1
Jeffery S Chase, Ronald P Doyle: Autonomic selection of a request routing policy based upon cache effectiveness. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, June 23, 2009: US07552235 (148 worldwide citation)

The present invention is a system, method and apparatus for autonomic request routing policy selection. The system of the invention can include a multiplicity of pre-configured request routing policies and a data store of cache metrics for the pre-configured request routing policies. A routing polic ...


2
Jean Francois Le Pennec, Jean Charles Cueff, Alain Benayoun, Patrick Michel: Server assisted system for accessing web pages from a personal data assistant. International Business Machines Corporation, Jerry W Herndon Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, July 19, 2005: US06920488 (129 worldwide citation)

Server assisted system for accessing web page fields comprising a wireless Personal Data Assistant (PDA) communicating with the Internet by the intermediary of a wireless Internet gateway and a portal server capable of accessing the resources of the Internet such as servers. The portal server compri ...


3
Ronald P Doyle: Secure logging of vehicle data. International Business Machines Corporation, Jerry W Herndon Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, September 21, 2004: US06795759 (105 worldwide citation)

A secure event data recording system configured for use in a passenger vehicle. The secure event data recording system can include an event data recorder; a memory device coupled to the event data recorder and configured to store event data processed in the event data recorder; and, an input/output ...


4
Thomas L DiStefano III: Method of moderating external access to an electronic document authoring development and distribution system. Perfect Web Technologies, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, April 1, 2008: US07353199 (84 worldwide citation)

A method for moderating external access to an electronic document authoring, development and distribution system can comprise the steps of: identifying a third party requesting access to the system; permitting restricted access to the third party; and, eliminating all access restrictions imposed in ...


5
Michael Scheidell: Intrusion detection system. Secnap Networks Security, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, October 13, 2009: US07603711 (78 worldwide citation)

An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or ...


6
Afshan Ally, Mark William Hubbard, John Wright Stephenson: Loose coupling of web services. International Business Machines Corporation, Willy D Rose Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, August 4, 2009: US07571447 (76 worldwide citation)

A Web services access management system which enables loosely coupled Web services can include a servlet configured to receive incoming request messages to access business logic and a mapping table associating different ones of the request messages with different business logic. Mapping logic can be ...


7
Mari Abe, Scott D DeWitt, Masahiro Hori, Brad B Topol: Generating and utilizing robust XPath expressions. International Business Machines Corporation, Jeanine R Yarletts Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, August 1, 2006: US07086042 (68 worldwide citation)

A system and method for generating and processing robust XPath expressions. The system can include two or more differing XPath generators, at least one of the XPath generators producing at least two XPath expressions for a selected node, the produced XPath expressions forming a redundant set of robu ...


8
Bryan E Aupperle, Julie H King, Sridhar R Muppidi: Integrating legacy application/data access with single sign-on in a distributed computing environment. International Business Machines Corporation, Jeanine Ray Yarletts Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, September 16, 2008: US07426642 (67 worldwide citation)

The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environm ...


9
Mari Abe, Scott D DeWitt, Masahiro Hori, Brad B Topol: Selectable methods for generating robust XPath expressions. International Business Machines Corporation, Jerry W Herndon Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, May 1, 2007: US07213200 (64 worldwide citation)

A method and system for generating robust XPath expressions for a selected node in transcodable markup. The system of the invention can include a set of differing XPath expression generators; an interface through which at least one of the XPath expression generators can be selected; and, an XPath ge ...


10
Robert Thomas Uthe: Displaying arbitrary relationships in a tree-map visualization. International Business Machines Corporation, Gerald R Woods Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, October 20, 2009: US07605813 (59 worldwide citation)

A treemap visualization system can include a treemap configured to visualize a set of nodes. The treemap visualization system also can include an event handler programmed to process a proximity event associated with a specific portion of the treemap. The event handler can process the proximity event ...