61
Christopher Todd Ford, Wade Callison, Fahim Siddiqui, Mushegh Hakhinian: Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys. Synchronoss Technologies, Synchronoss Technologies, Frederick W Dour, May 16, 2017: US09654450

In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed through an intermediate business entity, where the secure sharing process utilizes encryption provided by the intermediate business entity but ...


62
William Huang, Liviu Rozin, James Andrew Fieweger: Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment. Intralinks, GTC Law Group PC & Affiliates, March 14, 2017: US09596227

In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer data exchange environment, wherein a secure email input facility for accepting non-secure email from outside the exchange into the secure coll ...


63
Rajan Gupta: Systems and methods for storing and searching data in a customer center environment. VERINT AMERICAS, Meunier Carlin & Curfman, January 23, 2018: US09875283

A method includes generating data from workforce applications, at least one of the workforce applications including at least one of forecasting, scheduling, recording, and monitoring functionalities; and storing the data from the at least one of the workforce applications in a storage area network ( ...


64
Michael Scott Morton, Sibley Verbeck Simon, Noam Carl Unger, Robert Rubinoff, Anthony Ruiz Davis, Kyle Aveni Deforge: Method and system for indexing and searching timed media information based upon relevance intervals. Streamsage, Banner & Witcoff, January 10, 2017: US09542393

A method and system for indexing, searching, and retrieving information from timed media files based upon relevance intervals. The method and system for indexing, searching, and retrieving this information is based upon relevance intervals so that a portion of a timed media file is returned, which i ...


65
Daniel Everett Jemiolo: Reversing object manipulations in association with a walkthrough for an application or online service. salesforce com, Weaver Austin Villeneuve & Sampson, May 29, 2018: US09983943

Disclosed are examples of systems, apparatus, methods and computer program products for reversing object manipulations in association with a walkthrough for an application or online service. A first state of resources associated with the walkthrough can be recorded in a database of a database system ...


66
Linda T Dozier, Edmund J Fish, Miles R Gilburne, Nina Zolt: Dynamic characterization of nodes in a semantic network for desired functions such as search, discovery, matching, content delivery, and synchronization of activity and information. Cricket Media, Nelson Mullins Riley & Scarborough, March 27, 2018: US09928753

A system of computers on a wide area network that establishes connections between nodes on the basis of their multidimensional similarity at a particular point in time in a certain setting, such as a social learning network, and that sends relevant information to the nodes is provided. Dimensions in ...


67
Edward Lopez, Joe Mihelich, Matthew F Hepburn: Load balancing among a cluster of firewall security devices. Fortinet, Hamilton DeSanctis & Cha, December 26, 2017: US09853942

A method for balancing load among firewall security devices (FSDs) is provided. According to one embodiment, imminent shutdown of a first cluster unit of an HA cluster of FSDs is gracefully handled by a switching device. A load balancing (LB) table, forming associations between hash values output by ...


68
Edward Lopez, Joe Mihelich, Matthew F Hepburn: Load balancing among a cluster of firewall security devices. Fortinet, Hamilton DeSanctis & Cha, November 21, 2017: US09825912

A method for balancing load among firewall security devices (FSDs) is provided. According to one embodiment, a switching device performs adaptive load balancing among cluster units of an HA cluster of firewall security devices. A load balancing (LB) function implemented by the switching device is co ...


69
Martin L Cohen: Systems and methods for computerized interactive training. Breakthrough PerformanceTech, Knobbe Martens Olson & Bear, June 13, 2017: US09679495

Interactive electronic training systems and methods are described herein. Certain embodiments provide preprogrammed video, audio, and/or textual presentations of training materials which provide information related to skills/information to be trained. A scenario including real or animated actors is ...


70
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Mock attack cybersecurity training system and methods. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, November 21, 2017: US09824609

A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's ...



Click the thumbnails below to visualize the patent trend.