1
Anthony F Istvan, Rod G Fleck, Robin Budd, Korina J B Stark, Marcellino Tanumihardja: Network-accessible control of one or more media devices. Vulcan, Perkins Coie, September 7, 2010: US07792920 (76 worldwide citation)

A content management (CM) system is provided to centrally control operation of one or more connected devices by issuing control requests and/or data requests. In some situations the connected device(s) include devices that control presentation of television programming-related content, such as digit ...


2
Robin Budd, Christopher W Jones: Method and system for email synchronization for an electronic device. Vulcan Portals, Perkins Coie, May 19, 2009: US07536440 (69 worldwide citation)

An electronic device, such as a hand-held portable computer, is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email ap ...


3
Robin Budd, Christopher W Jones: Method and system for polling a server for new emails, downloading the new emails in a background process, and caching the downloaded emails for access by an email application of an electronic device, such as a portable computer. Vulcan Portals, Seed IP Law Group PLLC, October 30, 2007: US07290034 (63 worldwide citation)

An electronic device, such as a hand-held portable computer, is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email ap ...


4
Robin Budd, Alexandr Veprinsky, Arieh Don: End-to-end checksumming for database environments. EMC Corporation, Choate Hall & Stewart, April 4, 2006: US07024593 (20 worldwide citation)

Described are techniques used in detection of a data corruption in a computer system. A host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validatio ...


5
Robin Budd, Alexander Veprinsky, Arieh Don: End-to-end checksumming for read operations. EMC Corporation, Muirhead and Saturnelli, February 21, 2006: US07003702 (14 worldwide citation)

Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write reque ...


6
Anthony F Istvan, Rod G Fleck, Robin Budd, Korina J B Stark, Marcellino Tanumihardja: Network-accessible control of one or more media devices. Vulcan, Perkins Coie, January 22, 2013: US08359351 (9 worldwide citation)

A content management (CM) system is provided to centrally control operation of one or more connected devices by issuing control requests and/or data requests. In some situations the connected device(s) include devices that control presentation of television programming-related content, such as digit ...


7
Robin Budd, Arieh Don, Alexandr Veprinsky: Method and apparatus for providing continuous communications between computers. EMC Corporation, Krishnendu Gupta, Joseph D Angelo, December 15, 2009: US07634601 (3 worldwide citation)

A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability ...


8
Robin Budd, Arieh Don, Alexandr Veprinsky: Method and apparatus for providing continuous communication between computers. EMC Corporation, Krishnendu Gupta, Joseph D Angelo, August 25, 2009: US07581048 (1 worldwide citation)

A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability ...


9
Robin Budd, Alexander Veprinsky, Arieh Don: End-to-end checksumming for read operations. Hutchins Wheeler & Dittmar, September 18, 2003: US20030177435-A1

Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write reque ...


10
Robin Budd, Christopher W Jones: Method and system for managing email attachments for an electronic device. Vulcan Portals, Seed Intellectual Property Law Group Pllc, April 7, 2005: US20050076085-A1

An electronic device, such as a hand-held portable computer is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email app ...



Click the thumbnails below to visualize the patent trend.