1
Frederick J Dillman, Edward S Ferrara, Sumeet Malhotra: System and method for using blueprints to provide a software solution for an enterprise. Richard J Gregson, Woodcock Washburn, June 9, 2009: US07546575 (69 worldwide citation)

The present invention provides a technique for the development of a software-based business solution using blueprint. A blueprint is a collection of artifacts that relate to an enterprise, and to the processes that an enterprise may perform. The blueprint may contain artifacts describing general bus ...


2
Frederick J Dillman, Edward S Ferrara, Sumeet Malhotra: System and method for using blueprints to provide a traceable software solution for an enterprise. Unisys Corporation, Richard J Gregson, Robert P Marley, Woodcock Washburn, December 30, 2008: US07472374 (19 worldwide citation)

The present invention provides a technique for the development of a software-based business solution using blueprint. A blueprint is a collection of artifacts that relate to an enterprise, and to the processes that an enterprise may perform. The blueprint may contain artifacts describing general bus ...


3
Sumeet Malhotra, Swati Gupta, Girish B K Kumar: Method and system for implementing hierarchical permission maps in a layered volume graph. EMC Corporation, Chapin IP Law, December 7, 2010: US07849281 (1 worldwide citation)

The invention is for a method of mapping hierarchical volume permission to top level permissions in a layered volume graph of a virtual data storage system with hierarchy of storage volumes requiring permission at every volume level and the top level volume exposed to the hosts via intelligent switc ...


4
Sumeet Malhotra, Swati Gupta, Girish BK Kumar: Method and system for implementing hierarchical permission maps in a layered volume graph. Barry W Chapin, Chapin Intellectual Property Law, October 4, 2007: US20070233985-A1

The invention is for a method of mapping hierarchical volume permission to top level permissions in a layered volume graph of a virtual data storage system with hierarchy of storage volumes requiring permission at every volume level and the top level volume exposed to the hosts via intelligent switc ...



Click the thumbnails below to visualize the patent trend.