1
Brian T Stein: Peer-to-peer software update distribution network. Red Hat, Lowenstein Sandler PC, November 20, 2012: US08316364 (156 worldwide citation)

A software package of interest is identified, and information about a latest version of the package is retrieved. Then, data corresponding to the latest version are downloaded from a peer-to-peer network, and the downloaded package is installed. Alternative methods and systems for use in particular ...


2
James P Schneider: Unattended upgrade for a network appliance. Red Hat, Blakely Sokoloff Taylor & Zafman, May 3, 2011: US07937699 (145 worldwide citation)

A method and apparatus for upgrading a network appliance. In one embodiment, the method includes determining that an upgrade of the network appliance is needed using versioning information of the network appliance and upgrade versioning information, and determining, based on upgrade criteria, whethe ...


3
Robert Scanlon, Alex Miller, Steven Wolfangel, Brad Wright, Randall Hauch: System and method for accessing data in disparate information sources. Red Hat, Blaklely Sokoloff Taylor and Zafman, February 23, 2010: US07668798 (133 worldwide citation)

The present invention relates to a system (10) for generating and maintaining virtual and physical metadata layers in a MetaBase metadata repository (110b) in order to simplify and optimize the retrieval of data from a plurality of disparate information sources (130a-130c). The system stores in a ph ...


4
Kenneth Preslan, Michael J Declerck, Matthew O Keefe: Metadata structures and related locking techniques to improve performance and scalability in a cluster file system. Red Hat, MH2 Technology Law Group, February 3, 2009: US07487228 (55 worldwide citation)

A cluster file system is disclosed. A plurality of disk servers, operating as a single distributed disk server layer, are connected to the one or more physical disks. Each disk server stores metadata for each of the files. A plurality of lock servers, having one or more locks for each file and assoc ...


5
Ade Lee, Christina Fu: Role-based access control utilizing token profiles. Red Hat, Lowenstein Sandler, February 26, 2013: US08387136 (55 worldwide citation)

A method A method and system for managing role-based access control of token data using token profiles is described. In one method, a token processing system (TPS) receives a request from a TPS client over a network to perform an operation on entries of a token database. The TPS identifies a subset ...


6
Donald Fischer, Havoc Pennington, Bryan Clark, Owen Taylor, Colin Walters: Identity management for open overlay for social networks and online services. Red Hat, MH2 Technology Law Group, September 7, 2010: US07792903 (52 worldwide citation)

Embodiments of the present invention provide methods and systems for managing the multiple identities used by a user. The user's existing contact lists, website accounts, buddy lists, and the like are analyzed to determine the identities used by the user. A graph is then constructed in order to trac ...


7
James Michael Ferris: Systems and methods for management of secure data in cloud-based network. Red Hat, Lowenstein Sandler PC, January 31, 2012: US08108912 (45 worldwide citation)

Embodiments relate to systems and methods for the management of secure data in a cloud-based network. A secure data store can store sensitive or confidential data, such as account numbers, social security numbers, medical or other information in an on-premise data facility. Regulatory and/or operati ...


8
Jonathan Brassow, Michael J Declerck, Andrew Lewis, Adam Manthei, Matthew O Keefe, Kenneth Preslan, David Teigland: Distributed file system using disk servers, lock servers and file servers. Red Hat, MH2 Technology Law Group, July 29, 2008: US07406473 (44 worldwide citation)

A distributed file system is disclosed. A plurality of disk servers, operating as a single distributed disk server layer, are connected to the one or more physical disks. Each disk server stores meta-data for each of the files. A plurality of lock servers, having one or more locks for each file oper ...


9
Donald Fischer: Automatic generation of content recommendations weighted by social network context. Red Hat, Lowenstein Sandler PC, January 3, 2012: US08091032 (41 worldwide citation)

Embodiments of the present invention provide users with suggested content that is weighted based on the social network context of the suggestion. In particular, the suggested content is selected based on incorporating the preferences of users having a relationship with the user. For example, content ...


10
Michael P McGrath: Configuration profiling for remote clients. Red Hat, Blakely Sokoloff Taylor & Zafman, May 3, 2011: US07937456 (41 worldwide citation)

A method and system for a securely gathering and sharing metrics on configurations of client systems. In one embodiment, a system includes a client that determines which components are installed in the client. The client receives, from a user, rating information for individual components in the clie ...