$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for policy-based alarm notification in a distributed network management environment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G08B-029/00
출원번호 US-0558425 (1995-11-16)
발명자 / 주소
  • Poliquin Lynn R. (Goffstown NH) Arrowsmith Russell (Merrimack NH) Lewis Lundy (Mason NH) Tracy William (Chelmsford MA)
출원인 / 주소
  • Cabletron Systems, Inc. (Rochester NH 02)
인용정보 피인용 횟수 : 280  인용 특허 : 0

초록

Apparatus and method for receiving alarms from multiple network management servers and applying a plurality of policy-based filters to the alarms. The filters may be named and stored in a database, and application of the policy-based filters may be scheduled for different times. The same policy-base

대표청구항

In a distributed network management environment including a plurality of network management servers (12), each server performing fault monitoring for a plurality of network entities in an associated network segment (174, 176) and generating alarms, a method of processing such alarms generated by the

이 특허를 인용한 특허 (280)

  1. Hashimoto, Hideyuki; Kawabata, Mie; Motosugi, Toshihisa, Abnormality alarm device and abnormality alarm method.
  2. Hannel, Clifford Lee; May, Anthony, Access control.
  3. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  4. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  5. Dapp,Michael C., Active intrusion resistant environment of layered object and compartment keys (airelock).
  6. Eastham, Paul, Adaptive and generalized status monitor.
  7. Miner, Patrice L.; Odins-Lucas, Zeke; De Vorchik, David G.; Cummins, Charles; Gusmorino, Paul A., Address bar user interface control.
  8. Chun, Eung-Sun, Alarm management system and method thereof for network management system.
  9. Srikumar N. Chari ; Kenny L. Bright, Alert configurator and manager.
  10. Seddigh, Nabil; Nandy, Biswajit; Makkar, Rupinder Singh; Bennett, Donald William Arthur, Alerting method, apparatus, server, and system.
  11. van der Made, Peter A. J., Analytical virtual machine.
  12. van der Made,Peter A. J., Analytical virtual machine.
  13. John Kwangil Chang, Apparatus and method for monitoring environmental conditions in a computing device.
  14. Stevenson, David James; Martin, Hamish Donald Stuart; Gray, Andrew Hunter; Linzell, Christopher Robert, Apparatus and method for processing data relating to events on a network.
  15. Grandin, Ronan Fran.cedilla.ois Daniel; Stevenson, David James; Gray, Andrew Hunter; Gray, Neil William, Apparatus and method for providing improved stress thresholds in network management systems.
  16. Milford,Robert Andrew, Apparatus for event log management.
  17. Wookey Michael J. ; Chu Kevin L., Automatic building and distribution of alerts in a remote monitoring system.
  18. Wookey Michael J., Automatic remote computer monitoring system.
  19. Davis Wallace Clayton ; Smith Darren D. ; Pulsipher Eric A., Automatic status polling failover or devices in a distributed network management hierarchy.
  20. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  21. Wong, Lyon King-Fook; Hoefnagels, Stephan; Ivanovic, Relja B.; De Vorchik, David G.; Cutsinger, Paul L., Carousel control for metadata navigation and assignment.
  22. Sundaram, Shobana S.; Liu, Jingdong, Carrier-grade SNMP interface for fault monitoring.
  23. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  24. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  25. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  26. Chappelle David W., Computer performance monitoring and graphing tool.
  27. Stavran Scott C., Computer system with polymorphic fault processing.
  28. Eric Howland Jenney, Computer system, program product and method for monitoring the operational status of a computer.
  29. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  30. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  31. Chari Srikumar N. ; Bright Kenny L. ; Sartirana Bruno, Data management method for adding or exchanging components on a running computer.
  32. Srinivasan, Sanjay, Design for scalable network management systems.
  33. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  34. Chari Srikumar N., Display of system information.
  35. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  36. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Distributed monitoring for a video security system.
  37. Jessee, Randy; Waibel, Udo; Pandian, Suresh, Dynamic filters for posted event messages initiated automatically by equipment.
  38. Wookey Michael J., Dynamic test update in a remote computer monitoring system.
  39. Brownmiller Curtis ; Bencheck Michael ; Tran Minh T. ; Branton Robert ; DeMoss Mark ; Landon Steve, Enhanced problem alert signals.
  40. Branislav N. Meandzija, Enhanced simple network management protocol (SNMP) for network and systems management.
  41. Kerrison, Adam Geoffrey; Bennett, Andrew Jonathan; Stewart, Kristian Jon; Banyard, Nicholas S., Event database management method and system for network event reporting system.
  42. Noble Ken ; Foote Scott ; Foote Steve, Event management system for distributed computing environment.
  43. Kurtz,James Brian; Hally,Judson Craig; DeVorchik,David George; Beam,Tyler Kien, Extensible object previewer in a shell browser.
  44. McKee, Timothy P.; Debry, Fabrice A.; Van Dok, Cornelis K.; Winjum, Randall K., Extensible user context system for delivery of notifications.
  45. McKee, Timothy P.; Debry, Fabrice A.; van Dok, Cornelis K.; Winjum, Randall K., Extensible user context system for delivery of notifications.
  46. Vijayan, Geetha, Fault event management using fault monitoring points.
  47. David Hitz ; Andrea Borr ; Robert J. Hawley ; Mark Muhlestein ; Joan Pearson, File access control in a multi-protocol file server.
  48. Kleiman Steven, File server storage arrangement.
  49. Moore,Jason F.; De Vorchik,David; Chalivendra,Sasanka C.; Ballou,Nathaniel H.; Guzak,Chris J.; Kaasten,Shaun A.; Banks,Richard M.; Sheldon,David J.; Miner,Patrice L., File system for displaying items of different types and from different physical locations.
  50. Kleiman, Steven; Hitz, David; Harris, Guy; O'Malley, Sean, File system image transfer.
  51. Kleiman,Steven R.; Hitz,David; Harris,Guy; O'Malley,Sean W.; Malcolm,Michael; Lau,James; Rakitzis,Byron, File system image transfer.
  52. Moore,Jason F.; Ballou,Nathaniel H.; Banks,Richard M.; Beam,Tyler K.; De Vorchik,Davd G.; Guzak,Chris J.; Hally,Judson Craig; Kurtz,James Brian; Miner,Patrice L.; Sheldon,David J., File system shell.
  53. Banks,Richard, Filtering a collection of items.
  54. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  55. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  56. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  57. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  58. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  59. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  60. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  61. Dapp,Michael C.; Lett,Eric C.; Ng,Sai Lun, Hardware accelerated validating parser.
  62. Taylor,David T.; Caron,Jonathan P.; Bosa,Patrick A., Help desk systems and methods for use with communications networks.
  63. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  64. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  65. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  66. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  67. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  68. Dapp,Michael C.; Lett,Eric C., Intrusion detection accelerator.
  69. Daryl J. Langdon ; Robert Robbins, Laminar flow duct cooling system.
  70. Daryl J. Langdon ; Robert Robbins, Laminar flow duct cooling system.
  71. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  72. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  73. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  74. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  75. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  76. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  77. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  78. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  79. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  80. Chivaluri Dinkar, Management agent automatically executes corrective scripts in accordance with occurrences of specified events regardless.
  81. Chari, Srikumar N.; Bright, Kenny L., Managing computer system alerts.
  82. Turski, Andrzej; Van Dok, Cornelis K.; Cheng, Lili; Wong, Lyon K. F.; MacLaurin, Matthew B.; Miner, Patrice L., Metadata editing control.
  83. Turski, Andrzej; Van Dok, Cornelis K.; Cheng, Lili; Wong, Lyon K. F.; MacLaurin, Matthew B.; Miner, Patrice L., Metadata editing control.
  84. Vaioli, Roberto, Method and a system for managing at least one event in a bowling establishment.
  85. Black, Robert Barth, Method and aparatus for presence based resource management.
  86. Petrovykh, Yevgeniy, Method and apparatus for anticipating and planning communication-center resources based on evaluation of events waiting in a communication center master queue.
  87. Petrovykh, Yevgeniy, Method and apparatus for anticipating and planning communication-center resources based on evaluation of events waiting in a communication center master queue.
  88. Petrovykh, Yevgeniy, Method and apparatus for anticipating and planning communication-center resources based on evaluation of events waiting in a communication center master queue.
  89. Hammond, Nicolas J., Method and apparatus for auditing network security.
  90. Lewis, Lundy, Method and apparatus for component to service mapping in service level management (SLM).
  91. Vinberg,Anders, Method and apparatus for displaying 3-D state indicators.
  92. Lewis, Lundy; Arrowsmith, Russell; Datta, Utpal; Taylor, David, Method and apparatus for distributed object filtering.
  93. Kay, James, Method and apparatus for electronic mail filtering.
  94. Kay, James, Method and apparatus for electronic mail filtering.
  95. Kay, James, Method and apparatus for electronic mail filtering.
  96. Lewis, Lundy, Method and apparatus for event correlation in service level management (SLM).
  97. Vinberg,Anders, Method and apparatus for filtering messages based on context.
  98. Petrovykh, Yevgeniy, Method and apparatus for intelligent routing of instant messaging presence protocol (IMPP) events among a group of customer service representatives.
  99. Petrovykh, Yevgeniy, Method and apparatus for intelligent routing of instant messaging presence protocol (IMPP) events among a group of customer service representatives.
  100. Lewis Lundy, Method and apparatus for inter-domain alarm correlation.
  101. Lewis Lundy, Method and apparatus for inter-domain alarm correlation.
  102. Lundy Lewis, Method and apparatus for inter-domain alarm correlation.
  103. Battat, Reuven; Her, Michael; Sundaresh, Chandrasekhar; Vinberg, Anders; Wang, Sidney, Method and apparatus for intuitively administering networked computer systems.
  104. Battat, Reuven; Her, Michael; Sundaresh, Chandrasekha; Vinberg, Anders; Wang, Sidney, Method and apparatus for maintaining data integrity across distributed computer systems.
  105. Garg Atul R. ; Ketcham Dan ; Do Minh Anh, Method and apparatus for monitoring a network environment.
  106. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  107. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  108. Petrovykh, Yevgeniy, Method and apparatus for optimizing response time to events in queue.
  109. Petrovykh, Yevgeniy, Method and apparatus for optimizing response time to events in queue.
  110. Petrovykh, Yevgeniy, Method and apparatus for optimizing response time to events in queue.
  111. Black, Robert Barth, Method and apparatus for presence based resource management.
  112. Lewis, Lundy, Method and apparatus for reactive and deliberative service level management (SLM).
  113. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  114. Lewis, Lundy, Method and apparatus for service analysis in service level management (SLM).
  115. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  116. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  117. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  118. Henderson Donnie ; Jackel Lawrence David, Method and system for delivery of e-mail and alerting messages.
  119. Martin,Daniel J., Method and system for determining network characteristics using routing protocols.
  120. Muoio, David; Cook, James P.; Hasha, Richard, Method and system for distributing art.
  121. Muoio, David; Cook, James P.; Hasha, Richard, Method and system for distributing art.
  122. Bennett,Andrew Jonathan; Franklin,David Richard; Stewart,Kristian Jon, Method and system for efficient distribution of network event data.
  123. Secor, Peter; Tokarsky, Tim; Perelman, Shoel, Method and system for event impact analysis.
  124. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  125. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  126. Albert Fuss DE; Thomas Kloeber DE, Method and system for monitoring and managing network condition.
  127. Herring,David; Carroll,John; O'Grady,Rehan; Coleman,Neil; Marks,Felix, Method and system for predicting causes of network service outages using time domain correlation.
  128. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  129. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  130. Hasha, Richard, Method and system for tracking software components.
  131. Hasha, Richard, Method and system for tracking software components.
  132. Hasha,Richard, Method and system for tracking software components.
  133. Fulford Fraser,CAX, Method and system for transmitting and receiving alarm notifications and acknowledgements within a telecommunications network.
  134. Choi, Heedong; Park, Seungkyu; Kim, Seongyun; Ahn, Hongbeom; Jeong, Seungmyeong, Method for delivering notification message in M2M system and devices for same.
  135. Choi, Heedong; Park, Seungkyu; Kim, Seongyun; Ahn, Hongbeom; Jeong, Seungmyeong, Method for delivering notification messages in M2M system and devices for same.
  136. Chari Srikumar N. ; Bright Kenny L., Method for facilitating the replacement or insertion of devices in a computer system through the use of a graphical user interface.
  137. Shari Srikumar N., Method of emulating synchronous communication.
  138. Gregory Cameron ; McClary Constance Atwater ; Nour Magda, Method of providing on-screen notification of non-visible alarmed network elements.
  139. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  140. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  141. Thompson, Erskine, Methods for monitoring computer resources using a first and second matrix, and a feature relationship tree.
  142. Wong, Lyon K. F.; De Vorchik, David G.; Ivanovic, Relja B.; Hoefnagels, Stephan; Miner, Patrice L., Multiple roots in navigation pane.
  143. Martin,Hamish Donald Stuart; Linzell,Christopher Robert; Grandin,Ronan Fran챌ois Daniel; Duncan,Robert James, Network management apparatus and method for processing events associated with device reboot.
  144. Battat Reuven ; Her Michael ; Sundaresh Chandrasekha ; Vinberg Anders ; Wang Sidney, Network management system using virtual reality techniques to display and simulate navigation to network components.
  145. Battat Reuven ; Her Michael ; Sundaresh Chandrasekha ; Vinberg Anders ; Wang Sidney, Network management system using virtual reality techniques to display and simulate navigation to network components.
  146. Battat, Reuven; Her, Michael; Sundaresh, Chandrasekha; Vinberg, Anders; Wang, Sidney, Network management system using virtual reality techniques to display and simulate navigation to network components.
  147. Secer,Semih, Object-driven network management system enabling dynamically definable management behavior.
  148. Gonsalves, Brian; Pena, Sherri D., Outage reporting for a telecommunications system.
  149. Gonsalves,Brian; Pena,Sherri D., Outage reporting for a telecommunications system.
  150. Couturier,Alban; Ruffin,Michel; Van Der Meulen,Marcel, Process for sending a notification in a data processing network with distributed applications.
  151. Moore,Jason F.; Van Dok,Cornelis K.; Ivanovic,Relja; Anthony,Colin R.; Banks,Richard M., Property tree for metadata navigation and assignment.
  152. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  153. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  154. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  155. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  156. Dapp,Michael C., Real time active network compartmentalization.
  157. Cannon, David M.; Humphries, Marshall L., Real-time feedback for policies for computing system management.
  158. Cannon, David M.; Humphries, Marshall L., Real-time feedback for policies for computing system management.
  159. Cannon, David M.; Humphries, Marshall L., Real-time feedback for policies for computing system management.
  160. Cuervo, Fernando, Real-time policy evaluation mechanism.
  161. Wookey Michael J., Rebuilding computer states remotely.
  162. Wookey Michael J. ; Chu Kevin L., Remote alert monitoring and trend analysis.
  163. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  164. Cummins, Charles; Van Dok, Cornelis K.; De Vorchik, David G.; Hoefnagels, Stephan; McKee, Timothy P.; Beam, Tyler K., Rich drag drop user interface.
  165. Cummins, Charles; Van Dok, Cornelis K.; De Vorchik, David G.; Hoefnagels, Stephan; McKee, Timothy P.; Beam, Tyler K., Rich drag drop user interface.
  166. Wong, Lyon K. F.; Van Dok, Cornelis K.; DeVorchik, David G.; MacLaurin, Matthew; Miner, Patrice L.; Smith, Walter R.; Fortier, Philip P., Save preview representation of files being created.
  167. Gusmorino, Paul A.; Beam, Tyler K.; Chen, Raymond J.; Cummins, Charles; Day, Robert F.; Anthony, Colin R.; Lam, Jenny T.; Sheldon, Isaac A.; De Vorchik, David G., Scaling icons for representing files.
  168. Cutsinger, Paul; Van Dok, Cornelis K.; De Vorchik, David G.; Tamanaha, Eli Y.; Tubbs, Kenneth M.; Wong, Lyon K. F.; Gusmorino, Paul; Chalivendra, Sasanka, Scenario specialization of file browser.
  169. Naidoo, Surendra N.; Glasgow, William P., Security system.
  170. Naidoo, Surendra N.; Glasgow, William P., Security system.
  171. Dawes, Paul J., Security system with networked touchscreen and gateway.
  172. Ritche, Scott D., Software delivery method with enhanced batch redistribution for use in a distributed computer network.
  173. Beck, Ralph L.; Romanchuk, Michael Walter, Software instrumentation method and apparatus.
  174. Pandya, Suketu J.; Lakshmanan, Hariharan, Software, systems and methods for managing a distributed network.
  175. Pandya,Suketu J.; Joshi,Varad V., Software, systems and methods for managing a distributed network.
  176. Gusmorino, Paul A.; Cummins, Charles; De Vorchik, David G.; Banks, Richard M.; Ivanovic, Relja B.; Lam, Jenny T.; Moore, Jason F., Stack icons representing multiple objects.
  177. Davis, Wallace Clayton; Smith, Darren D.; Pulsipher, Eric A., Status polling failover of devices in a distributed network management hierarchy.
  178. Adams,Wesley C., Supervised guard tour systems and methods.
  179. Schneider,Charles R.; Adams,Wesley C., Supervised guard tour tracking systems and methods.
  180. Chari Srikumar N., Synchronous communication interface.
  181. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  182. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  183. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  184. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  185. Keefer, Billy; Fu, Aldis T., System and method for agent-based monitoring of network devices.
  186. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  187. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  188. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  189. Krishnan, Prabhakar, System and method for automatically diagnosing protocol errors from packet traces.
  190. Kui,Ping H.; McAndrews,Joseph M.; Yang,Fang, System and method for bridge port administration.
  191. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  192. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  193. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  194. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  195. Cote Joseph Paul-Emile Pierre ; Thomas Stephen David, System and method for detection of, notification of, and automated repair of problem conditions in a messaging system.
  196. Banks, Richard M.; Cummins, Charles; De Vorchik, David G.; Gusmorino, Paul A.; Ivanovic, Relja B.; Lam, Jenny T.; Moore, Jason F., System and method for displaying stack icons.
  197. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  198. Boden, Edward B.; Melville, Mark J., System and method for dynamic macro placement of IP connection filters.
  199. Anthony, Colin R.; Banks, Richard M.; Watson, Marieke I.; Van Dok, Cornelis K., System and method for dynamically generating a selectable search extension.
  200. Wookey Michael J. ; Chu Kevin L., System and method for evaluating monitored computer systems.
  201. De Vorchik, David G.; Miner, Patrice L.; Tubbs, Kenneth M.; Gusmorino, Paul A.; Anthony, Colin; Van Dok, Cornelis K., System and method for filtering and organizing items based on common elements.
  202. Kaasten, Shaun A.; Moore, Jason F.; Tubbs, Kenneth M.; Ivanovic, Relja; De Vorchik, David G.; Banks, Richard M.; Miner, Patrice L., System and method for filtering and organizing items based on common elements.
  203. Kaasten, Shaun A.; Moore, Jason F.; Tubbs, Kenneth M.; Ivanovic, Relja; De Vorchik, David G.; Banks, Richard M.; Miner, Patrice L., System and method for filtering and organizing items based on common elements.
  204. Kaasten,Shaun A.; Moore,Jason F.; Tubbs,Kenneth M.; Ivanovic,Relja; De Vorchik,David G.; Banks,Richard M.; Miner,Patrice L., System and method for filtering and organizing items based on common elements.
  205. Kaasten,Shaun A.; Moore,Jason F.; Tubbs,Kenneth M.; Ivanovic,Relja; De Vorchik,David G.; Banks,Richard M.; Miner,Patrice L., System and method for filtering and organizing items based on common elements.
  206. Kaasten,Shaun A.; Moore,Jason F.; Tubbs,Kenneth M.; Ivanovic,Relja; De Vorchik,David G.; Banks,Richard M.; Miner,Patrice L., System and method for filtering and organizing items based on common elements.
  207. Moore, Jason F.; De Vorchik, David; Chalivendra, Sasanka C.; Ballou, Nathaniel H.; Guzak, Chris J.; Kaasten, Shaun A.; Banks, Richard M.; Sheldon, David J.; Miner, Patrice L., System and method for filtering and organizing items based on common elements.
  208. Kaasten, Shaun A.; Moore, Jason F.; Tubbs, Kenneth M.; Ivanovic, Relja; De Vorchik, David G.; Banks, Richard M.; Miner, Patrice L., System and method for filtering and organizing items based on metadata.
  209. Moore, Jason F.; Banks, Richard Malcolm; van Dok, Cornelis K.; De Vorchik, David G.; McKee, Timothy P.; Smith, Walter R.; Guzak, Chris J.; Ivanovic, Relja; Belt, Jeffrey C., System and method for managing data using static lists.
  210. Moore,Jason F.; Banks,Richard Malcolm; van Dok,Cornelis K.; De Vorchik,David G.; McKee,Timothy P.; Smith,Walter R.; Guzak,Chris J.; Ivanovic,Relja; Belt,Jeffrey C., System and method for managing data using static lists.
  211. Tentij, Maarten Peter; MacDonald, Jeffrie David, System and method for managing faults using a gateway.
  212. Yang,Fang; Moon,Sung Joon, System and method for monitoring network devices.
  213. Cote Joseph Paul-Emile Pierre ; Thomas Stephen David, System and method for monitoring server performance at a client computer.
  214. Pierre Cote, Joseph Paul Emile; Thomas, Stephen David; Masters, Steve, System and method for monitoring server performance using a server.
  215. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  216. McKee, Timothy P.; Arcuri, Michael P.; Sareen, Chaitanya D., System and method for public consumption of communication events between arbitrary processes.
  217. Lewis, Lundy M., System and method for reactive and deliberative service level management (SLM).
  218. Lewis, Lundy, System and method for service level management.
  219. Samji, Mohammed; Ramasubramanian, Ram; Schrock, Sarah; Guzak, Chris J.; De Vorchik, David G., System and method for sharing items in a computer system.
  220. Gusmorino, Paul A.; Low, Aidan; Cummins, Charles; De Vorchik, David G.; Hally, Judson Craig; Hysom, Scott S.; Beam, Tyler K.; Wong, Lyon K. F.; Rosenberg, Jonathan P.; Shaw, Rhae-Christie, System and method for shell browser.
  221. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  222. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  223. Paulin,Jean Marc, System and method for transaction recording and playback.
  224. Kurtz, James Brian; Hally, Judson Craig; Sheldon, David Joel; DeVorchik, David George; Beam, Tyler Kien; Guzak, Chris J., System and method for user modification of metadata in a shell browser.
  225. Gusmorino,Paul A.; Karas,Ben; De Vorchik,David G.; Harvey,Marcus; Miner,Patrice L.; Beam,Tyler K.; McKee,Timothy P., System and method for viewing and editing multi-value properties.
  226. Samji, Mohammed; De Vorchik, David G.; Ramasubramanian, Ram; Guzak, Chris J.; McKee, Timothy P.; Ballou, Nathaniel H.; Raman, Balan Sethu, System and method for virtual folder sharing including utilization of static and dynamic lists.
  227. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  228. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  229. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  230. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  231. Hubbard, Dan, System and method of controlling access to the internet.
  232. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  233. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  234. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  235. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  236. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  237. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  238. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  239. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  240. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  241. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  242. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  243. Vasudeva, Vivek, System and method to monitor performance of different domains associated with a computer or network.
  244. Vasudeva, Vivek, System and method to monitor performance of different domains associated with a computer or network.
  245. Vasudeva, Vivek, System and method to monitor performance of different domains associated with a computer or network.
  246. Vasudeva, Vivek, System and method to monitor performance of different domains associated with a computer system or network.
  247. McGee,John; Earley,John Michael; Matthews,James W., System and methods for adaptive threshold determination for performance metrics.
  248. McGee,John J.; Courtemanche,Michael B.; Beck,Ralph L., System and methods for display of time-series data distribution.
  249. Chari Srikumar N. ; Bright Kenny L., System for facilitating the replacement or insertion of devices in a computer system through the use of a graphical user interface.
  250. Chari, Srikumar N.; Bright, Kenny L., System for facilitating the replacement or insertion of devices in a computer system through the use of a graphical user interface.
  251. Chari,Srikumar N.; Bright,Kenny L., System for facilitating the replacement or insertion of devices in a computer system through the use of a graphical user interface.
  252. Martin,Hamish D S; Stevenson,David J; Duncan,Robert J; Linzell,Christopher R, System using a series of event processors for processing network events to reduce number of events to be displayed.
  253. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  254. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  255. Ball, Scott; Greenwald, Joseph; Buia, Christopher; Taylor, David K.; Caron, Jonathan P.; He, Jun, Systems and methods for constructing multi-layer topological models of computer networks.
  256. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  257. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  258. Greenwald,Joseph; Ball,Scott; Buia,Christopher; Caron,Jonathan P.; Taylor,David K., Systems and methods for diagnosing faults in computer networks.
  259. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  260. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  261. Bosa,Patrick A.; Greenwald,Joseph; Buia,Christopher; Pantelis,Thomas S.; Ball,Scott, Systems and methods for isolating faults in computer networks.
  262. Buia,Christopher A.; Pantelis,Thomas S.; Taylor,David K.; Ball,Scott; Rockwell,Nathaniel J., Systems and methods for managing and analyzing faults in computer networks.
  263. Auerbach, David Benjamin, Systems and methods for performing a directory search.
  264. Chari, Srikumar N.; Bright, Kenny L., Systems and methods for performing a hot input function.
  265. Chari, Srikumar N.; Bright, Kenny L., Systems and methods for performing a hot input function.
  266. Chari,Srikumar N.; Bright,Kenny L., Systems and methods for performing a hot input function.
  267. Thompson, Erskine, Systems for monitoring computer resources.
  268. DeVorchik,David G.; Wong,Lyon K. F.; Gusmorino,Paul A.; Cutsinger,Paul L.; McKee,Timothy P.; Moore,Jason; Banks,Richard M., Systems, methods, and user interfaces for storing, searching, navigating, and retrieving electronic information.
  269. Evans, Christopher A.; Parlin, David R.; Moore, Jason F.; Wong, Lyon K. F.; Ivanovic, Relja B.; Williams, Samuel Thomas; Dart, Scott E.; Hoefnagels, Stephan; McKee, Timothy P., Systems, methods, and user interfaces for storing, searching, navigating, and retrieving electronic information.
  270. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  271. Brychell, Joseph J.; Coburn, Mark D.; Cummins, Charles; Miksovsky, Jan T.; Miller, Jeffrey S.; Pasceri, Vincent J.; Winjum, Randall K., Task dialog and programming interface for same.
  272. Vacante, Robert C.; Houck, Peter Thomas, Testing of policy prior to deployment in a policy-based network management system.
  273. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  274. Moore, Jason F.; Sierra, Giampiero M.; Banks, Richard M.; Wong, Lyon King-Fook; Ivanovic, Relja B.; Gusmorino, Paul A.; Beam, Tyler K.; McKee, Timothy P.; Belt, Jeffrey C.; De Vorchik, David G.; Guzak, Chris J.; Low, Aidan; Tubbs, Kenneth M.; Anthony, Colin R.; Chalivendra, Sasanka C.; Watson, Marieke Iwema; Joyce, Gerald Paul; Wade, Alex D.; Betz, Benjamin A.; Kabir, Ahsan S.; Andrews, Donna B.; Miner, Patrice L.; Cutsinger, Paul L., User interface for a file system shell.
  275. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security system.
  276. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security systems and methods.
  277. Hally, J. Craig; Koch, Kenneth A.; Ligameri, Mark R.; Moore, Jason F.; Kaasten, Shaun A.; Banks, Richard M.; Sheldon, Michael; De Vorchik, David G.; Odins-Lucas, Zeke B.; Miner, Patrice L., Virtual address bar user interface control.
  278. Hally,J. Craig; Koch,Kenneth A.; Ligameri,Mark R.; Moore,Jason F.; Kaasten,Shaun A.; Banks,Richard M.; Sheldon,Michael; De Vorchik,David G.; Odins Lucas,Zeke B.; Miner,Patrice L., Virtual address bar user interface control.
  279. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  280. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로