1
Jeffrey S Chase, Ronald P Doyle, Steven D Ims: Multi-tier service level agreement method and system. International Business Machines Corporation, Jeanine S Ray Esq, Steven M Greenberg, Carey Rodriguez Greenberg & Paul, August 29, 2006: US07099936 (190 worldwide citation)

A method for managing multi-tier SLA relationships. The method can include first computing costs of utilizing edge server resources in a CDN, costs of dedicating content host resources in a content host in lieu of the utilization, and prospective revenues which can be generated by the content host p ...


2
Jeffery S Chase, Ronald P Doyle: Autonomic selection of a request routing policy based upon cache effectiveness. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, June 23, 2009: US07552235 (148 worldwide citation)

The present invention is a system, method and apparatus for autonomic request routing policy selection. The system of the invention can include a multiplicity of pre-configured request routing policies and a data store of cache metrics for the pre-configured request routing policies. A routing polic ...


3
Thomas L DiStefano III: Method of moderating external access to an electronic document authoring development and distribution system. Perfect Web Technologies, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, April 1, 2008: US07353199 (84 worldwide citation)

A method for moderating external access to an electronic document authoring, development and distribution system can comprise the steps of: identifying a third party requesting access to the system; permitting restricted access to the third party; and, eliminating all access restrictions imposed in ...


4
Michael Scheidell: Intrusion detection system. Secnap Networks Security, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, October 13, 2009: US07603711 (78 worldwide citation)

An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or ...


5
Afshan Ally, Mark William Hubbard, John Wright Stephenson: Loose coupling of web services. International Business Machines Corporation, Willy D Rose Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, August 4, 2009: US07571447 (76 worldwide citation)

A Web services access management system which enables loosely coupled Web services can include a servlet configured to receive incoming request messages to access business logic and a mapping table associating different ones of the request messages with different business logic. Mapping logic can be ...


6
Seraphin B Calo, Kang Won Lee, Kyoungsoo Park: Internet robot detection for network distributable markup. International Business Machines Corporation, Scott Paul Esq, Carey Rodriguez Greenberg Paul, February 22, 2011: US07895653 (70 worldwide citation)

Embodiments of the present invention provide a method, system and computer program product for bot detection for network distributable markup. In accordance with an embodiment of the present invention, a page request for distributed markup can be processed to incorporate embedded fragment within the ...


7
Bryan E Aupperle, Julie H King, Sridhar R Muppidi: Integrating legacy application/data access with single sign-on in a distributed computing environment. International Business Machines Corporation, Jeanine Ray Yarletts Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, September 16, 2008: US07426642 (67 worldwide citation)

The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environm ...


8
Mari Abe, Scott D DeWitt, Masahiro Hori, Brad B Topol: Selectable methods for generating robust XPath expressions. International Business Machines Corporation, Jerry W Herndon Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, May 1, 2007: US07213200 (64 worldwide citation)

A method and system for generating robust XPath expressions for a selected node in transcodable markup. The system of the invention can include a set of differing XPath expression generators; an interface through which at least one of the XPath expression generators can be selected; and, an XPath ge ...


9
Robert Thomas Uthe: Displaying arbitrary relationships in a tree-map visualization. International Business Machines Corporation, Gerald R Woods Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, October 20, 2009: US07605813 (59 worldwide citation)

A treemap visualization system can include a treemap configured to visualize a set of nodes. The treemap visualization system also can include an event handler programmed to process a proximity event associated with a specific portion of the treemap. The event handler can process the proximity event ...


10
Joseph A Russo, Robert Yates: Time limited collaborative community role delegation policy. International Business Machines Corporation, Stephen T Keohane Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, August 19, 2008: US07415498 (55 worldwide citation)

A method and system for establishing and maintaining a permission delegation policy for roles within a collaborative computing environment provide a list of potential delegatee end user persons to a delegator end user person. A list of delegatable permissions is provided to the delegator end user pe ...