Learn more

SUIT JOHN M

Overview
  • Total Patents
    18
About

SUIT JOHN M has a total of 18 patent applications. Its first patent ever was published in 2007. It filed its patents most often in United States. Its main competitors in its focus markets computer technology, digital networks and it methods for management are CARBONITE INC, PONSFORD SIMON and ALLEN NICHOLAS A.

Patent filings in countries

World map showing SUIT JOHN Ms patent filings in countries
# Country Total Patents
#1 United States 18

Patent filings per year

Chart showing SUIT JOHN Ms patent filings per year from 1900 to 2020

Top inventors

# Name Total Patents
#1 Suit John M 18
#2 Becker Daniel L 3
#3 Yourcheck Mark J 2
#4 Sharma Vipul 2
#5 Yourcheck Mark I 1
#6 Keeton Adam J 1
#7 Suereth Joshua 1
#8 Tabernero Nathaniel R 1
#9 Sharma Vip 1
#10 Becker Daniel Lee 1

Latest patents

Publication Filing date Title
US2012166625A1 Automatic baselining of business application service groups comprised of virtual machines
US2012166623A1 Performing dependency analysis on nodes of a business application service group
US2012167083A1 Assigning virtual machines to business application service groups based on ranking of the virtual machines
US2012167084A1 Automatic simulation of virtual machine performance
US2012096171A1 Establishing communication between enterprise nodes migrated to a public cloud and private enterprise infrastructure
US2012096142A1 Identification of business process application service groups
US2012096143A1 Indicating an impact of a change in state of a node
US8156378B1 System and method for determination of the root cause of an overall failure of a business application service
US2012096134A1 Migration of network entities to a cloud infrastructure
US2010077078A1 Network traffic analysis using a dynamically updating ontological network description
US2008320561A1 Method and system for collaboration involving enterprise nodes
US2008320499A1 Method and system for direct insertion of a virtual machine driver
US2008320592A1 Method and system for cloaked observation and remediation of software attacks