Disclosed is a method and apparatus for reconstructing data in a computer system employing a modified RAID 5 data protection scheme. The computer system includes a write back cache composed of non-volatile memory for storing (1) writes outstanding to a device and associated data read, and (2) storin ...
A system allowing a user of a browser program on a computer connected to an open distributed hypermedia system to access and execute an embedded program object. The program object is embedded into a hypermedia document much like data objects. The user may select the program object from the screen. O ...
A system and method for distributing software applications and data to many thousands of clients over a network. The applications are called "channels", the server is called the "transmitter", and the client is called the "tuner". The use of channels is based on subscription. The end-user needs to s ...
The content of free speech over distributed networks, such as the Internet, is often inappropriate for minors as well as offensive to some adults. The invention comprises an advisory server operated by, for example, a third party watchdog group, which rates the content of data downloaded from a cont ...
A plurality of acquisition media is stored at each of a plurality of in-room systems. A plurality of access-only media is stored at a single head-end system. Each in-room system has access to each of the access-only media. Access to and acquisition of media are recorded at the head-end system and an ...
An improved video system that enables a player to interact with mid-air stereo perception images of foreshortened perspective animation and with animation displayed on the projection screen or monitor, by controlling the motions of a robotic simulation apparatus deployed in front of the projection s ...
A first data mover computer services data access requests from a network client, and a second data mover computer is coupled to the first data mover computer for servicing data access requests from the first data mover computer. The first data mover computer uses a connection-oriented protocol to ob ...
A method, apparatus, and article of manufacture for maintaining policy compliance on a computer network is provided. The method provides the steps of electronically monitoring network user compliance with a network security policy stored in a database, electronically evaluating network security poli ...
The present invention is a method and apparatus that allows competing as well as complementing suppliers, vendors, service providers, purveyors, and other types of sellers internal inventory management as well as controlled design and publication of presentations for external near real-time interact ...
The present invention is a system for providing secure access and execution of application software stored on a first computer by a second computer using a communication device while a communication link is maintained between the first and second computers. More specifically, the present invention i ...