1
Michael D Doyle, David C Martin, Cheong S Ang: Distributed hypermedia method for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document. The Regents of the University of California, Townsend and Townsend and Crew, November 17, 1998: US05838906 (625 worldwide citation)

A system allowing a user of a browser program on a computer connected to an open distributed hypermedia system to access and execute an embedded program object. The program object is embedded into a hypermedia document much like data objects. The user may select the program object from the screen. O ...


2
Clark E Lubbers, Susan G Elkington, Ronald H McLean: Enhanced raid write hole protection and recovery. Digital Equipment Corporation, Cathy L Peterson, Ronald C Hudgens, June 30, 1998: US05774643 (531 worldwide citation)

Disclosed is a method and apparatus for reconstructing data in a computer system employing a modified RAID 5 data protection scheme. The computer system includes a write back cache composed of non-volatile memory for storing (1) writes outstanding to a device and associated data read, and (2) storin ...


3
Robert Jeffrey Schloss: System and method for controlling access to data located on a content server. International Business Machines Corporation, Kevin M Jordan Esq, Whitham Curtis Whitham & McGinn, January 6, 1998: US05706507 (457 worldwide citation)

The content of free speech over distributed networks, such as the Internet, is often inappropriate for minors as well as offensive to some adults. The invention comprises an advisory server operated by, for example, a third party watchdog group, which rates the content of data downloaded from a cont ...


4
Arthur Van Hoff, Jonathan Payne, Sami Shaio: Method for the distribution of code and data updates. Marimba, Charles E Gotlieb, July 6, 1999: US05919247 (456 worldwide citation)

A system and method for distributing software applications and data to many thousands of clients over a network. The applications are called "channels", the server is called the "transmitter", and the client is called the "tuner". The use of channels is based on subscription. The end-user needs to s ...


5
Preston E Blair, Frank S Preston: Interactive video system providing repeated switching of multiple tracks of actions sequences. Davis & Schroeder, August 24, 1993: US05239464 (300 worldwide citation)

An improved video system that enables a player to interact with mid-air stereo perception images of foreshortened perspective animation and with animation displayed on the projection screen or monitor, by controlling the motions of a robotic simulation apparatus deployed in front of the projection s ...


6
Mark DiLorenzo: Multi-room entertainment system with in-room media player/dispenser. Fulwider Patton Lee & Utecht, July 3, 2001: US06256554 (229 worldwide citation)

A plurality of acquisition media is stored at each of a plurality of in-room systems. A plurality of access-only media is stored at a single head-end system. Each in-room system has access to each of the access-only media. Access to and acquisition of media are recorded at the head-end system and an ...


7
Xiaoye Jiang, Uresh K Vahalia, Uday Gupta, Percy Tzelnic: File server system using connection-oriented protocol and sharing data sets among data movers. EMC Corporation, Howrey Simon Arnold & White, September 17, 2002: US06453354 (200 worldwide citation)

A first data mover computer services data access requests from a network client, and a second data mover computer is coupled to the first data mover computer for servicing data access requests from the first data mover computer. The first data mover computer uses a connection-oriented protocol to ob ...


8
Lucinda Stone, Michael A Dean: Method for using computers to facilitate and control the creating of a plurality of functions. Henry Croskell Esq, September 3, 2002: US06446045 (184 worldwide citation)

The present invention is a method and apparatus that allows competing as well as complementing suppliers, vendors, service providers, purveyors, and other types of sellers internal inventory management as well as controlled design and publication of presentations for external near real-time interact ...


9
Andrea M Jacobson: Network policy management and effectiveness system. MacArthur Investments, Moore Hansen & Sumner, May 11, 2004: US06735701 (183 worldwide citation)

A method, apparatus, and article of manufacture for maintaining policy compliance on a computer network is provided. The method provides the steps of electronically monitoring network user compliance with a network security policy stored in a database, electronically evaluating network security poli ...


10
Mohan Ananda: Secure software rental system using continuous asynchronous password verification. Hecker & Harriman, June 10, 1997: US05638513 (179 worldwide citation)

The present invention is a system for providing secure access and execution of application software stored on a first computer by a second computer using a communication device while a communication link is maintained between the first and second computers. More specifically, the present invention i ...



Click the thumbnails below to visualize the patent trend.