• All Courts
  • Federal Courts
  • Bankruptcies
  • PTAB
  • ITC
Track Search
Export
Download All
Displaying 69-83 of 102 results

1114 Exhibit: TutorialPoints Linus Managment

Document IPR2025-00092, No. 1114 Exhibit - TutorialPoints Linus Managment (P.T.A.B. Nov. 1, 2024)
The simplest way to start a background process is to add an ampersand (&) at the end of the command.
$1s ch*.doc & This displays all those files the names of which start with ch and end with .doc — ch01-1.doc ch010.doc ch02.doc ch03-2.doc ch04-1.doc ch040.doc ch05.doc ch06-2.doc ch01-2.doc ch02-1.doc Here, if the Is command wants any input (which it does not), it goes into a stop state until we move it into the foreground and give it the data from the keyboard.
Press the Enter key and you will see the following — [1] + Done is ch*.doc & $ The first line tells you that the Is command background process finishes successfully.
To be precise, a daemon is a process that runs in the background, usually waiting for something to happen that it is capable of working with.
It is an interactive diagnostic tool that updates frequently and shows information about physical and virtual memory, CPU usage, load averages, and your busy processes.
cite Cite Document

1084 Exhibit: Czarny US9749349

Document IPR2025-00092, No. 1084 Exhibit - Czarny US9749349 (P.T.A.B. Nov. 1, 2024)
( 72 ) Inventors : Benjamin Czarny , San Francisco , CA Inventors: Benjamin Czarny, San Francisco, CA Inventors: Benjamin Czarny, San Francisco, CA (72) (72) ( US ) ; Jianpeng Mo , Burlingame , CA (US); Jianpeng Mo, Burlingame, CA (US); Jianpeng Mo, Burlingame, CA ( US ) ; Ali Rezafard , Millbrae , CA ( US ) ; (US); Ali Rezafard, Millbrae, CA (US); (US); Ali Rezafard, Millbrae, CA (US); David Matthew Patt , Kansas City , MO David Matthew Patt, Kansas City, MO David Matthew Patt, Kansas City, MO
The diate response to eliminate a threat to the computer device diate response to eliminate a threat to the computer device computerized system receives product vulnerability data and computerized system receives product vulnerability data and of a potentially imminent malicious event .
In some embodiments, the order to prevent security problems , while allowing business product binary data contains strings of bits , bytes , words or order to prevent security problems, while allowing business product binary data contains strings of bits, bytes, words or operations to proceed with minimal interruption .
11 is a simplified schematic diagram of a vulner bits , bytes , words or characters that were extracted , 4 ) the bits, bytes, words or characters that were extracted, 4) the FIG. 11 is a simplified schematic diagram of a vulner- ability database system for use in the example computer complete binary level files of the software products , or 5 ) complete binary level files of the software products, or 5) ability database system for use in the example computer security vulnerability assessment system shown in FIG .
Conventional security vulnerabil- be apparent to those skilled in the art that modifications and ity assessment systems use such file identification data ( to variations can be made in the present technology without 30 30 ity assessment systems use such file identification data (to variations can be made in the present technology without departing from the spirit and scope thereof .
cite Cite Document

1074 Exhibit: VMwareInfrastructure

Document IPR2025-00092, No. 1074 Exhibit - VMwareInfrastructure (P.T.A.B. Nov. 1, 2024)
VMware Infrastructure delivers comprehensive virtualization, management, resource delivers comprehensive virtualization, management, resource optimization, application availability and operational automa- optimization, application availability and operational automa- tion capabilities in an integrated offering.
A number of similarly configured x86 servers can be grouped together with connections to the same network and grouped together with connections to the same network and storage subsystems to provide an aggregate set of resources in storage subsystems to provide an aggregate set of resources in the virtual environment, called a Cluster.
As demonstrated by the example, Resource Pools can be As demonstrated by the example, Resource Pools can be nested, organized hierarchically and dynamically reconfigured nested, organized hierarchically and dynamically reconfigured so that the IT environment matches the company organiza- so that the IT environment matches the company organiza- tion.
If a new physical server is made available, VMware DRS auto- If a new physical server is made available, VMware DRS auto- matically redistributes the virtual machines to take advantage matically redistributes the virtual machines to take advantage of it.
RDM provides a mechanism for a virtual machine to have direct access to a a mechanism for a virtual machine to have direct access to a LUN on the physical storage subsystem (Fiber Channel or iSCSI LUN on the physical storage subsystem (Fiber Channel or iSCSI only).
cite Cite Document

1016 Exhibit: Souppaya, NIST Application Container 2017

Document IPR2025-00092, No. 1016 Exhibit - Souppaya, NIST Application Container 2017 (P.T.A.B. Nov. 1, 2024)
Application Container Security Guide Application Container Security Guide Murugiah Souppaya Murugiah Souppaya John Morello John Morello Karen Scarfone Karen Scarfone This publication is available free of charge from: This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-190 https://doi.org/10.6028/NIST.SP.800-190
This publication is available free of charge from: This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-190 https://doi.org/10.6028/NIST.SP.800-190 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
Today's OS virtualization technologies are primarily focused on providing a portable, reusable, and automatable way to package and run applications (apps).
Traditional vulnerability management tools make many assumptions about host durability and Traditional vulnerability management tools make many assumptions about host durability and app update mechanisms and frequencies that are fundamentally misaligned with a containerized app update mechanisms and frequencies that are fundamentally misaligned with a containerized model.
Often, a container-specific OS uses a read- only file system design to reduce the likelihood of an attacker being able to persist data within it, only file system design to reduce the likelihood of an attacker being able to persist data within it, and it also utilizes a simplified upgrade process since there is little concern around app and it also utilizes a simplified upgrade process since there is little concern around app compatibility.
cite Cite Document

1027 Exhibit: Verizon DBIR 2019

Document IPR2025-00092, No. 1027 Exhibit - Verizon DBIR 2019 (P.T.A.B. Nov. 1, 2024)
Variety: Variety: More specific enumerations of higher level categories - e.g., More specific enumerations of higher level categories - e.g., classifying the external “bad guy” as an organized criminal group, classifying the external "bad guy" as an organized criminal group, or recording a hacking action as SQL injection or brute force.
Threat actor motives in breaches over time cn Breaches co The results found in this and subsequent sections The results found in this and subsequent sections within the report are based on a data set collected within the report are based on a data set collected from a variety of sources such as publicly-disclosed from a variety of sources such as publicly-disclosed security incidents, cases provided by the Verizon security incidents, cases provided by the Verizon Threat Research Advisory Center (VTRAC) Threat Research Advisory Center (VTRAC) investigators, and by our external collaborators.
Figure 11 shows Denial of Service attacks are again at the top shows Denial of Service attacks are again at the top of action varieties associated with security incidents, of action varieties associated with security incidents, but it is still very rare for DoS to feature in a confirmed but it is still very rare for DoS to feature in a confirmed data breach.
Social Social While hacking and malicious code may be the words While hacking and malicious code may be the words that resonate most with people when the term “data that resonate most with people when the term "data breach” is used, there are other threat action catego- breach" is used, there are other threat action catego- ries that have been around much longer and are still ries that have been around much longer and are still ubiquitous.
Users often interact with their mobile devices while walking, talking, their mobile devices while walking, talking, driving, and doing all manner of other activities driving, and doing all manner of other activities that interfere with their ability to pay careful that interfere with their ability to pay careful attention to incoming information.
cite Cite Document

1018 Exhibit: Scarfone, NIST Full Virtualization Technologies 2011

Document IPR2025-00092, No. 1018 Exhibit - Scarfone, NIST Full Virtualization Technologies 2011 (P.T.A.B. Nov. 1, 2024)
Acknowledgments Acknowledgments The authors, Karen Scarfone of G2, Inc., Murugiah Souppaya of the National Institute of Standards and The authors, Karen Scarfone of G2, Inc., Murugiah Souppaya of the National Institute of Standards and Technology (NIST), and Paul Hoffman of the VPN Consortium, wish to thank their colleagues who Technology (NIST), and Paul Hoffman of the VPN Consortium, wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content.
Introduction Introduction 1.1 Authority 1.1 Authority The National Institute of Standards and Technology (NIST) developed this document in furtherance of its The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347.
Because of the constantly changing nature of full virtualization technologies, readers are encouraged to Because of the constantly changing nature of full virtualization technologies, readers are encouraged to take advantage of other resources (including those listed in this document) for more current and detailed take advantage of other resources (including those listed in this document) for more current and detailed information.
For example, early versions of VirtualPC allowed users to run the Microsoft Windows OS on the PowerPC processor supported by the Apple MacOS platform.
A storage network is dedicated to perform these migrations or the transport channel is fully authenticated and encrypted to preserve the integrity of the VMs and prevent information leakage.
cite Cite Document

1102 Exhibit: CVE CVE 2018 1312

Document IPR2025-00092, No. 1102 Exhibit - CVE CVE 2018 1312 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1021 Exhibit: NIST Cloud Computing 2013

Document IPR2025-00092, No. 1021 Exhibit - NIST Cloud Computing 2013 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1059 Exhibit: CWE359 Exposure of Private Information

Document IPR2025-00092, No. 1059 Exhibit - CWE359 Exposure of Private Information (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1002 Exhibit: Declaration of Dr Angelos Stavrou

Document IPR2025-00092, No. 1002 Exhibit - Declaration of Dr Angelos Stavrou (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1066 Exhibit: Zhou Always up to date scalable offline patch

Document IPR2025-00092, No. 1066 Exhibit - Zhou Always up to date scalable offline patch (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1081 Exhibit: Budko US20100169948

Document IPR2025-00092, No. 1081 Exhibit - Budko US20100169948 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1101 Exhibit: CVE CVE 2018 15687

Document IPR2025-00092, No. 1101 Exhibit - CVE CVE 2018 15687 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1039 Exhibit: Payne Simplifying VMI Using LibVMI 2012

Document IPR2025-00092, No. 1039 Exhibit - Payne Simplifying VMI Using LibVMI 2012 (P.T.A.B. Nov. 1, 2024)

cite Cite Document

1035 Exhibit: Lengyel Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Ma...

Document IPR2025-00092, No. 1035 Exhibit - Lengyel Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware (P.T.A.B. Nov. 1, 2024)

cite Cite Document
<< 1 2 3 4 5 6 7 8 >>