING CONTENT EXPOSURE EVENTS |
9,672,078 | DEPLOYMENT AND MANAGEMENT OF VIRTUAL CONTAINERS |
9,678,974 | METHODS AND APPARATUS FOR NETWORK EFFICIENT DEDUPLICATION |
9,690,576 | SELECTIVE DATA COLLECTION USING A MANAGEMENT SYSTEM |
9,690,790 | METHOD AND APPARATUS FOR EFFICIENTLY MERGING, STORING AND RETRIEVING INCREMENTAL DATA |
9,736,215 | SYSTEM AND METHOD FOR CORRELATING END-USER EXPERIENCE DATA AND BACKEND-PERFORMANCE DATA |
9,753,648 | FIXED SIZE EXTENTS FOR VARIABLE SIZE DEDUPLICATION SEGMENTS |
9,753,937 | FILE AWARE BLOCK LEVEL DEDUPLICATION |
9,760,713 | SYSTEM AND METHOD FOR CONTENT-INDEPENDENT DETERMINATION OF FILE-SYSTEM-OBJECT RISK OF EXPOSURE |
9,769,026 | DEVICE ASSET TRACKING AND SERVICE DESK USING AN EXTERNAL NETWORK MANAGEMENT SYSTEM AS A DATA SOURCE |
9,778,946 | OPTIMIZED COPY OF VIRTUAL MACHINE STORAGE FILES |
9,779,260 | AGGREGATION AND CLASSIFICATION OF SECURE DATA |
9,792,102 | IDENTIFYING ISSUES PRIOR TO DEPLOYING SOFTWARE |
9,792,169 | MANAGING ALERT PROFILES |
9800598 | DETECTING SHARED OR COMPROMISED CREDENTIALS THROUGH ANALYSIS OF SIMULTANEOUS ACTIONS |
9,800,994 | SYSTEMS AND METHODS FOR CLOUD-BASED DEVICE CONFIGURATION MANAGEMENT OF HETEROGENEOUS DEVICES |
9,805,040 | EMAIL AND IDENTITY MIGRATION BASED ON RELATIONSHIP INFORMATION |
9,813,248 | CONTENT-BASED ENCRYPTION KEYS |
9,813,422 | DETECTING UNAUTHORIZED RISKY OR INEFFICIENT USAGE OF PRIVILEGED CREDENTIALS THROUGH ANALYSIS OF TASK COMPLETION TIMING |
9,819,630 | ENHANCED MANAGEMENT OF MIGRATION AND ARCHIVING OPERATIONS |
9,830,213 | COLLECTING AND TRANSMITTING DIAGNOSTICS INFORMATION FROM PROBLEMATIC DEVICES |
9,838,366 | SECURE SHELL PUBLIC KEY AUDIT SYSTEM |
9,842,218 | SYSTEMS AND METHODS OF SECURE SELF-SERVICE ACCESS TO CONTENT |
9,842,220 | SYSTEMS AND METHODS OF SECURE SELF-SERVICE ACCESS TO CONTENT |
9,843,651 | SYSTEMS AND METHODS OF LOCALIZING DISTRIBUTED SOFTWARE APPLICATIONS |
9,847,941 | SELECTIVELY SUPPRESS OR THROTTLE MIGRATION OF DATA ACROSS WAN CONNECTIONS |
9,871,814 | SYSTEM AND METHOD FOR IMPROVING SECURITY INTELLIGENCE THROUGH INVENTORY DISCOVERY |
9,881,159 | WORKLOAD EXECUTION SYSTEMS AND METHODS |
9,881,172 | SYSTEMS AND METHODS OF FILE TRACKING AND NOTIFICATION |
9,886,483 | SYSTEM FOR PROVIDING STRUCTURED QUERY LANGUAGE ACCESS TO NON-RELATIONAL DATA STORES |
9,904,536 | SYSTEMS AND METHODS FOR ADMINISTERING WEB WIDGETS |
9,904,707 | SYSTEMS AND METHODS FOR OPTIMIZED DATABASE SAMPLING |
9,906,419 | SYSTEM AND METHOD FOR DISCOVERING AND EXPOSING CONTROLLING-USER NETWORKS |
9,910,868 | SYSTEMS AND METHODS FOR DATABASE INDEX OPTIMIZATION |
9,917,853 | CORRELATING EVENT LOGS TO IDENTIFY A POTENTIAL SECURITY BREACH |
9,917,894 | ACCELERATING TRANSFER PROTOCOLS |
9922352 | MULTIDIMENSIONAL SYNOPSIS GENERATION |
9923853 | FOLDERS THAT EMPLOY DYNAMIC USER TRAINING RULES TO ORGANIZE CONTENT |
9,923,856 | DEPUTIZING AGENTS TO REDUCE A VOLUME OF EVENT LOGS SENT TO A COORDINATOR |
9,934,278 | METHOD OF OPTIMIZING COMPLEX SQL STATEMENTS USING A REGION DIVIDED PREFERENTIAL SQL REWRITE OPERATION |
9,948,648 | SYSTEM AND METHOD FOR ENFORCING ACCESS CONTROL TO PUBLICLY-ACCESSIBLE WEB APPLICATIONS |
9,984,093 | TECHNIQUE SELECTION IN A DEDUPLICATION AWARE CLIENT ENVIRONMENT |
9,990,352 | CHUNK COMPRESSION IN A DEDUPLICATION AWARE CLIENT ENVIRONMENT |
9,990,506 | SYSTEM AND METHODS OF SECURING NETWORK-ACCESSIBLE PERIPHERAL DEVICES |
9,992,147 | DURING AN EMAIL MIGRATION, CONVERTING DISTRIBUTION LIST MESSAGES INTO SINGLE-INSTANCED CONTENT WITHIN A COLLABORATION PLATFORM GROUP |
9,992,283 | PROVIDING A SINGLE INTERFACE FOR ACCESSING RESOURCES THAT ARE DISTRIBUTED AMONG MULTIPLE PLATFORMS |
9,996,264 | DATA BLOCK MIGRATION |
9,996,577 | SYSTEMS AND METHODS FOR GRAPHICALLY FILTERING CODE CALL TREES |
9,996,688 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO COMPUTER APPLICATIONS OR DATA |
10044764 | CONTEXT-AWARE DELEGATION ENGINE |
10,063,564 | IDENTITY AUTHENTICATION USING MULTIPLE DEVICES |
10,067,945 | FILE AND MOVE DATA TO SHRINK DATAFILES |
10075549 | OPTIMIZER MODULE IN HIGH LOAD CLIENT/SERVER SYSTEMS |
10,089,484 | METHOD AND SYSTEM FOR DESTROYING SENSITIVE ENTERPRISE DATA ON PORTABLE DEVICES |
10,109,022 | EMAIL AND IDENTITY MIGRATION BASED ON MULTIFACTOR RELATIONSHIP DATA PROVIDED BY USERS AND SYSTEMS |
10,127,030 | SYSTEMS AND METHODS FOR CONTROLLED CONTAINER EXECUTION |
10,127,235 | STORAGE SYSTEM DEDUPLICATION WITH SERVICE LEVEL AGREEMENTS |
10,129,262 | SYSTEMS AND METHODS FOR SECURE DEVICE MANAGEMENT |
10,140,159 | SYSTEMS AND METHODS FOR DYNAMIC CREATION OF CONTAINER MANIFESTS |
10,140,276 | SYSTEM AND METHOD FOR DYNAMICALLY GENERATING CLIENT-SIDE DATABASE FORMS |
10,140,466 | SYSTEMS AND METHODS OF SECURE SELF-SERVICE ACCESS TO CONTENT |
10,142,391 | SYSTEMS AND METHODS OF DIAGNOSING DOWN-LAYER PERFORMANCE PROBLEMS VIA MULTI-STREAM PERFORMANCE PATTERNIZATION |
10,146,787 | TRANSFERRING DIFFERENCES BETWEEN CHUNKS DURING REPLICATION |
10,146,954 | SYSTEM AND METHOD FOR DATA AGGREGATION AND ANALYSIS |
10,148,607 | ELECTRONIC-MESSAGING SYSTEM INTERCEPTOR FORWARDING CLIENT NOTIFICATIONS |
10,148,720 | SYSTEMS AND METHODS FOR DATA SERIALIZATION AND TRANSFER |
10,157,234 | SYSTEMS AND METHODS FOR TRANSFORMING DATASETS |
10,157,358 | SYSTEMS AND METHODS FOR MULTI-STREAM PERFORMANCE PATTERNIZATION AND INTERVAL-BASED PREDICTION |
10,187,260 | SYSTEMS AND METHODS FOR MULTILAYER MONITORING OF NETWORK FUNCTION VIRTUALIZATION ARCHITECTURES |
10,191,917 | VIRTUAL DISK UTILITY |
10,198,474 | DELAYING ONE OR MORE SEARCHES TO CAUSE MULTIPLE SEARCHES TO LOAD AND EVALUATE SEGMENTS TOGETHER |
10,200,252 | SYSTEMS AND METHODS FOR INTEGRATED MODELING OF MONITORED VIRTUAL DESKTOP INFRASTRUCTURE SYSTEMS |
10,200,324 | DYNAMICALLY PARTITIONING A MAILING LIST BASED ON A-PRIORI CATEGORIES AND CONTEXTUAL ANALYSIS |
10,200,478 | SYSTEMS AND METHODS FOR PREDICTIVE LOGINS TO SESSION(S) OR RESOURCE(S) |
10,210,188 | MULTI-TIERED DATA STORAGE IN A DEDUPLICATION SYSTEM |
10,218,588 | SYSTEMS AND METHODS FOR MULTI-STREAM PERFORMANCE PATTERNIZATION AND OPTIMIZATION OF VIRTUAL MEETINGS |
10,228,958 | SYSTEMS AND METHODS FOR ARCHIVING TIME-SERIES DATA DURING HIGH-DEMAND INTERVALS |
10,230,601 | SYSTEMS AND METHODS FOR INTEGRATED MODELING AND PERFORMANCE MEASUREMENTS OF MONITORED VIRTUAL DESKTOP INFRASTRUCTURE SYSTEMS |
10,242,212 | PRESERVING DATA PROTECTION AND ENABLING SECURE CONTENT AWARENESS IN QUERY SERVICES |
10,248,314 | MIGRATE NICKNAME CACHE FOR EMAIL SYSTEMS AND DEVICES |
10,250,605 | COMBINING A SET OF RISK FACTORS TO PRODUCE A TOTAL RISK SCORE WITHIN A RISK ENGINE |
10,256,978 | CONTENT-BASED ENCRYPTION KEYS |
10,257,147 | ENHANCED MANAGEMENT OF MIGRATION AND ARCHIVING OPERATIONS |
10,261,945 | SYSTEMS AND METHODS FOR STORING AND ACCESSING MONITORING DATA |
10,263,986 | PRIVILEGE ELEVATION SYSTEM AND METHOD FOR DESKTOP ADMINISTRATION |
10,268,550 | VIRTUALIZING A SECURE ACTIVE DIRECTORY ENVIRONMENT |
10,270,841 | SYSTEMS AND METHODS OF REAL-TIME CONTAINER DEPLOYMENT |
10,289,457 | SYSTEMS AND METHODS FOR DYNAMIC DISCOVERY OF CONTAINER-BASED MICROSERVICES |
10,291,490 | SYSTEM AND METHOD FOR COLLECTING DATA FROM LOW-AVAILABILITY DEVICES |
10,291,493 | SYSTEM AND METHOD FOR DETERMINING RELEVANT COMPUTER PERFORMANCE EVENTS |
10,298,437 | DISTRIBUTED DATA COLLECTION IN AN ENTERPRISE NETWORK |
10,313,291 | METHOD FOR DETERMINING PREDICTIVE RESPONSE TIME ACROSS ENTERPRISE COMMUNICATION SYSTEMS |
10,326,748 | SYSTEMS AND METHODS FOR EVENT-BASED AUTHENTICATION |
10,333,820 | SYSTEM FOR INFERRING DEPENDENCIES AMONG COMPUTING SYSTEMS |
10,339,124 | DATA FINGERPRINT STRENGTHENING |
10,346,396 | ALTERING SEARCH SEQUENCE TO CAUSE MULTIPLE SEARCHES TO LOAD AND EVALUATE SEGMENTS TOGETHER |
10,360,400 | CONTEXT-AWARE DELEGATION RISK SYSTEM |
10,372,581 | INSTRUMENTATION OF PROGRAM CODE FOR DYNAMIC ANALYSIS |
10,375,056 | PROVIDING A SECURE COMMUNICATION CHANNEL DURING ACTIVE DIRECTORY DISASTER RECOVERY |
10,387,810 | SYSTEM AND METHOD FOR PROACTIVELY PROVISIONING RESOURCES TO AN APPLICATION |
10,389,597 | DEVICE ASSET TRACKING AND SERVICE DESK USING A MANAGEMENT SYSTEM AS A DATA SOURCE |
10,389,754 | GOVERNANCE POLICY FRAMEWORK FOR CLOUD RESOURCES |
10,397,161 | ELECTRONIC MAIL (EMAIL) MESSAGE LIFECYCLE MANAGEMENT |
10,397,164 | DEPUTIZING AGENTS TO REDUCE A VOLUME OF EVENT LOGS SENT TO A COORDINATOR |
10,402,381 | DETERMINE CONFIDENCE OF MAIL ARCHIVE OWNERSHIP FROM SENDERS IN "SENT ITEMS" FOLDER |
10,405,155 | CLOUD-BASED DEVICE CONFIGURATION MANAGEMENT OF HETEROGENEOUS DEVICES |
10,409,704 | SYSTEMS AND METHODS FOR RESOURCE UTILIZATION REPORTING AND ANALYSIS |
10,417,613 | SYSTEMS AND METHODS OF PATTERNIZING LOGGED USER-INITIATED EVENTS FOR SCHEDULING FUNCTIONS |
10,447,638 | AUTOMATICALLY APPLYING DATA LOSS PREVENTION RULES DURING MIGRATION |
10,452,286 | LEVERAGING CONTINUOUS REPLICATION TO COPY SNAPSHOT BACKUP IMAGE |
10,459,886 | CLIENT-SIDE DEDUPLICATION WITH LOCAL CHUNK CACHING |
10,503,906 | DETERMINING A RISK INDICATOR BASED ON CLASSIFYING DOCUMENTS USING A CLASSIFIER |
10,516,743 | SYSTEMS AND METHODS FOR FACILITATING PORTABLE USER SESSIONS |
10,528,565 | LOGICAL LEVEL PREDICTIVE CACHING IN RELATIONAL DATABASES |
10,536,352 | SYSTEMS AND METHODS FOR TUNING CROSS-PLATFORM DATA COLLECTION |
10,552,040 | FIXED SIZE EXTENTS FOR VARIABLE SIZE DEDUPLICATION SEGMENTS |
10,552,220 | SIZING OF ONE OR MORE JOBS WITHIN ONE OR MORE TIME WINDOWS |
10,552,399 | PREDICTING INDEX FRAGMENTATION CAUSED BY DATABASE STATEMENTS |
10,558,558 | DYNAMIC ADJUSTMENT OF INSTRUMENTATION SCOPE |
10,586,189 | DATA METRIC RESOLUTION RANKING SYSTEM AND METHOD |
10,592,616 | GENERATING SIMULATION DATA USING A LINEAR CURVE SIMPLIFICATION AND REVERSE SIMPLIFICATION METHOD |
10,594,701 | PRIVACY ENABLED MOBILE DEVICE IDENTIFICATION FOR BYOD POLICIES. |
10,594,802 | SYSTEM AND METHOD FOR SHARING STATEFUL INFORMATION |
10,599,646 | SYMBIOTIC DATA INSIGHTS FROM HARMONIZED QUERIES |
10,623,365 | MESSAGE REDIRECTION PROTOCOL |
10,628,466 | SMART EXCHANGE DATABASE INDEX |
10,628,602 | CONTROLLING CONTENT MODIFICATIONS BY ENFORCING ONE OR MORE CONSTRAINT LINKS |
10,649,671 | PROCESSING UNKNOWN OR UNEXPECTED PROPERTIES ENCOUNTERED DURING MIGRATION OR ARCHIVING OPERATIONS |
10,657,099 | SYSTEMS AND METHODS FOR TRANSFORMATION AND ANALYSIS OF LOGFILE DATA |
10,671,565 | PARTITIONING TARGET DATA TO IMPROVE DATA REPLICATION PERFORMANCE |
10,681,026 | SECURE SHELL PUBLIC KEY AUDIT SYSTEM |
10,681,060 | COMPUTER-IMPLEMENTED METHOD FOR DETERMINING COMPUTER SYSTEM SECURITY THREATS, SECURITY OPERATIONS CENTER SYSTEM AND COMPUTER PROGRAM PRODUCT |
10,684,920 | OPTIMIZED AND CONSISTENT REPLICATION OF FILE OVERWRITES |
10,691,556 | RECOVERING A SPECIFIED SET OF DOCUMENTS FROM A DATABASE BACKUP |
10,715,407 | DISPATCHER FOR ADAPTIVE DATA COLLECTION |
10,740,128 | SELECTING A CLOUD FROM A PLURALITY OF CLOUDS FOR A WORKLOAD |
10,769,127 | DYNAMICALLY OPTIMIZING DATA ACCESS PATTERNS USING PREDICTIVE CROWDSOURCING |
10,771,553 | ACCESS TO DISPARATE CLOUD SERVICES |
10,782,987 | DISTRIBUTED DATABASE DRIVER MIDDLEWARE |
10,783,118 | READ-ONLY FILE SYSTEM FOR TESTING DE-DUPLICATION |
10,826,811 | SYSTEM AND METHOD FOR MANAGING A CLUSTERED RADIO NETWORK |
10,827,039 | SYSTEMS AND METHODS FOR DYNAMIC COMPRESSION OF TIME-SERIES DATA |
10,911,380 | AUTOMATED LARGE ATTACHMENT PROCESSING DURING MIGRATION |
10,929,017 | DATA BLOCK MIGRATION |
10,929,340 | EMAIL AND IDENTITY MIGRATION BASED ON RELATIONSHIP INFORMATION |
10,942,818 | COMMON BACKUP AND RECOVERY SOLUTION FOR DIVERSE CLOUD-BASED SERVICES IN A PRODUCTIVITY SUITE |
10,956,247 | COLLECTING AND TRANSMITTING DIAGNOSTICS INFORMATION FROM PROBLEMATIC DEVICES |
10,956,512 | DOCUMENT LINK MIGRATION |
11,005,738 | INTUITIVE REPRESENTATION OF END-TO-END PERFORMANCE DIAGNOSTIC MONITORING BASED ON DIFFERENTIAL ANALYSIS |
D564,522 | FRONT PANEL FOR INFORMATION TECHNOLOGY AUTOMATION APPLIANCE |
RE45,327 | APPARATUS, SYSTEMS AND METHODS TO PROVIDE AUTHENTICATION SERVICES TO A LEGACY APPLICATION |
Please wait...