1
Jeffrey S Chase, Ronald P Doyle, Steven D Ims: Multi-tier service level agreement method and system. International Business Machines Corporation, Jeanine S Ray Esq, Steven M Greenberg, Carey Rodriguez Greenberg & Paul, August 29, 2006: US07099936 (190 worldwide citation)

A method for managing multi-tier SLA relationships. The method can include first computing costs of utilizing edge server resources in a CDN, costs of dedicating content host resources in a content host in lieu of the utilization, and prospective revenues which can be generated by the content host p ...


2
Jeffery S Chase, Ronald P Doyle: Autonomic selection of a request routing policy based upon cache effectiveness. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, June 23, 2009: US07552235 (148 worldwide citation)

The present invention is a system, method and apparatus for autonomic request routing policy selection. The system of the invention can include a multiplicity of pre-configured request routing policies and a data store of cache metrics for the pre-configured request routing policies. A routing polic ...


3
Jean Francois Le Pennec, Jean Charles Cueff, Alain Benayoun, Patrick Michel: Server assisted system for accessing web pages from a personal data assistant. International Business Machines Corporation, Jerry W Herndon Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, July 19, 2005: US06920488 (129 worldwide citation)

Server assisted system for accessing web page fields comprising a wireless Personal Data Assistant (PDA) communicating with the Internet by the intermediary of a wireless Internet gateway and a portal server capable of accessing the resources of the Internet such as servers. The portal server compri ...


4
Ronald P Doyle: Secure logging of vehicle data. International Business Machines Corporation, Jerry W Herndon Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, September 21, 2004: US06795759 (105 worldwide citation)

A secure event data recording system configured for use in a passenger vehicle. The secure event data recording system can include an event data recorder; a memory device coupled to the event data recorder and configured to store event data processed in the event data recorder; and, an input/output ...


5
Thomas L DiStefano III: Method of moderating external access to an electronic document authoring development and distribution system. Perfect Web Technologies, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, April 1, 2008: US07353199 (84 worldwide citation)

A method for moderating external access to an electronic document authoring, development and distribution system can comprise the steps of: identifying a third party requesting access to the system; permitting restricted access to the third party; and, eliminating all access restrictions imposed in ...


6
Michael Scheidell: Intrusion detection system. Secnap Networks Security, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, October 13, 2009: US07603711 (78 worldwide citation)

An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or ...


7
Afshan Ally, Mark William Hubbard, John Wright Stephenson: Loose coupling of web services. International Business Machines Corporation, Willy D Rose Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, August 4, 2009: US07571447 (76 worldwide citation)

A Web services access management system which enables loosely coupled Web services can include a servlet configured to receive incoming request messages to access business logic and a mapping table associating different ones of the request messages with different business logic. Mapping logic can be ...


8
Christopher W Day: Intrusion detection system using self-organizing clusters. Steelcloud, Christopher & Weisberg P A, Steven M Greenberg, March 21, 2006: US07017186 (75 worldwide citation)

An intrusion detection system (IDS). An IDS which has been configured in accordance with the present invention can include a traffic sniffer for extracting network packets from passing network traffic; a traffic parser configured to extract individual data from defined packet fields of the network p ...


9
Mari Abe, Scott D DeWitt, Masahiro Hori, Brad B Topol: Generating and utilizing robust XPath expressions. International Business Machines Corporation, Jeanine R Yarletts Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, August 1, 2006: US07086042 (68 worldwide citation)

A system and method for generating and processing robust XPath expressions. The system can include two or more differing XPath generators, at least one of the XPath generators producing at least two XPath expressions for a selected node, the produced XPath expressions forming a redundant set of robu ...


10
Bryan E Aupperle, Julie H King, Sridhar R Muppidi: Integrating legacy application/data access with single sign-on in a distributed computing environment. International Business Machines Corporation, Jeanine Ray Yarletts Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, September 16, 2008: US07426642 (67 worldwide citation)

The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environm ...