1
Purushotham Kola
Nan Xie, Arvind Srinivasamoorthy, Ravindran Sankaran, Annaji Garimella, Purushotham Kola, Thirupathi Reddy Annadi, Mark James Glenn Craig: Techniques for automated generation of deployment plans in an SOA development lifecycle. Oracle International Corporation, Kilpatrick Townsend & Stockton, March 18, 2014: US08677309 (8 worldwide citation)

A framework (referred to herein as Application Integration Architecture, or AIA) that formalizes and orchestrates activities in an SOA development lifecycle. In one set of embodiments, AIA can capture development-related information in a shared data store and cause the information to flow in an auto ...


2
Purushotham Kola
Arvind Srinivasamoorthy, Purushotham Kola, Ravindran Sankaran, Annaji Garimella, Raghavateja Kalapatapu, Thirupathi Reddy Annadi, Mark James Glenn Craig, Nan Xie: Techniques for rapid deployment of service artifacts. Oracle International Corporation, Kilpatrick Townsend & Stockton, September 3, 2013: US08527985 (5 worldwide citation)

A framework (referred to herein as Application Integration Architecture, or AIA) that formalizes and orchestrates activities in an SOA development lifecycle. In one set of embodiments, AIA can capture development-related information in a shared data store and cause the information to flow in an auto ...


3
Steven Jobs
Tammy Tova Abraham, Alexandrea Anderson, Steve Jobs, Robert H Kondrk, Oliver Krevet, Jeffrey L Robbin, Mike Wiese: Techniques and graphical user interfaces for preview of media items. Apple, Kilpatrick Townsend & Stockton, April 1, 2014: US08689254

Improved techniques and graphical user interfaces for presenting a media item on a computing device are disclosed. In one embodiment, the media item is a video. A video information window can provide a user with information concerning the video and can enable the user to play at least a portion of t ...


4
Stephane Maes: Shared view of customers across business support systems (BSS) and a service delivery platform (SDP). Oracle International Corporation, Kilpatrick Townsend & Stockton, December 6, 2011: US08073810 (144 worldwide citation)

An identity management tool provides identity management across multiple domains, providing a single access point not only for information for runtime, network, and service layer information, but also for systems such as business support systems (BSS), operational support systems (OSS), and third pa ...


5
Stephane H Maes: Best effort seamless network switch in a media streaming session. Oracle International Corporation, Kilpatrick Townsend & Stockton, August 23, 2011: US08005988 (137 worldwide citation)

Systems, methods, and machine-readable media are disclosed for switching a media streaming session between a plurality of networks. In one embodiment, a method of switching networks in a media streaming session can comprise detecting a plurality of networks available for communication of streaming d ...


6
Soonam Park, Soo Jeon, Toan Q Tran, Jang Gyoo Yang, Qiwei Liang, Dmitry Lubomirsky: Remote plasma source seasoning. Applied Materials, Kilpatrick Townsend & Stockton, August 2, 2011: US07989365 (136 worldwide citation)

Methods of seasoning a remote plasma system are described. The methods include the steps of flowing a silicon-containing precursor into a remote plasma region to deposit a silicon containing film on an interior surface of the remote plasma system. The methods reduce reactions with the seasoned walls ...


7
Neil McKee, Peter Phaal: Methods and computer programs for generating data traffic matrices. InMon, Kilpatrick Townsend & Stockton, Ardeshir Tabibi, August 23, 2011: US08005009 (132 worldwide citation)

A method and system for monitoring traffic flow includes assigning a subset of sampling points to a node or unique pair of nodes. The sampling points are determined to be the most likely to monitor data traffic, and preferably all data traffic, associated with the node or node pair. The sampling poi ...


8
Stephen Chasko, Michael Demeter: Detecting network intrusion using a decoy cryptographic key. Landis Gyr Innovations, Kilpatrick Townsend & Stockton, May 6, 2014: US08719938 (127 worldwide citation)

Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic ...


9
Chris Matthieu, Geir Ramleth: Security and rights management in a machine-to-machine messaging system. CITRIX SYSTEMS, Kilpatrick Townsend & Stockton, July 28, 2015: US09094407 (126 worldwide citation)

Techniques for providing security and rights management in a machine-to-machine messaging system are provided, such as a computing device, a method, and a computer-program product for detecting unauthorized message attempts. For example, the method may receive a communication sent from a first Inter ...


10
Stephen Strong, Frederick R Tuck, Daniel Alexander Landreth: Satellite signal distribution. EchoStar Technologies L L C, Kilpatrick Townsend & Stockton, October 29, 2013: US08572661 (125 worldwide citation)

Disclosed is a system and method for receiving satellite television signals. A centralized system component may be provided in association with the satellite antenna. The centralized system component includes at least one or more tuners and one or more demodulators. The centralized component may pro ...



Click the thumbnails below to visualize the patent trend.