Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Dell Software Inc patents


Recent patent applications related to Dell Software Inc. Dell Software Inc is listed as an Agent/Assignee. Note: Dell Software Inc may have other listings under different names/spellings. We're not affiliated with Dell Software Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "D" | Dell Software Inc-related inventors


Using cloud storage as temporary cache for backup

Systems and methods are described to transfer content from a first computing device to a second computing that is not directly accessible from the first computing device. The transfer may be carried out using an application operating on the first computing device that uploads the content to the cloud storage service. ... Dell Software Inc

Systems and processes for data backup and recovery

Systems and processes for backing up data files and recovering data files are described. A computing device connected to a network may backup data files for one or more additional computing devices connected to the network. ... Dell Software Inc

System for rapid identification of sources of variation in complex manufacturing processes

A system, method, and computer-readable medium are disclosed for identifying sources of variation in complex manufacturing processes via a variation identification operation. In certain embodiments, the variation identification operation is performed via a variation identification system. ... Dell Software Inc

System for managing effective self-service analytic workflows

A system, method, and computer-readable medium for performing an analytics workflow generation operation. The analytics workflow generation operation enables generation of targeted analytics workflows (e.g., via a data scientist (i.e., an expert in data modeling)) that are then published to a workflow storage repository so that the targeted analytics workflows can be used by domain experts and self-service business end-users to solve specific classes of analytics operations.. ... Dell Software Inc

Blind cloud data leak protection

Systems and methods for blind data leak prevention are provided. A first computer can determine if encrypted data matches a rule even without the encryption key used to encrypt the data. ... Dell Software Inc

Reducing transmission pathway lengths within a distributed network

A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a tcp socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new packet route based on the migrated socket. ... Dell Software Inc

Detecting important variables and their interactions in big data

A system, method, and computer-readable medium for performing a variable and interaction detection operation. In certain embodiments, the variable and interaction detection operation detects important variables and as well as interactions among certain important variables in big data. ... Dell Software Inc

Method for effective pmtu discovery in vpn environment

Methods are directed towards initializing a path maximum transmission unit value for two gateways in communication via a network tunnel (e.g., vpn environment). The initialized path maximum transmission unit value is used in establishing the network tunnel of the two gateways. ... Dell Software Inc

Prototype management system

A prototype management system to provide cross team tools, frameworks, prototype management, and prototype tracking capabilities to improve the overall timeliness and quality of application and web-based product development. In an example, the prototype management system may be configured to cause the prototype to act as a live website that may be accessed by each of the teams and causes each team member to develop operable objects opposed to simulated objects.. ... Dell Software Inc

Prioritized messaging system

Techniques and systems for prioritizing messages are described. The messages may be associated with multiple message accounts of an individual and the message accounts may be administered by different message account providers. ... Dell Software Inc

Systems and methods for cloud-based device configuration management of heterogeneous devices

The present disclosure provides for information handling systems and methods to configure and manage any number of heterogeneous devices. In various embodiments, a shared device configuration is simultaneously applied to a selected group of otherwise incompatible heterogeneous devices that may use different communication protocols and operating systems. ... Dell Software Inc

Resource identification through dynamic domain name system (dns) labels

A single dns ns record can establish a zone delegation to a reverse proxy access device so that the reverse proxy access device answers dns queries directed to it under the zone delegation. A dns label can be designated at the reverse proxy access device for each resource served by the reverse proxy access device. ... Dell Software Inc

Single tier routing

A single global traffic optimizer can be configured to perform the functionality of a global and local traffic manager. For example, the global traffic optimizer can receive a client request from a client device and route the client request to an appropriate service provider from a set of geographically dispersed service providers to service the client request. ... Dell Software Inc

Virtual private network dead peer detection

Methods and systems are provided for detecting dead tunnels associated with a vpn. An indicator of a tunnel capability, for example, a dpd vendor id, is received from a peer through a vpn connection. ... Dell Software Inc

10/12/17 / #20170295077

Optimal service provider selection

A network routing server can be configured to receive client requests from multiple client devices and route the client requests to optimal service providers to service the request. To determine which service provider is optimal to service the client request, the network routing service can analyze multiple factors, such as geographic location of the client, geographic location of the service providers, and health metrics describing service quality of the various service providers. ... Dell Software Inc

10/05/17 / #20170289837

Network optimization and client steering based on wireless data rate capabilities of mixed client devices

A wireless local area network (wlan) access point may receive a steering policy from a wlan controller, the steering policy matching various data rate capabilities to various quality of service (qos) levels. When a client device attempts to connect to the access point (ap), the ap responds via a default virtual access point (vap) so that the client device transmits its client data rate capability to the ap via association request. ... Dell Software Inc

10/05/17 / #20170289391

Printed document control with verified unique watermarks

Systems and methods are directed towards generating a verified unique watermark. More specifically, the systems and methods are directed towards generating a watermark that is as long as possible without any repetition. ... Dell Software Inc

09/21/17 / #20170272336

Determining data that is collected when an employee uses corporate resources

Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. ... Dell Software Inc

09/21/17 / #20170270457

Providing an employee a perk to collect data of employee usage of corporate resources

Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. ... Dell Software Inc

09/21/17 / #20170270437

Obtaining employee permission to collect data associated with employee use of corporate resources

Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. The usage data that is collected may be determined. ... Dell Software Inc

09/14/17 / #20170262502

Auto query construction for in-database predictive analytics

A system, method, and computer-readable medium for performing an auto-query construction operation for use with a distributed analytics operation. More specifically, in certain embodiments, the auto-query construction operation provides automatically generates sql code instructions via an auto-query construction user interface (ui) settings in a computational system, such as the dell statistica computational system. ... Dell Software Inc

09/07/17 / #20170255903

Determining delivery dates for multiple product types

Systems and techniques to determine, substantially in real time, an estimated ship date or an estimated delivery date associated with a product are described. A commitment engine may receive, from a computing device, data associated with a product that comprises a built-to-order product. ... Dell Software Inc

09/07/17 / #20170255506

Monitoring, analyzing, and mapping of computing resources

Systems and techniques for dynamic monitoring, analysis and mapping of resources are described. Monitoring data can be obtained from a variety of different sources, such as operating systems, applications, hardware interfaces, and the like. ... Dell Software Inc

08/31/17 / #20170249402

Generating simulation data using a linear curve simplification and reverse simplification method

Simulation data can be generated using a linear curve simplification and reverse simplification method. This method can facilitate the generation of simulation data from existing data where the simulation data will exhibit the same curve pattern as the existing data but with a degree of variation. ... Dell Software Inc

08/10/17 / #20170230458

Providing a single interface for accessing resources that are distributed among multiple platforms

A single interface can be provided for accessing resources that are distributed among multiple platforms. Resources that are stored in different platforms and to which a user should have access can be identified. ... Dell Software Inc

08/10/17 / #20170230324

Deputizing agents to reduce a volume of event logs sent to a coordinator

Systems and techniques to deputize agents in a system to reduce a number of event logs received by a coordinator are described. An agent belonging to a group of agents may receive a request to select a deputized agent. ... Dell Software Inc

08/10/17 / #20170228558

Context-aware delegation risk system

A risk analysis system of associated with an enterprise system for determining delegation risks associated with assigning candidate individuals to perform various tasks. In some cases, the delegation risk analysis system may generate individual delegation risk scores to each candidate individual to assist in the delegation of tasks throughout an organization. ... Dell Software Inc

08/03/17 / #20170220664

Systems and methods for logging and categorizing performance events

In one embodiment, a method includes executing a first logging process, a second logging process and a categorization process in parallel on a computer system, wherein the first logging process identifies computer-performance events at a monitored resource. The method further includes the second logging process monitoring the first logging process for the computer-performance events. ... Dell Software Inc

08/03/17 / #20170220593

Read-only file system for testing de-duplication

Disclosed herein are systems, methods, and devices for testing deduplication repositories. Methods may include identifying a storage location based on a request for one or more data values associated with a read-only file system, where the read-only file system is a simulated file system, and where the storage location is identified based on a plurality of request parameters included in the request. ... Dell Software Inc

07/27/17 / #20170214759

Optimizer module in high load client/server systems

An optimizer module can function as a proxy between clients and a server that provides access to a service via a rest api. As a proxy, the optimizer module can receive requests from the clients and can combine the requests into a single bulk request that is then submitted to the server. ... Dell Software Inc

07/27/17 / #20170213258

Multidimensional synopsis generation

A multidimensional synopsis of a stream of textual data pertaining to a particular subject can be generated. To produce the multidimensional synopsis, multiple dimensions that each includes concepts can be identified. ... Dell Software Inc

07/27/17 / #20170212910

Categorizing captured images for subsequent search

Systems and methods are described to identify in the images text, people, landmarks, objects, or any combination thereof and to store and search for images based on extracted data. A portable computing device, such as a wireless phone or tablet computer, may capture an image, determine context data associated with the image, and send the image and context data to an analyzer. ... Dell Software Inc

07/27/17 / #20170212811

Recovering a specified set of documents from a database backup

Techniques and systems for restoring objects from a backup file without restoring a remainder of the backup file are described. For example, a plurality of object identifiers that identify a plurality of objects stored in the backup file may be determined. ... Dell Software Inc

07/20/17 / #20170208035

User based stateless ipv6 ra-guard

The present disclosure relates to an apparatus, a method, and a non-transitory computer readable storage medium for filtering routing assignment (ra) messages in a computer network. Methods, non-transitory computer readable storage medium, and apparatus consistent with the present disclosure may receive an ra message, extract information included in an ra message when identifying whether that particular ra messages should be forwarded or blocked. ... Dell Software Inc

07/20/17 / #20170207989

Dynamic domain name system destination selection

A user device, in trying to communicate with an internet resource knowing an associated domain name, transmits a domain name system (dns) request packet to a dns server, which responds with a dns response packet identifying multiple internet protocol (ip) addresses corresponding to multiple servers associated with the identified domain name. The user device then selects one of these servers and communicates with that selected server. ... Dell Software Inc

07/20/17 / #20170206247

Delaying one or more searches to cause multiple searches to load and evaluate segments together

The performance of a server can be improved by causing multiple searches to load segments of an index and search within them together. When multiple search requests are received and executed within a minimal time difference, the first search can be delayed to allow the second search—and possibly additional searches—to catch up so that the searches do not require loading segments multiple times.. ... Dell Software Inc

07/13/17 / #20170201879

Temporary disposable portable identifier

A system, method, and computer-readable medium for performing a temporary disposable portable identifier operation, comprising: requesting a unique identifier from a provider; generating, via a provider, a request to generate a temporary disposable identifier corresponding to a unique identifier; and, providing the temporary disposable identifier corresponding to the unique identifier to a customer, the temporary disposable identifier only being valid for a defined amount of time, after which the temporary disposable identifier expires.. . ... Dell Software Inc

07/06/17 / #20170193079

Smart exchange database index

A full-text index can be created for each mailbox of an edb to facilitate the performance of complex queries to quickly search for email data. In this way, relevant email data can be identified and retrieved quickly and efficiently from the full-text index rather than from the edb. ... Dell Software Inc

07/06/17 / #20170192854

Email recovery via emulation and indexing

Emails can be recovered in a quick and granular fashion by restoring an edb within an emulated exchange server environment and then creating a full-text index for each mailbox in the restored edb. The full-text index could then be employed to perform searches for particular emails thereby leveraging the granular search capabilities that the full-text index provides. ... Dell Software Inc

06/29/17 / #20170187753

Context-aware delegation engine

A context-aware delegation engine can enable an account owner to identify granular criteria (or context) that will be used to determine what content a delegate will have access to. The account owner can therefore leverage a wide range of information to dynamically determine whether a delegate will receive access to particular content. ... Dell Software Inc

06/29/17 / #20170185798

Controlling content modifications by enforcing one or more constraint links

Embodiments of the present disclosure include systems and methods for controlling modification of a data file that is accessed by multiple components of an application platform. The method for controlling modification of a data file includes: preparing a link constraint data that includes information of a data file and a component of an application platform, the component being associated with the data file; preparing an alert data that includes information of the data file and a person having a permission to modify the data file; responsive to an attempt of a user to modify the data file, retrieving the information of the component from the link constraint data and the information of the person from the alert data; and sending a notice of the attempt to at least one of the person and the user.. ... Dell Software Inc

06/22/17 / #20170180230

Tcp traffic priority bandwidth management control based on tcp window adjustment

The present disclosure relates to an apparatus, a method, and a non-transitory computer readable storage medium for managing bandwidth in a computer network. The method may identify that a first received packet belongs to a first traffic class and a second received packet belongs to a second traffic class where the first traffic class is associated with a higher priority than the second traffic class. ... Dell Software Inc

06/15/17 / #20170171831

Registering network devices using known host devices

Network devices can be registered to access a network using known host devices to thereby simplify the device registration process. The host device can be an administrator's device that is already registered and authorized to vouch for another user desiring to register his or her device. ... Dell Software Inc

06/15/17 / #20170171424

Printed document control with verified unique watermarks

Systems and methods are directed towards generating a verified unique watermark. More specifically, the systems and methods are directed towards generating a watermark that is as long as possible without any repetition. ... Dell Software Inc

06/15/17 / #20170171227

Automatic tunnels routing loop attack defense

The present disclosure relates to systems, methods, and non-transitory computer readable storage medium for detecting a tunnel routing loop attack on a computer network. A method of the presently claimed invention receives a packet of data over an automatic tunnel. ... Dell Software Inc

06/15/17 / #20170171222

Reassembly free deep packet inspection for peer to peer networks

The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. ... Dell Software Inc

06/08/17 / #20170163650

Usage-based modification of user privileges

Systems and techniques to identify and modify unused (or seldom used) access privileges are described. Group membership data may be correlated with access map data to create a user-resource access map identifying privilege levels associated with individual user accounts to access computing resources in a computing system. ... Dell Software Inc

06/08/17 / #20170163604

Method and apparatus to perform multiple packet payloads analysis

A method and apparatus for identifying data patterns of a file are described herein. In one embodiment, an exemplary process includes, but is not limited to, receiving a data packet of a data stream containing a file segment of a file originated from an external host and destined to a protected host of a local area network (lan), the file being transmitted via multiple file segments contained in multiple data packets of the data stream, and performing a data pattern analysis on the received data packet to determine whether the received data packet contains a predetermined data pattern, without waiting for a remainder of the data stream to arrive. ... Dell Software Inc

06/08/17 / #20170161327

Distributed database driver middleware

Jdbc-x, which is distributed database driver middleware, can extend the jdbc api to facilitate integrating an application with a distributed database. Jdbc-x functions as an intermediary between the jdbc api and the jdbc drivers and provides a number of components that adapt jdbc sql queries and corresponding result sets in a manner that is substantially transparent to the application. ... Dell Software Inc

06/01/17 / #20170155670

Time zero classification of messages

Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious, determining whether a similar message has been noted previously in the event that the message is determined to be suspicious, classifying the message according to its individual characteristics and its similarity to the noted message in the event that a similar message has been noted previously.. . ... Dell Software Inc

06/01/17 / #20170155622

Category-based data loss prevention for network-connected devices

A network-connected device (such as an “internet of things” device) that periodically transmits data to recipient devices (e.g., smartphones, tablets, laptops) may be protected by a firewall that include software firewall elements, hardware firewall elements, or some combination thereof. The firewall may intercept datasets sent by the network-connected device, inspect the datasets, and categorize data within each dataset as belonging to one of a number of previously-identified data categories, such as personal data, location data, behavior data, or energy data, or as not belonging to any recognized data category. ... Dell Software Inc

05/18/17 / #20170142139

Cloud-based gateway security scanning

Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. ... Dell Software Inc

05/18/17 / #20170142070

Method to enable deep packet inspection (dpi) in openflow-based software defined network (sdn)

The present invention relates to a method and system for performing deep packet inspection of messages transmitted through a network switch in a software defined network (sdn). Embodiments of the invention include a network switch, a controller, and a firewall in a software defined networking environment. ... Dell Software Inc

05/18/17 / #20170142050

Identification of content by metadata

Systems and methods for identifying content in electronic messages are provided. An electronic message may include certain content. ... Dell Software Inc

05/18/17 / #20170139613

Continuous data backup using real time delta storage

A continuous data backup using real time delta storage has been presented. A backup appliance receives a backup request from a backup agent running on a computing machine to backup data on the computing machine. ... Dell Software Inc

05/11/17 / #20170134428

Firewall informed by web server security policy identifying authorized resources and hosts

A user of a client device that is protected by a firewall may navigate to a website using a particular browser process (e.g., a window/tab of a browser) of the client device, sending a content request toward a web content server in the process. The firewall may intercept the content request, and may also receive information from the client device identifying which browser process initiated the content request. ... Dell Software Inc

05/11/17 / #20170134409

Method and an apparatus to perform multiple packet payloads analysis

A method and an apparatus to perform multiple packet payload analysis have been disclosed. In one embodiment, the method includes receiving a plurality of data packets, each of the plurality of data packets containing a portion of a data pattern, determining whether each of the plurality of data packets is out of order, and making and storing a local copy of the corresponding data packet if the corresponding data packet is out of order. ... Dell Software Inc

05/11/17 / #20170132366

Platform for administration of personal health information

A system, method, and computer-readable medium are disclosed for performing personal healthcare administration, comprising: receiving health information from a consumer to a business intelligence suite via a portal; receiving a query regarding a healthcare study from a buyer, the healthcare study including a request for health information from the consumer; and, providing the consumer with an incentive for the consumer providing the health information to the business intelligence suite.. . ... Dell Software Inc

05/11/17 / #20170132222

Document link migration

Techniques and systems for migrating links in documents are described. For example, during a migration process, a first document may be selected to be migrated from a source document database. ... Dell Software Inc

05/04/17 / #20170126601

Image based spam blocking

A fingerprint of an image identified within a received message is generated following analysis of the message. A spam detection engine identifies an image within a message and converts the image into a grey scale image. ... Dell Software Inc

04/27/17 / #20170118221

Query interface to policy server

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether an access request is made by a user. ... Dell Software Inc

04/27/17 / #20170118181

Securing internet of things communications across multiple vendors

A secure connection between a user mobile device and a “internet-of-things” network-connected device (e.g. A home appliance or a vehicle) may be provided using an internet gateway residing in the public internet and a local gateway residing in a private network behind a firewall. ... Dell Software Inc

04/27/17 / #20170118027

Secure neighbor discovery (send) using pre-shared key

An extension is provided to the send protocol without requiring a cga or third party trust anchor. A shared key is provided to both a sender and receiver of a neighbor discovery (nd) message. ... Dell Software Inc

04/27/17 / #20170116205

Email and identity migration based on multifactor relationship data provided by users and systems

Methods, systems, and apparatuses for creating collections of associated accounts for a migration process. An example system includes a processing device and memory that stores accounts in accordance with at least one domain. ... Dell Software Inc

04/27/17 / #20170116057

Packet processing on a multi-core processor

A method for packet processing on a multi-core processor. According to one embodiment of the invention, a first set of one or more processing cores are configured to include the capability to process packets belonging to a first set of one or more packet types, and a second set of one or more processing cores are configured to include the capability to process packets belonging to a second set of one or more packet types, where the second set of packet types is a subset of the first set of packet types. ... Dell Software Inc

04/13/17 / #20170104761

Identity authentication using multiple devices

A system, method, and computer-readable medium for performing an authentication operation comprising: identifying a plurality of user devices associated with a user of an information handling system; determining when at least some of the plurality of user devices are within a predetermined range of the information handling system; and, authenticating the user as an authorized user of the information handling system when at least some of the plurality of user devices are within the predetermined range of the information handling system.. . ... Dell Software Inc

04/13/17 / #20170104687

Managing persistent cookies on a corporate web portal

Systems and methods for management of persistent cookies in a corporate web portal are described. A plurality of zones may be defined and stored in memory. ... Dell Software Inc

04/13/17 / #20170103120

Using distinguishing properties to classify messages

A system and method are disclosed for classifying a message. The method includes receiving the message, identifying in the message a distinguishing property; generating a signature using the distinguishing property; and comparing the signature to a database of signatures generated by previously classified messages.. ... Dell Software Inc

04/06/17 / #20170099283

Single login authentication for users with multiple ipv4/ipv6 addresses

Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information. Authentication and authorization of a client device to access a plurality of resources after an initial set of login information is received by a networked computing environment. ... Dell Software Inc

04/06/17 / #20170099247

Folders that employ dynamic user training rules to organize content

Dynamic user training rules can be employed to organize content within a folder. Each folder can be associated with a dynamic rule that defines a number of attribute and weighting factor associations and a folder threshold. ... Dell Software Inc

04/06/17 / #20170097864

Collecting and transmitting diagnostics information from problematic devices

A system, method, and computer-readable medium are disclosed for collecting and transmitting diagnostics information via a diagnostic information operation. The diagnostic information operation begins with a system periodically writing diagnostic information such as diagnostic errors and warnings to non-volatile local storage contained within the system. ... Dell Software Inc

03/30/17 / #20170093894

Notification for reassembly-free file scanning

Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. ... Dell Software Inc

03/30/17 / #20170093863

Combining a set of risk factors to produce a total risk score within a risk engine

A risk engine can be configured to produce a total risk score by combining a set of risk factors. A risk policy can define a percentage that is to be assigned to each risk factor that is present in a request to access a web-accessible application. ... Dell Software Inc

03/09/17 / #20170070536

Governance policy framework for cloud resources

A system, method, and computer-readable medium are disclosed for performing a cloud environment governance policy operation which provides a governance policy framework for use within cloud environments. In various embodiments, the cloud environment governance policy operation expands identify access management (iam) systems to understand not only users but also resources. ... Dell Software Inc

03/09/17 / #20170070505

Providing controlled access to admin credentials during a migration

Access to admin credentials can be controlled during a migration. By controlling access to the admin credentials, a consultant can be allowed to perform migration tasks without the consultant being exposed to the administrative-level access necessary to perform such tasks. ... Dell Software Inc

03/09/17 / #20170070464

Automatically applying data loss prevention rules during migration

Data loss prevention (“dlp”) rules can be automatically applied to items during a migration. When a migration is performed, a migration engine may be configured with migration configuration settings which define the items to be migrated from the source system to the target system. ... Dell Software Inc

03/02/17 / #20170063764

During an email migration, converting distribution list messages into single-instanced content within a collaboration platform group

During an email migration, a migration engine can identify which emails in the source system are associated with distribution lists. The migration engine can convert any emails that are associated with a distribution list into group content of an appropriate group in the target system. ... Dell Software Inc

03/02/17 / #20170060957

Optimized and consistent replication of file overwrites

In general, certain embodiments of the present disclosure provide techniques or mechanisms for creating efficient and consistent replication of file overwrites. According to various embodiments, a file map with a sequence file number is created for a data file on a source. ... Dell Software Inc

02/16/17 / #20170046344

Method for performing in-database distributed advanced predictive analytics modeling via common queries

A system, method, and computer-readable medium for performing a distributed analytics operation. The distributed analytics operation uses interface technologies to de-couple an actual data storage technology from an implementation of distributed analytics. ... Dell Software Inc

02/09/17 / #20170041431

Read-ahead on signed connections with unsigning, inline, transparent proxies

Innovative technologies for reducing network request response times over a server-signed connection are disclosed. The technologies may involve dynamically computing synchronized compression dictionaries using server responses to speculative or “read-ahead” client requests. ... Dell Software Inc

02/09/17 / #20170041297

Unified source user checking of tcp data packets for network data leakage prevention

Systems and methods are directed towards network data leakage prevention (dlp). More specifically, the systems and methods are directed towards using tcp (transmission control protocol) data packets in conjunction with the dlp monitor. ... Dell Software Inc

02/09/17 / #20170039069

Adaptive core grouping

The present invention relates to a system, method, and non-transitory storage medium executable by one or more processors at a multi-processor system that improves load monitoring and processor-core assignments as compared to conventional approaches. A method consistent with the present invention includes a first data packet being received at a multi-processor system. ... Dell Software Inc

02/02/17 / #20170034179

Social media login and interaction management

A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login interface of a social media platform. ... Dell Software Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Dell Software Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Dell Software Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###