1
Michael D Doyle, David C Martin, Cheong S Ang: Distributed hypermedia method for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document. The Regents of the University of California, Townsend and Townsend and Crew, November 17, 1998: US05838906 (623 worldwide citation)

A system allowing a user of a browser program on a computer connected to an open distributed hypermedia system to access and execute an embedded program object. The program object is embedded into a hypermedia document much like data objects. The user may select the program object from the screen. O ...


2
Clark E Lubbers, Susan G Elkington, Ronald H McLean: Enhanced raid write hole protection and recovery. Digital Equipment Corporation, Cathy L Peterson, Ronald C Hudgens, June 30, 1998: US05774643 (518 worldwide citation)

Disclosed is a method and apparatus for reconstructing data in a computer system employing a modified RAID 5 data protection scheme. The computer system includes a write back cache composed of non-volatile memory for storing (1) writes outstanding to a device and associated data read, and (2) storin ...


3
Arthur Van Hoff, Jonathan Payne, Sami Shaio: Method for the distribution of code and data updates. Marimba, Charles E Gotlieb, July 6, 1999: US05919247 (454 worldwide citation)

A system and method for distributing software applications and data to many thousands of clients over a network. The applications are called "channels", the server is called the "transmitter", and the client is called the "tuner". The use of channels is based on subscription. The end-user needs to s ...


4
Robert Jeffrey Schloss: System and method for controlling access to data located on a content server. International Business Machines Corporation, Kevin M Jordan Esq, Whitham Curtis Whitham & McGinn, January 6, 1998: US05706507 (452 worldwide citation)

The content of free speech over distributed networks, such as the Internet, is often inappropriate for minors as well as offensive to some adults. The invention comprises an advisory server operated by, for example, a third party watchdog group, which rates the content of data downloaded from a cont ...


5
Preston E Blair, Frank S Preston: Interactive video system providing repeated switching of multiple tracks of actions sequences. Davis & Schroeder, August 24, 1993: US05239464 (296 worldwide citation)

An improved video system that enables a player to interact with mid-air stereo perception images of foreshortened perspective animation and with animation displayed on the projection screen or monitor, by controlling the motions of a robotic simulation apparatus deployed in front of the projection s ...


6
Xiaoye Jiang, Uresh K Vahalia, Uday Gupta, Percy Tzelnic: File server system using connection-oriented protocol and sharing data sets among data movers. EMC Corporation, Howrey Simon Arnold & White, September 17, 2002: US06453354 (200 worldwide citation)

A first data mover computer services data access requests from a network client, and a second data mover computer is coupled to the first data mover computer for servicing data access requests from the first data mover computer. The first data mover computer uses a connection-oriented protocol to ob ...


7
Mark DiLorenzo: Multi-room entertainment system with in-room media player/dispenser. Fulwider Patton Lee & Utecht, July 3, 2001: US06256554 (189 worldwide citation)

A plurality of acquisition media is stored at each of a plurality of in-room systems. A plurality of access-only media is stored at a single head-end system. Each in-room system has access to each of the access-only media. Access to and acquisition of media are recorded at the head-end system and an ...


8
Lucinda Stone, Michael A Dean: Method for using computers to facilitate and control the creating of a plurality of functions. Henry Croskell Esq, September 3, 2002: US06446045 (183 worldwide citation)

The present invention is a method and apparatus that allows competing as well as complementing suppliers, vendors, service providers, purveyors, and other types of sellers internal inventory management as well as controlled design and publication of presentations for external near real-time interact ...


9
Andrea M Jacobson: Network policy management and effectiveness system. MacArthur Investments, Moore Hansen & Sumner, May 11, 2004: US06735701 (182 worldwide citation)

A method, apparatus, and article of manufacture for maintaining policy compliance on a computer network is provided. The method provides the steps of electronically monitoring network user compliance with a network security policy stored in a database, electronically evaluating network security poli ...


10
Paul A Smethers: Remote bookmarking for wireless client devices. Openwave Systems, Beyer Weaver & Thomas, May 6, 2003: US06560640 (178 worldwide citation)

Improved techniques that enable wireless devices to implement bookmarks with improved transmission efficiency, reduced user navigation and/or reduced amounts of memory resources are disclosed. One aspect of the improved techniques pertains to use of a compact request from a wireless device to an int ...



Click the thumbnails below to visualize the patent trend.