1
Jeffrey Vinson, Steig Westerberg, Jeffrey DeVries: Software streaming system and method. Stream Theory Endeavors Technologies, Perkins Coie, August 18, 2009: US07577751 (138 worldwide citation)

A method for streaming software may include downloading blocks associated with a software title until an executable threshold is reached, initiating execution of the software title, and continuing to download blocks of the software title while the software title is executed. Another method for strea ...


2
Jeffrey Vinson, Steig Westerberg, Jeffrey DeVries: Method and apparatus for streaming software. Stream Theory, Perkins Coie, August 22, 2006: US07096253 (131 worldwide citation)

A file system driver program executes on a local computer. One or more agent procedures is configured to execute on the local computer to access file resources on behalf of a target process. A security process regulates the access of file resources by the agent procedures. The regulation of the agen ...


3
Jeffrey de Vries, Gregory Zavertnik: Method and system for executing a software application in a virtual environment. Stream Theory, Perkins Coie, November 11, 2008: US07451196 (95 worldwide citation)

Method and system for executing a software application in a virtual environment includes a file system hook operatively interposed between a file system manager and a file system driver of the local computer, the file system hook configured to detect a file system call corresponding to a target prog ...


4
Jeffrey de Vries: System and method for predictive streaming. Stream Theory, Perkins Coie, July 3, 2007: US07240162 (88 worldwide citation)

A technique for predictive streaming involves receiving a request for a block associated with a streaming application and serving data associated with the block. A block request database is checked to predict what block is likely to be requested next based upon prior block request data. The predicte ...


5
De, Vries Jeffrey, Hubbell Ann: Explicit overlay integration rules. Stream Theory, AHMANN William F, September 28, 2006: WO/2006/102532 (24 worldwide citation)

A technique for controlling access to files or directories in a system that includes and overlay involves the use of explicit overlay integration rules. An example of a method according to the technique may include providing an overlay to a file system structure; providing an explicit overlay integr ...


6
De, Vries Jeffrey: System and method for tracking changes to files in streaming applications. Stream Theory, VON TERSCH Glenn E, September 28, 2006: WO/2006/102621 (24 worldwide citation)

A technique for modifying virtual files involves tracking changes locally. A method according to the technique may include virtually representing a file on, for example, a streaming client, and writing modifications to the virtual file into a diff-file on the streaming client. A system according the ...


7

8
De, Vries Jeffrey: System and method for predictive streaming. Stream Theory, AHMANN William F, May 4, 2006: WO/2006/047133 (10 worldwide citation)

A technique for predictive streaming involves receiving a request for a block associated with a streaming application and serving data associated with the block. A block request database is checked to predict what block is likely to be requested next based upon prior block request data. The predicte ...


9
De, Vries Jeffrey, Zavertnik Greg, Hubbell Ann: Hybrid local/remote streaming. Stream Theory, AHMANN William, May 26, 2006: WO/2006/055445 (9 worldwide citation)

A technique for streaming from a local device and a remote device involves providing a subset of data associated with a streaming application to a local device. An example of a method according to the technique includes running a streaming software player, accessing data from a local storage device ...


10
De, Vries Jeff, Hubbell Ann, Zavertnik Greg: Interception-based resource detection system. Stream Theory, COLEMAN Brian R, March 2, 2006: WO/2006/022745 (9 worldwide citation)

Access to the network (102) is typically provided by Internet service providers (ISPs), such as the ISPS (110) and (116). Users on client system, such as client computer systems (112,), (118), (122), and (126) obtain access to the Internet thought the ISPS (110) and(116). Access to the internet allo ...