1
James Kraemer Ph.D.
Jennifer B Brown, Paul T Dimarzio, Timothy Durniak, Robert R Friedlander, James R Kraemer: Optimizing it infrastructure configuration. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, December 23, 2014: US08918457

A computer implemented method optimizes a configuration of an information technology (IT) infrastructure. A processor establishes a technology rule set, which defines technology weights of an IT infrastructure by mapping capabilities of IT infrastructure components to IT infrastructure attributes ne ...


2
Bennett Craig Alan: Method for file transfer. Ibm, September 2, 1998: EP0862304-A2 (288 worldwide citation)

A method is provided of downloading a file from an Internet server 12 to an Internet client 10, preferably without action by the Internet client. The method begins by associating the file into a set of components at the server. A profile of the file is then generated. This profile includes identifyi ...


3
Pitkin Richard P, Morency John P: Broker for computer network server selection.. Digital Equipment, August 29, 1990: EP0384339-A2 (225 worldwide citation)

In a computer network, a broker mechanism allocates a plurality of servers, each having an available resource capacity, to a plurality of clients for delivering one of several services to the clients. The broker operates by monitoring a subset of all available servers capable of delivering the reque ...


4
Gabber Eran, Matias Yossi, Gibbons Phillip B, Mayer Alain Jules: System and method for providing anonymous personalized browsing in a network. Lucent Technologies, July 29, 1998: EP0855659-A1 (205 worldwide citation)

For use with a network having server sites capable of being browsed by users based on identifiers received into the server sites and personal to the users, alternative proxy systems for providing substitute identifiers to the server sites that allow the users to browse the server sites anonymously v ...


5
John Pettinelli, John Izzo: Universal connectivity for non-universal devices. Hand Held Products, Additon Higgins & Pendleton P A, December 16, 2014: US08914788 (203 worldwide citation)

A system including at least one data collection device, each connected to a corresponding data terminal via a primary communication channel; and a central connectivity point connected to each data collection device via a wireless secondary communication channel so as to communicate with the at least ...


6
Mitchel P Sevier: System and method for reliable store-and-forward data handling by encoded information reading terminals. Hand Held Products, Additon Higgins & Pendleton P A, March 3, 2015: US08971346 (202 worldwide citation)

A data collection system for, and methods of, providing reliable store-and-forward data handling by encoded information reading terminals can utilize ad-hoc peer-to-peer (i.e., terminal-to-terminal) connections in order to store data that is normally stored on a single terminal only, in a redundant ...


7
De Vries Jean Pierre: Place-specific buddy list services. Microsoft, January 30, 2002: EP1176840-A1 (201 worldwide citation)

An information service provides search and notifications to inform when certain people (e.g., friends, family, business contacts, etc.) are nearby so as to facilitate communications with those people. Users may define lists of people whose locations may be tracked by positioning equipment based on p ...


8
Naughton Patrick J, Warth Chris, Clanton Charles H Iii, Palrang Joseph M, Gosling James A, Frank Edward H, Lavallee David A, Sheridan R Michael: Improved graphical user interface with method and apparatus for interfacing to remote devices.. Firstperson, November 30, 1994: EP0626635-A2 (163 worldwide citation)

An intuitive graphical user interface is based upon a geographic map structure, and includes a system for controlling remote external electronic devices. In the defined graphical user interface, each Space of the geographic map structure is rendered on a touch screen display as a graphic image of a ...


9
Chris Matthieu, Geir Ramleth: Security and rights management in a machine-to-machine messaging system. CITRIX SYSTEMS, Kilpatrick Townsend & Stockton, July 28, 2015: US09094407 (157 worldwide citation)

Techniques for providing security and rights management in a machine-to-machine messaging system are provided, such as a computing device, a method, and a computer-program product for detecting unauthorized message attempts. For example, the method may receive a communication sent from a first Inter ...


10
Ebrahim Zahir: System for context-dependent name resolution. Sun Microsystems, January 7, 1998: EP0817444-A2 (152 worldwide citation)

A context-dependent, multiply binding name resolution system. A name resolver is provided, connected to either a requester's system or a receiver's system, or both. Requests to a given service or domain name are resolved to the appropriate IP address. The intended recipient of the request is resolve ...