1
Anthony F Istvan, Rod G Fleck, Robin Budd, Korina J B Stark, Marcellino Tanumihardja: Network-accessible control of one or more media devices. Vulcan, Perkins Coie, September 7, 2010: US07792920 (101 worldwide citation)

A content management (CM) system is provided to centrally control operation of one or more connected devices by issuing control requests and/or data requests. In some situations the connected device(s) include devices that control presentation of television programming-related content, such as digit ...


2
Robin Budd, Christopher W Jones: Method and system for email synchronization for an electronic device. Vulcan Portals, Perkins Coie, May 19, 2009: US07536440 (81 worldwide citation)

An electronic device, such as a hand-held portable computer, is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email ap ...


3
Robin Budd, Christopher W Jones: Method and system for polling a server for new emails, downloading the new emails in a background process, and caching the downloaded emails for access by an email application of an electronic device, such as a portable computer. Vulcan Portals, Seed IP Law Group PLLC, October 30, 2007: US07290034 (72 worldwide citation)

An electronic device, such as a hand-held portable computer, is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email ap ...


4
Robin Budd, Alexandr Veprinsky, Arieh Don: End-to-end checksumming for database environments. EMC Corporation, Choate Hall & Stewart, April 4, 2006: US07024593 (21 worldwide citation)

Described are techniques used in detection of a data corruption in a computer system. A host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validatio ...


5
Robin Budd, Alexander Veprinsky, Arieh Don: End-to-end checksumming for read operations. EMC Corporation, Muirhead and Saturnelli, February 21, 2006: US07003702 (14 worldwide citation)

Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write reque ...


6
Anthony F Istvan, Rod G Fleck, Robin Budd, Korina J B Stark, Marcellino Tanumihardja: Network-accessible control of one or more media devices. Vulcan, Perkins Coie, January 22, 2013: US08359351 (13 worldwide citation)

A content management (CM) system is provided to centrally control operation of one or more connected devices by issuing control requests and/or data requests. In some situations the connected device(s) include devices that control presentation of television programming-related content, such as digit ...


7
Robin Budd, Arieh Don, Alexandr Veprinsky: Method and apparatus for providing continuous communications between computers. EMC Corporation, Krishnendu Gupta, Joseph D Angelo, December 15, 2009: US07634601 (3 worldwide citation)

A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability ...


8
Robin Budd, Arieh Don, Alexandr Veprinsky: Method and apparatus for providing continuous communication between computers. EMC Corporation, Krishnendu Gupta, Joseph D Angelo, August 25, 2009: US07581048 (1 worldwide citation)

A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability ...


9
Robin Budd, Alexander Veprinsky, Arieh Don: End-to-end checksumming for read operations. Hutchins Wheeler & Dittmar, September 18, 2003: US20030177435-A1

Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write reque ...


10
Robin Budd, Christopher W Jones: Method and system for managing email attachments for an electronic device. Vulcan Portals, Seed Intellectual Property Law Group Pllc, April 7, 2005: US20050076085-A1

An electronic device, such as a hand-held portable computer is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email app ...