1
Willibald Doeringer, Douglas Dykeman, Allan K Edwards, Diane P Pozefsky, Soumitra Sarkar, Roger D Turner: Inter-domain multicast routing. International Business Machines Corporation, John J Timar, November 1, 1994: US05361256 (254 worldwide citation)

Disclosed are a method and a system for transmitting a message or data packet from a single sender (21) to a plurality, i.e. a group of receivers, usually called multicasting, within a conventional unicast transmission network, i.e. a network basically not equipped to handle such multicast transmiss ...


2
Charles A Rudisill, Daniel J Whittle: Edge-lit transflective non-emissive display with angled interface means on both sides of light conducting panel. International Business Machines, John J Timar, Edward H Duffield, August 16, 1994: US05339179 (216 worldwide citation)

A transflective liquid crystal display (LCD) uses the reflective and refractive characteristics of an edge-lit flat light pipe as a backlight panel behind the liquid crystal layer. The front and/or back surfaces of the edge-lit backlight panel are textured to enhance reflectivity of ambient light an ...


3
Neal A Haggard, Chris L Molloy, Gary M Quesenberry, Robert C Robinson, Henry L Stuck: Performance/capacity management framework over many servers. International Business Machines Corporation, John J Timar, November 14, 2000: US06148335 (209 worldwide citation)

A method of monitoring a computer network by collecting resource data from a plurality of network nodes, analyzing the resource data to generate historical performance data, and reporting the historical performance data to another network node. The network nodes can be servers operating on different ...


4
Malcolm H Holloway, Thomas Joseph Prorock: System and method for detecting and preventing security. International Business Machines Corporation, John J Timar, September 8, 1998: US05805801 (193 worldwide citation)

A system and method for providing security against intrusion in a campus LAN network is provided. A managed hub discovers each interconnect device in the network that supports the security feature and maintains an interconnect device list of such devices, which may include token ring switches, Ether ...


5
Malcolm H Holloway, Thomas Joseph Prorock: Managed network device security method and apparatus. International Business Machines Corporation, John J Timar, May 18, 1999: US05905859 (181 worldwide citation)

An apparatus and method for providing security against intrusion in the managed devices of a campus LAN network is provided. A managed hub discovers each interconnect device in the network that supports the security feature and maintains an interconnect device list of such devices, which may include ...


6
Reino A Maki, Sujan K Mukherjee: Attribute-based classification and retrieval system. International Business Machines Corporation, John J Timar, April 6, 1993: US05201047 (173 worldwide citation)

An attribute-based automated classification and retrieval system for group technology applications using a codeless classification system in which hierarchical classification structures are stored in a classification attribute file and in which searches can be performed at any level in the classific ...


7
Paul A Beaven: Performance and status monitoring in a computer network. International Business Machines Corporation, John J Timar, May 6, 1997: US05627766 (167 worldwide citation)

Provided is a method and a system for computer network monitoring, implemented in a network in which processes communicate using message queuing. Each node of the network has a network management program installed thereon which includes two independent components: a Point Of Control (POC) program fo ...


8
Paul R Cobb, Christopher J Lennon, Kenneth J Long: System and method for software error early detection and data capture. International Business Machines Corporation, John J Timar, June 2, 1992: US05119377 (138 worldwide citation)

A process for detecting software errors in a computer program and automatically gathering diagnostic data limited to the error to be resolved. Error detection code is placed within the software program during program development. When an error or failure is detected, this process is called and captu ...


9
John D Grant, James L Hall, Barron C Housel III: Method and apparatus for providing continuous availability of applications in a computer network. International Business Machines Corporation, John J Timar, June 25, 1991: US05027269 (134 worldwide citation)

A method and apparatus for maintaining active sessions between communicating logical units in a computer network when an application system fails without having to re-establish the active sessions. By activating a persistent sessions capability at one of the logical units, the active sessions can be ...


10
Sujan K Mukherjee, James L Ryan, James R Wason: Method and system for product configuration definition and tracking. International Business Machines Corporation, John J Timar, Lauren C Bruzzone, May 10, 1994: US05311424 (128 worldwide citation)

A method and system for the definition and tracking of multiple unique product configurations for configuration management in which customer contracted views of the product are defined by applying temporary changes to the base product configuration. A product serial number effectivity is assigned to ...