$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Distributed computer network including hierarchical resource information structure and related method of distributing re 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/44
출원번호 US-0237498 (1994-05-02)
발명자 / 주소
  • Fitzgerald Albion J. (Ridgewood NJ) Fitzgerald Joseph J. (New Paltz NY)
출원인 / 주소
  • Novadigm, Inc. (Mahwah NJ 02)
인용정보 피인용 횟수 : 345  인용 특허 : 0

초록

In an enterprise-wide network which includes at least one centralized computer and a plurality of desktop computers, a method for enterprise system management comprising the steps of: storing an Already Have list for each desktop; storing a plurality of Should Have sub-lists; and generating a respec

대표청구항

A method of managing resources in a network of distributed computers comprising the steps of: providing in the computer network a plurality of Already Have (AH)information units; linking the plurality of AH information units in a respective Already Have (AH) information structure in which AH informa

이 특허를 인용한 특허 (345)

  1. Carpentier,Paul R.; Van Riel,Jan F.; Teugels,Tom, Access to content addressable data over a network.
  2. Carpentier,Paul; Van Riel,Jan F.; Teugels,Tom, Access to content addressable data over a network.
  3. Alverson, Gail A.; Callahan, II, Charles David; Kahan, Simon H.; Koblenz, Brian D.; Porterfield, Allan; Smith, Burton J., Accessing a collection of data items in a multithreaded environment.
  4. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  5. Fitzgerald, Joseph; Barenboim, Oleg, Adapt a virtual machine to comply with system enforced policies and derive an optimized variant of the adapted virtual machine.
  6. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  7. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  8. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  9. Crutcher, Craig, Applet embedded cross-platform caching.
  10. Crutcher, Craig, Applet embedded cross-platform caching.
  11. Crutcher,Craig, Applet embedded cross-platform caching.
  12. Seth,Demsey M.; Patch,Ray, Application deflation system and method.
  13. Banzhof,Carl E., Automated computer vulnerability resolution system.
  14. Dan, Ephraim, Automated policy builder.
  15. Lee Cadir Batista ; Dale Scott William, Automatic configuration generation.
  16. Fitzgerald, Joseph; Barenboim, Oleg, Automatic optimization for virtual systems.
  17. Fitzgerald, Joseph; Barenboim, Oleg, Automatic optimization for virtual systems.
  18. Fitzgerald, Joseph; Barenboim, Oleg, Automatic optimization for virtual systems.
  19. Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
  20. Reed Drummond Shattuck ; Heyman Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Communications system for transferring information between memories according to processes transferred with the information.
  21. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  22. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  23. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  24. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  25. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  26. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  27. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  28. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  29. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  30. Pichetti, Luigi; Secomandi, Antonio; Ranucci, Roberto; Marinelli, Claudio; Lupini, Francesco, Configuring processing entities according to their roles in a data processing system with a distributed architecture.
  31. Cook, Scott D.; Lacerte, Rene A., Consumer-directed financial transfers using automated clearinghouse networks.
  32. Cook,Scott D.; Lacerte,Rene A., Consumer-directed financial transfers using automated clearinghouse networks.
  33. Carpentier, Paul R.; Van Riel, Jan F.; Teugels, Tom, Content addressable information encapsulation, representation, and transfer.
  34. Carpentier, Paul R.; Van Riel, Jan F.; Teugels, Tom, Content addressable information encapsulation, representation, and transfer.
  35. Carpentier, Paul; Van Riel, Jan F.; Teugels, Tom, Content addressable information encapsulation, representation, and transfer.
  36. Carpentier,Paul R.; Van Riel,Jan F.; Teugels,Tom, Content addressable information encapsulation, representation, and transfer.
  37. Carpentier,Paul R.; Van Riel,Jan F.; Teugels,Tom, Content addressable information encapsulation, representation, and transfer.
  38. Carpentier,Paul R.; Van Riel,Jan F.; Teugels,Tom, Content addressable information encapsulation, representation, and transfer.
  39. Gouge, Christopher S.; Marl, Craig, Content distribution infrastructure.
  40. Tsaur, Ynn-Pyng; Wang, Ping, Content-driven data protection method for multiple storage devices.
  41. Fitzgerald, Joseph; Barenboim, Oleg, Control and management of virtual systems.
  42. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  43. Seth,Demsey M.; Patch,Ray, Customized library management system.
  44. Heath, Clifford Z; Hughes, Paul, Data file synchronization.
  45. Szabo, Paul Imre; Thornewell, Peter M.; Michels, Timothy Scott, Data flow segment optimized for hot flows.
  46. Szabo, Paul Imre; Thornewell, Peter Michael; Michels, Timothy Scott, Data flow segment optimized for hot flows.
  47. Tsaur, Ynn-Pyng “Anker”; Fletcher, Douglas J., Data protection requirements specification and migration.
  48. Alverson, Gail A.; Smith, Burton J.; Kaplan, Laurence S.; Niehaus, Mark L., Debugging techniques in a multithreaded environment.
  49. Alverson,Gail A.; Smith,Burton J.; Kaplan,Laurence S.; Niehaus,Mark L., Debugging techniques in a multithreaded environment.
  50. Gail A. Alverson ; Burton J. Smith ; Laurence S. Kaplan ; Mark L. Niehaus, Debugging techniques in a multithreaded environment.
  51. Alverson, Gail A.; Callahan, II, Charles David; Coatney, Susan L.; Koblenz, Brian D.; Korry, Richard D.; Smith, Burton J., Deferred task swapping in a multithreaded environment.
  52. Alverson, Gail A.; Callahan, II, Charles David; Kahan, Simon H.; Koblenz, Brian D.; Porterfield, Allan; Smith, Burton J., Detecting access to a memory location in a multithreaded environment.
  53. Cadir Batista Lee ; Scott William Dale, Determining a current machine state of software.
  54. Savage Nannette E. ; Malone Ray, Digital data retrieving, organizing and display system.
  55. Nachenberg,Carey; Perriot,Frederic, Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis.
  56. Donohue Seamus,IRX, Distribution of software updates via a computer network.
  57. Rabung, Adam J.; Schrag, Michael H., Dynamic application browser and database for use therewith.
  58. Hughes, John R.; Hammerle, Eric, Dynamic cloning and reservation of detached idle connections.
  59. Tindal,Glen D.; Schenk,Jeffery A., Dynamic configuration of network devices to enable data transfers.
  60. Schuller, Peter; Goffinet, Christopher; Lee, Sangjin; Anand, Meher; Ceasar, Edward; Bigian, Armond, Dynamic distribution of replicated data.
  61. Schuller, Peter; Goffinet, Christopher; Lee, Sangjin; Anand, Meher; Ceasar, Edward; Bigian, Armond, Dynamic distribution of replicated data.
  62. Schuller, Peter; Goffinet, Christopher; Lee, Sangjin; Anand, Meher; Ceasar, Edward; Bigian, Armond, Dynamic distribution of replicated data.
  63. Jhanwar, Raj; Yaryan, Tom; Hennessey, David; Temereanca, Ovidiu G.; Harikrishnan, Seetharaman, Dynamic software update.
  64. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  65. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  66. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  67. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  68. Searls, Kirk L.; Dowers, II, Gregory R., Endpoint virtualization aware backup.
  69. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  70. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  71. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  72. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  73. Rose, Anthony, Filter for a distributed network.
  74. Rose, Anthony, Filter for a distributed network.
  75. Rose, Anthony, Filter for a distributed network.
  76. Boscolo, Riccardo; Rezaei, Behnam Attaran; Roychowdhury, Vwani P.; Chern, Albert; Khajehnouri, Nima, Generating a conceptual association graph from large-scale loosely-grouped content.
  77. Michels, Tim S.; Schmitt, Dave; Szabo, Paul I., Handling high throughput and low latency network data packets in a traffic management device.
  78. Cai, Hao; Barthelow, Michael Thomas; Szabo, Paul Imre; Michels, Timothy Scott, Hot service flow hardware offloads based on service priority and resource usage.
  79. Cai, Hao; Barthelow, Michael Thomas; Szabo, Paul Imre; Michels, Timothy Scott, Hot service flow hardware offloads based on service priority and resource usage.
  80. Zhong, Qian; Boscolo, Riccardo; Rezaei, Behnam A.; Talaie, Sam; Roychowdhury, Vwani P., Identifying related concepts of URLs and domain names.
  81. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Information processing apparatus, and system having preview control, and method thereof, and storage medium storing program for implementing the method.
  82. Ashworth,Lindsey Louise; Howard,David John; Postlethwaite,Helen; Wallis,Graham Derek, Installation of a data processing solution.
  83. Rowley,Kevin; Brandenburg,Dale P.; Clinton,Greg C.; Jones,Derrick C.; Mody,Pankaj H., Installing supervisory process control and manufacturing software from a remote location and maintaining configuration data links in a run-time environment.
  84. Janiesch, Christian; Dreiling, Alexander; Greiner, Ulrike B.; Lippe, Sonia, Integrated configuration of cross organizational business processes.
  85. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  86. James A. Parker ; Gary J. Legner ; George Lima ; David P. Schwartz ; James R. Gunkel, Intelligent data inventory & asset management systems method and apparatus.
  87. Parker, James A.; Legner, Gary J.; Lima, George; Schwartz, David P.; Gunkel, James R., Intelligent data inventory and asset management system method and apparatus.
  88. Alverson,Gail A.; Callahan, II,Charles David; Coatney,Susan L.; Koblenz,Brian D.; Korry,Richard D.; Smith,Burton J., Inter-thread long jumps in a multithreaded environment.
  89. Golden, Steven M.; Levin, Hillel; Anderson, Bradley A.; Gentry, Gary D.; Barbour, James A.; Schornberg, Albert, Interactive marketing network and process using electronic certificates.
  90. Golden, Steven M.; Levin, Hillel; Anderson, Bradley A.; Gentry, Gary D.; Barbour, James A.; Schornberg, Albert, Interactive marketing network and process using electronic certificates.
  91. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  92. Ayyagari, Vamsi, Late binding dynamic software configuration information.
  93. Fitzgerald, Joseph; Barenboim, Oleg; Oliveri, Richard, Locating an unauthorized virtual machine and bypassing locator code by adjusting a boot pointer of a managed virtual machine in authorized environment.
  94. Mayor, Christopher, Low bandwidth streaming of application upgrades.
  95. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  96. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  97. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  98. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  99. McCarten, Ryan M., Management of actions in multiple virtual and non-virtual environments.
  100. Gazdik Charles J., Manufacture of software distribution media packages from components resident on a remote server source.
  101. Banavar,Guruduth Somasekhara; Chandra,Tushar Deepak; Miller,Kevan Lee; Strom,Robert Evan; Sturman,Daniel Charles; Ward,Michael James, Message logging for reliable multicasting across a routing network.
  102. Banavar, Guruduth Somasekhara; Chandra, Tushar Deepak; Miller, Kevan Lee; Strom, Robert Evan; Sturman, Daniel Charles; Ward, Michael James, Message sequencing for ordered multicasting of a message across a routing network.
  103. Donohue Seamus Brendan,IEX, Method and a mechanism for synchronized updating of interoperating software.
  104. Sadowsky, Richard, Method and apparatus for automatically uninstalling software on a network.
  105. Kane Kevin J. ; Kolb Garrett K. ; May Nora ; Myer Daniel E. ; Rutherford Jay B. ; Shive Denise B. ; Weedon Eleanor P., Method and apparatus for automating security functions in a computer system.
  106. Kobata,Hiroshi; Gagne,Robert, Method and apparatus for delivering electronic data through a proxy server.
  107. Baird, Bradley, Method and apparatus for determining compatibility between a virtualized application and a base environment.
  108. Raz, Uri; Volk, Yehuda; Melamed, Shmuel, Method and apparatus for determining the order of streaming modules.
  109. Ferguson Daniel T. ; Nikols Nick N. ; Cardoza Bryan J. ; Sonntag Steven F. ; Bell Richard S. ; Campbell Patrick L. ; Graupe Betty, Method and apparatus for heterogeneous network management.
  110. Abbott, Aaron; Peterson, Brett; Schumacher, Dale, Method and apparatus for hierarchical software distribution packages including composite packages.
  111. Fitzgerald, Joseph J.; Barenboim, Oleg; Clarizio, Daniel A.; Winchell, Eric; Hennessy, Thomas C., Method and apparatus for interfacing with a computer user via virtual thumbnails.
  112. Cantos, Allan; Mager, Neil; Erskine, Keith; Vilot, Mike; Whittier, Alison, Method and apparatus for monitoring computer systems and alerting users of actual or potential system errors.
  113. Tindal,Glen D.; Schenk,Jeffery A., Method and apparatus for protecting a network from attack.
  114. Renaud, Benjamin, Method and apparatus for smart directories for application deployment.
  115. Mercer Thomas J., Method and device for file transfer by cascade release.
  116. Guruduth S. Banavar ; Lukasz Opyrchal, Method and system for applying cluster-based group multicast to content-based publish-subscribe system.
  117. Callahan, II, Charles David; Koblenz, Brian D., Method and system for automatically regenerating data on-demand.
  118. Kee,Thomas E.; Kearny,Ryan C.; DeCaprio,Donald Joseph; Saether,Christian D., Method and system for automatically updating content stored on servers connected by a network.
  119. Christian D. Saether ; David E. Sloat, Method and system for automatically updating the version of a set of files stored on content servers.
  120. Kee, Thomas E.; Kearny, Ryan C.; DeCaprio, Donald Joseph; Saether, Christian D., Method and system for automatically updating the version of a set of files stored on content servers.
  121. Skene,Bryan D.; Tennican,Scott P.; Kee,Thomas E., Method and system for balancing load distribution on a wide area network.
  122. Brian D. Koblenz, Method and system for calculating instruction lookahead.
  123. Sanders, James, Method and system for creation of streamed files on-demand.
  124. Skene, Bryan D.; Thornewell, Peter M., Method and system for enabling persistent access to virtual servers by an LDNS server.
  125. Skene,Bryan D.; Thornewell,Peter M., Method and system for enabling persistent access to virtual servers by an LDNS server.
  126. Eylon, Dan; Ramon, Amit; Volk, Yehuda; Raz, Uri; Melamed, Shmuel, Method and system for executing network streamed application.
  127. Charles David Callahan, II ; Brian D. Koblenz, Method and system for identifying locations to move portions of the computer program.
  128. Chandra Tushar Deepak ; Strom Robert Evan ; Sturman Daniel Charles ; Astley Mark Christopher, Method and system for matching consumers to events.
  129. Astley, Mark; Strom, Robert E.; Sturman, Daniel C., Method and system for matching consumers to events employing content-based multicast routing using approximate groups.
  130. Brian D. Koblenz ; Allan Porterfield ; Burton J. Smith, Method and system for memory allocation in a multiprocessing environment.
  131. Tennican, Scott P.; Skene, Bryan D., Method and system for network load balancing with a compound data structure.
  132. Tennican,Scott P.; Skene,Bryan D., Method and system for network load balancing with a compound data structure.
  133. Mishra, Debi P.; Kays, Jr., David E.; Horstmann, Markus; Lucovsky, Mark H.; Chan, Shannon J.; Shah, Bharat A.; Jensenworth, Gregory A., Method and system for on-demand installation of software implementations.
  134. Gilde, Robert George; Harms, Steven Lee, Method and system for optimizing a network by independently scaling control segments and data flow.
  135. Gilde, Robert George; Harms, Steven Lee, Method and system for optimizing a network by independently scaling control segments and data flow.
  136. Gilde,Robert George; Harms,Steven Lee, Method and system for optimizing a network by independently scaling control segments and data flow.
  137. Perlman, Jeffrey W.; Kearney, Michael J.; Lee, Timothy M.; Storey, Gregory, Method and system for processing micropayment transactions.
  138. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  139. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  140. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  141. Richard R. Masters, Method and system for storing load balancing information with an HTTP cookie.
  142. Veghte William Lewis ; Silverman Andrew Lawrence ; Hysom Shannon Scott ; Dickman David R., Method and system of associating, synchronizing and reconciling computer files in an operating system.
  143. McMillan,John J.; Chirhart,Gary D., Method and system of managing software conflicts in computer system that receive, processing change information to determine which files and shared resources conflict with one another.
  144. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  145. Reisman, Richard R., Method for distributing content to a user station.
  146. Reisman, Richard R., Method for distributing content to a user station.
  147. Reisman, Richard R., Method for distributing content to a user station.
  148. Neal Douglas Edward, Method for distributing software over network links via electronic mail.
  149. Van Hoff Arthur ; Payne Jonathan ; Shaio Sami, Method for the distribution of code and data updates.
  150. Fong, Kester Lijen; Sen, Sreerupa, Method of administering software components using asynchronous messaging in a multi-platform, multi-programming language environment.
  151. Felger, David, Method of billing a purchase made over a computer network.
  152. Felger, David, Method of billing a purchase made over a computer network.
  153. Felger, David, Method of billing a purchase made over a computer network.
  154. Bodine, Bill Guy; MacKay, Paul; Bunnell, Karl, Method of using an encapsulated data signature for virtualization layer activation.
  155. Mazin, Yury; McCarten, Ryan M., Method of virtualizing file extensions in a computer system by determining an association between applications in virtual environment and a file extension.
  156. Dowers, II, Gregory R.; Searls, Kirk L., Method to spoof data formats from image backups.
  157. Yau,Cedric Tan; Voloshin,Mikhail, Method, system and article of manufacture for data distribution over a network.
  158. Jenkins, Carmen Murphy; Powell, Vidisha; Rae, Thomas, Method, system, and software for enterprise access management control.
  159. Kramer Scott, Methodology for the efficient management of hierarchically organized information.
  160. Muntz, Alice Hwei-Yuan Meng; Rezaei, Behnam Attaran, Methods and apparatus for distributed community finding.
  161. Muntz, Alice Hwei-Yuan Meng; Rezaei, Behnam Attaran, Methods and apparatus for distributed community finding.
  162. Muntz, Alice Hwei-Yuan Meng; Rezaei, Behnam Attaran, Methods and apparatus for distributed community finding.
  163. Fitzgerald, Joseph; Barenboim, Oleg; Oliveri, Richard, Methods and apparatus for locating an unauthorized virtual machine.
  164. Rezaei, Behnam A., Methods and apparatus for matching relevant content to user intention.
  165. Aviani, Jr.,James A.; Cieslak,Martin K.; Kagan,Martin A., Methods and apparatus for redirecting network cache traffic.
  166. Aviani, Jr.,James A.; Cieslak,Martin K.; Kagan,Martin A., Methods and apparatus for redirecting network cache traffic.
  167. Fitzgerald, Joseph; Barenboim, Oleg; McCullough, Gregory; Tanzillo, Gregg; Oliveri, Richard; Clarizio, Daniel A., Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets.
  168. Fitzgerald, Joseph; Barenboim, Oleg; McCullough, Gregory; Tanzillo, Gregg; Oliveri, Richard; Clarizio, Daniel A., Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets.
  169. Fitzgerald, Joseph; Barenboim, Oleg; McCullough, Gregory; Tanzillo, Gregg; Oliveri, Richard; Clarizio, Daniel A., Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets.
  170. Fitzgerald, Joseph; Barenboim, Oleg; Tanzillo, Gregg, Methods and apparatus for using tags to control and manage assets.
  171. Attaran Rezaei, Behnam; Muntz, Alice Hwei-Yuan Meng, Methods and apparatus for visualizing, managing, monetizing, and personalizing knowledge search results on a user interface.
  172. Yona, Shlomo, Methods and system for simultaneous multiple rules checking.
  173. Mir, Majid, Methods and systems for managing network infrastructure change including obtaining approval for the network infrastructure changes.
  174. Bollay, Benn, Methods and systems for optimizing network traffic using preemptive acknowledgment signals.
  175. Voskuil, Eric K., Methods and systems to connect network printers.
  176. Thornewell, Peter M.; Baker, Christopher R., Methods for DNSSEC proxying and deployment amelioration and systems thereof.
  177. Dabell, Steven D.; Johnson, C. Stuart; Steensland, Ronald Lee, Methods for acquiring hyper transport timing and devices thereof.
  178. Jain, Amit; Martynenko, Konstantin; Costlow, Jeff; Holmes, David, Methods for dynamically constructing a service principal name and devices thereof.
  179. Rovniaguin, Dmitry; Dan, Ephraim; Talmor, Ron, Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof.
  180. Rovniaguin, Dmitry; Dan, Ephraim; Talmor, Ron, Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof.
  181. Amdahl, Saxon, Methods for managing progressive image delivery and devices thereof.
  182. Koenning, Christian; Smith, Ian; Hansen, David, Methods for network traffic presteering and devices thereof.
  183. Jiang, Paul; Jain, Amit; Asami, Satoshi; Amdahl, Saxon, Methods for optimizing HTTP header based authentication and devices thereof.
  184. Walker, Anthony; Bellhart, Michael, Methods for optimizing service of content requests and devices thereof.
  185. Wojcik, Frank, Methods for policy-based network traffic queue management and devices thereof.
  186. Thornewell, Peter M.; Zheng, Songbo; Moshiri, Nojan; Kushi, David; Cano, Charles, Methods for preserving flow state during virtual machine migration and devices thereof.
  187. Ferguson, Jc; Donohue, Bruce L., Methods for securing one or more license entitlement grants and devices thereof.
  188. Amdahl, Saxon; Majee, Sumandra; Shukla, Rajendra, Methods for traffic rate control and devices thereof.
  189. Reisman, Richard R., Methods for transacting electronic commerce.
  190. Szabo, Paul Imre; Thornewell, Peter Michael; Michels, Timothy Scott; Cai, Hao, Minimize SYN-flood issues with flow cache while maintaining performance.
  191. Cai, Hao; Szabo, Paul Imre; Thornewell, Peter M.; Michels, Timothy Scott, Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance.
  192. Yarnall, David; Babcock, Donald K., Modularized data retrieval method and apparatus with multiple source capability.
  193. Waldin ; Jr. Ray Soon ; Nachenberg Carey, Multi-tiered incremental software updating.
  194. Waldin, Ray Soon; Nachenberg, Carey, Multi-tiered incremental software updating.
  195. Waldin,Ray Soon; Nachenberg,Carey, Multi-tiered incremental software updating.
  196. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  197. Wolf,Jonathan S.; Mellor,Arthur B.; Tackabury,Wayne F.; Anderson,Christopher B.; Whitworth,Robin M.; Haag,Michael D.; Del Vecchio,Brian A., Network configuration manager.
  198. Artzi,Itzik; McDermott,Bridget; Eylon,Dan; Ramon,Amit; Volk,Yehuda, Network streaming of multi-application program code.
  199. Miller,Kevan L.; Strom,Robert E.; Sturman,Daniel C.; Ward,Michael J., Non-disruptive reconfiguration of a publish/subscribe system.
  200. Moshir, Sean; Andrew, Christopher A. H.; Hudler, Jack Lee; Li, Leon; Gordon, Jonathan M.; Bacon, Michael; Williams, Noah; Lane, Jonathan; Horton, James J.; Ferguson, Dan, Non-invasive automatic offsite patch fingerprinting and updating system and method.
  201. Moshir, Sean; Andrew, Christopher A. H.; Hudler, Jack Lee; Li, Leon; Gordon, Jonathan M.; Bacon, Michael; Williams, Noah; Lane, Jonathan; Horton, James J.; Ferguson, Dan, Non-invasive automatic offsite patch fingerprinting and updating system and method.
  202. Moshir,Sean; Andrew,Christopher A. H.; Hudler,Jack Lee; Li,Leon; Gordon,Jonathan M.; Bacon,Michael; Williams,Noah; Lane,Jonathan; Horton,James J.; Ferguson,Dan, Non-invasive automatic offsite patch fingerprinting and updating system and method.
  203. Campbell R. David L., On-line database updating network system and method.
  204. R. David L. Campbell, On-line database updating network system and method.
  205. Todd, Xan, Operating system and application deployment based on stored user state and organizational policy.
  206. Callahan, II, Charles David; Shields, Keith Arnett; Briggs, III, Preston Pengra, Parallelism performance analysis based on execution trace information.
  207. Nielsen, Robert D.; Bertelrud, Anders; Colclasure, Kaelin; Kledzik, Nick G.; Tribble, Guy L., Peer to peer component distribution.
  208. Nielsen, Robert D.; Bertelrud, Anders; Colclasure, Kaelin; Kledzik, Nick G.; Tribble, Guy L., Peer to peer component distribution.
  209. Perlman, Jeffrey William, Peer-to-peer and group financial management systems and methods.
  210. Perlman, Jeffrey William, Peer-to-peer and group financial management systems and methods.
  211. Alverson,Gail A.; Callahan, II,Charles David; Coatney,Susan L.; Koblenz,Brian D.; Korry,Richard D.; Smith,Burton J., Placing a task of a multithreaded environment in a known state.
  212. Stevens, Mark L.; Weiss, Walter Johan, Policy-enabled communications networks.
  213. Eylon, Dan; Ramon, Amit; Volk, Yehuda, Preprocessed applications suitable for network streaming applications and method for producing same.
  214. Osborne Richard D. ; Spicer Mark W. ; Whited Berton G., Processor-based process control system with intuitive programming capabilities.
  215. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  216. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  217. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  218. Miller, Kevan Lee; Strom, Robert Evan; Sturman, Daniel Charles; Ward, Michael James, Quiescent reconfiguration of a routing network.
  219. Tindal, Glen; Schenk, Jeffery A., Redirecting data generated by network devices.
  220. Fitzgerald, Joseph; Barenboim, Oleg, Registering and accessing virtual systems for use in a managed system.
  221. Fitzgerald, Joseph; Barenboim, Oleg, Registering and accessing virtual systems for use in a managed system.
  222. Fitzgerald, Joseph; Barenboim, Oleg, Registering and accessing virtual systems for use in a managed system.
  223. Strassner,John, Repository-independent system and method for asset management and reconciliation.
  224. Sharma, Rahul, Resource adapter and XML descriptor for use in a client server environment utilizing an enterprise information system.
  225. Govindarajan, Narayanan; Dhas, Prashant Baktha Kumara; Badri, Madhvesh Navkal, Resource assessment method and system.
  226. Alverson,Gail A.; Callahan, II,Charles David; Kahan,Simon H.; Koblenz,Brian D.; Porterfield,Allan; Smith,Burton J., Restricting access to memory in a multithreaded environment.
  227. Meliksetian, Dikran S.; Wadia, Noshir Cavas; Wang, Matthew Yang, Reusing software development assets.
  228. Chandra Tushar Deepak ; Strom Robert Evan ; Sturman Daniel Charles, Routing messages within a network using the data content of the message.
  229. McCarten, Ryan M., Rule-based virtualization.
  230. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  231. Asare, Kwasi Addo; Barta, Attila; Huddleston, Richard D.; Jemiolo, Daniel Everett, Script generation engine and mapping semantic models for target platform.
  232. Asare, Kwasi Addo; Barta, Attila; Huddleston, Richard D.; Jemiolo, Daniel Everett, Script generation engine and mapping semantic models for target platform.
  233. Christie, William; Beliveau, Jeffery; Lellouche, Henri, Secure coupon distribution.
  234. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  235. Cole Gary Lee ; Engleman Scott Phillip ; Pritko Steven Michael, Selection of code updates, data updates or new data for client.
  236. Szabo, Paul I., Simplified method for processing multiple connections from the same client.
  237. Szabo, Paul I., Simplified method for processing multiple connections from the same client.
  238. Szabo, Paul I., Simplified method for processing multiple connections from the same client.
  239. Szabo, Paul I.; Amdahl, Saxon Carl, Smart prefetching of data over a network.
  240. Szabo, Paul I.; Amdahl, Saxon Carl, Smart prefetching of data over a network.
  241. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  242. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  243. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  244. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  245. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  246. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  247. Reisman, Richard R., Software distribution over a network.
  248. Hastings Lawrence C., Software inventory control system.
  249. Richley Thomas E., Software reconfiguration engine.
  250. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  251. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  252. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  253. Reha Mark Keith ; Morris Charles F., Software update manager.
  254. Lee Cadir Batista ; Dale Scott William, Software vault.
  255. Alverson,Gail A.; Callahan, II,Charles David; Coatney,Susan L.; Koblenz,Brian D.; Korry,Richard D.; Smith,Burton J., Stream management in a multithreaded environment.
  256. Sanders, James; McCarten, Ryan M., Streaming an application install package into a virtual environment.
  257. Raz Uri ; Volk Yehuda,ILX ; Melamed Shmuel,ILX, Streaming modules.
  258. Alverson, Gail A.; Callahan, II, Charles David; Kahan, Simon H.; Koblenz, Brian D.; Porterfield, Allan; Smith, Burton J., Synchronization techniques in a multithreaded environment.
  259. Alverson,Gail A.; Callahan, II,Charles David; Kahan,Simon H.; Koblenz,Brian D.; Porterfield,Allan; Smith,Burton J., Synchronization techniques in a multithreaded environment.
  260. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Ritter, Stephen J.; Nakawatase, Ryan Tadashi; Pelly, John; Rutherford, M. Celeste, System and method for applying a machine-processable policy rule to information gathered about a network.
  261. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  262. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  263. Zhou, Dennis; Jain, Amit, System and method for combining an access control system with a traffic management system.
  264. Tindal,Glen D.; Schenk,Jeffery A., System and method for configuration, management and monitoring of network resources.
  265. Tindal, Glen D., System and method for configuring a network device.
  266. Newman,Patrick, System and method for configuring software for distribution.
  267. Attaran Rezaei, Behnam; Muntz, Alice Hwei-Yuan Meng, System and method for context-based knowledge search, tagging, collaboration, management, and advertisement.
  268. Schiavone, Vincent J.; Brussin, David Ian; DiPasquale, Tobias Phillip; D'Alessio, John Francis, System and method for controlling distribution of network communications.
  269. Schiavone, Vincent J.; Koenig, James H.; Brussin, David I., System and method for controlling distribution of network communications.
  270. Schiavone, Vincent J.; Koenig, James H.; Brussin, David I., System and method for controlling distribution of network communications.
  271. Schiavone, Vincent J.; Koenig, James H.; Brussin, David I., System and method for controlling distribution of network communications.
  272. Schiavone,Vincent J.; Koenig,James H.; Brussin,David I., System and method for controlling distribution of network communications.
  273. Tindal, Glen D., System and method for defining a policy enabled network.
  274. Van Dorsselaer, Rudolf Erik, System and method for deploying a software program.
  275. Lee Cadir Batista ; Dale Scott William, System and method for determining computer application state.
  276. Aderton,Harry; Aderton,Richard; Patel,Prakash; Reckeweg,John; Rietmann,Gary, System and method for enhanced software updating and revision.
  277. Samuel, Subodh A.; Abraham, Raji, System and method for enterprise software distribution.
  278. Gorthy, Scott B.; Kelly, Brendan; Hearne, Derek S.; Heiser, David B.; Taylor, Bret C., System and method for generating a configuration schema.
  279. Courtney,Mike, System and method for generating a representation of a configuration schema.
  280. Chen, Jonathan; Amdahl, Saxon; Shigapov, Andrey, System and method for handling TCP performance in network access with driver initiated application tunnel.
  281. Amir, Idan; Gruner, Eyal; Zilber, Boaz, System and method for identifying security breach attempts of a website.
  282. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  283. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  284. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  285. Hokanson Tukkar Erik, System and method for managing distributed resources on networks.
  286. Jackson, Bruce; Brookes, Nigel Robert, System and method for managing distribution of content to a device.
  287. Cole,Gary L., System and method for managing system configuration across a network.
  288. Strassner, John, System and method for mapping between and controlling different device abstractions.
  289. Courtney,Mike, System and method for modeling a network device's configuration.
  290. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  291. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  292. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  293. Keir, Robin M.; Ecker, Stephen A., System and method for network vulnerability detection and reporting.
  294. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  295. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  296. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  297. Thirasuttakorn, Nat; Haworth, Jason; Burns, Brandon; Smith, Ian Michael, System and method for on the fly protocol conversion in obtaining policy enforcement information.
  298. Masters, Richard R., System and method for performing application level persistence.
  299. Masters, Richard R., System and method for performing application level persistence.
  300. Masters, Richard Roderick, System and method for performing application level persistence.
  301. Masters, Richard Roderick, System and method for performing application level persistence.
  302. Masters,Richard R., System and method for performing application level persistence.
  303. Thirasuttakorn, Nat, System and method for performing message-based load balancing.
  304. Amdahl, Saxon; Hawthorne, Jonathan, System and method for post shaping TCP packetization.
  305. Perlman, Jeffrey William; Dempsey, Caroline Grace, System and method for promotion processing and authorization.
  306. Abraham, Raji, System and method for providing location profile data for network nodes.
  307. Costlow, Jeff J., System and method for proxying HTTP single sign on across network domains.
  308. Chen, Jonathan, System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device.
  309. Carpentier, Paul R.; Van Riel, Jan F.; Teugels, Tom, System and method for secure storage, transfer and retrieval of content addressable information.
  310. Carpentier, Paul R.; Van Riel, Jan F.; Teugels, Tom, System and method for secure storage, transfer and retrieval of content addressable information.
  311. Carpentier, Paul R.; Van Riel, Jan F.; Teugels, Tom, System and method for secure storage, transfer and retrieval of content addressable information.
  312. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  313. Levy, Yuval; Talmor, Ron; Serfaty, Beni, System and method for selectively storing web objects in a cache memory based on policy decisions.
  314. van Hoff Arthur A ; Payne Jonathan ; Shaio Sami, System and method for the distribution of code and data.
  315. Thakor, Sanjiv, System and method for transforming configuration commands.
  316. Wynn, Simon; Eriksson, Johan; van Hoff, Arthur A, System and method for updating devices using limited amounts of random access memory.
  317. Aderton, Harry; Aderton, Richard; Patel, Prakash; Reckeweg, John; Rietmann, Gary, System and method for updating network computer systems.
  318. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  319. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  320. Perlman, Jeffrey William; Walsh, Sofia; Storey, Gregory Kenneth, System and method of validating a relationship between a user and a user account at a financial institution.
  321. Eylon,Dan; Ramon,Amit; Volk,Yehuda; Raz,Uri; Melamed,Shmuel, System and method to send predicted application streamlets to a client device.
  322. Logan, James D.; Goessling, Daniel F.; Call, Charles G., System for disseminating media content representing episodes in a serialized sequence.
  323. Voskuil,Eric K., System for policy-based management of software updates.
  324. Turner, Joseph A., System for scan organizing, managing and running enterprise-wide scans by selectively enabling and disabling scan objects created by agents.
  325. Reisman Richard R., System for transporting information objects between a user station and multiple remote sources based upon user modifiable object manifest stored in the user station.
  326. Sobel,William E., System state rollback after modification failure.
  327. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  328. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  329. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method, and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  330. Cheng,William; Hwang,Kenneth; Kannan,Ravi; Katchapalayam,Babu; Liu,Bing; Narasimhan,Balaji; Ramanujam,Gopal; Tran,Jonathan, System, method, and computer program product for uninstalling computer software.
  331. Clifford Heath AU; Graeme Port AU; Steven Klos ; Graeme Greenhill, Systems and methods for automatic application version upgrading and maintenance.
  332. Heath Clifford,AUX ; Port Graeme,AUX ; Klos Steven ; Greenhill Graeme, Systems and methods for automatic application version upgrading and maintenance.
  333. Perlman, Jeffrey William, Systems and methods for brokered authentication express seller links.
  334. Rezaei, Behnam Attaran; Muntz, Alice Hwei-Yuan Meng, Systems and methods for creating, navigating, and searching informational web neighborhoods.
  335. Baumann, William R.; Lewites, Saul, Systems and methods for idle driven scheduling.
  336. Szabo, Paul I.; Thirasuttakorn, Nat; Bollay, Benn, Systems and methods for managing server resources.
  337. Hellerstein,Joseph L.; Kar,Gautam; Keller,Alexander, Systems and methods for service and role-based software distribution.
  338. Alverson,Gail A.; Callahan, II,Charles David; Coatney,Susan L.; Koblenz,Brian D.; Korry,Richard D.; Smith,Burton J., Task swap out in a multithreaded environment.
  339. Alverson,Gail A.; Callahan, II,Charles David; Coatney,Susan L.; Kaplan,Laurence S.; Korry,Richard D., Techniques for reducing the rate of instruction issuance.
  340. Sulton, Jeffrey; McCorkendale, Bruce; Nachenberg, Carey, Universal data-driven computer proxy.
  341. Glitho Roch,CAX ; Leduc Francois,CAX ; Crowe Thomas,IEX ; Hogberg Lena,SEX, Use of web technology for subscriber management activities.
  342. Alverson, Gail A.; Callahan, II, Charles David; Coatney, Susan L.; Koblenz, Brian D.; Korry, Richard D.; Smith, Burton J., User program and operating system interface in a multithreaded environment.
  343. Cheng, Wen-Hao; Chiu, Jul-Li; Wang, Chien-Liang; Fu, Heng-Ming, Viral updating of software based on neighbor software information.
  344. Michael L. Wells ; Joseph W. Wells, Web-based entry of financial transaction information and subsequent download of such information.
  345. Wells, Michael L.; Wells, Joseph W., Web-based entry of financial transaction information and subsequent download of such information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로