US10284519B1
|
|
Dynamically updating authentication schemes
|
US9754253B1
|
|
Conditioned use of certificates
|
US9319272B1
|
|
Methods and apparatus for providing composed appliance services in virtualized private networks
|
US8839222B1
|
|
Selecting updates for deployment to a programmable execution service application
|
US9875174B1
|
|
Optimizing the execution of an application executing on a programmable execution service
|
US9223790B1
|
|
Managing deletion of data in a data storage system
|
US9608930B1
|
|
Allocating identifiers with minimal fragmentation
|
US8751691B1
|
|
Methods and apparatus for remapping public network addresses on a network to an external network via an intermediate network
|
US9628294B1
|
|
Methods and apparatus for remapping public network addresses on a network to an external network via a private communications channel
|
US8789176B1
|
|
Detecting scans using a bloom counter
|
US9509503B1
|
|
Encrypted boot volume access in resource-on-demand environments
|
US9544137B1
|
|
Encrypted boot volume access in resource-on-demand environments
|
US9432407B1
|
|
Providing and accessing data in a standard-compliant manner
|
US9363102B1
|
|
Methods and apparatus for implementing anycast flow stickiness in stateful sessions
|
US8539556B1
|
|
Disabling administrative access to computing resources
|
US8706864B1
|
|
Behavior monitoring and compliance for multi-tenant resources
|
US8584228B1
|
|
Packet authentication and encryption in virtual networks
|
US8572613B1
|
|
Comparison of virtual computing states by performing identified repeatable computations in a changing virtual computing environment
|
US8224993B1
|
|
Managing power consumption in a data center
|
US9836466B1
|
|
Managing objects using tags
|