$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] Method and system for efficient distribution of network event data 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0877619 (2001-06-08)
발명자 / 주소
  • Bennett,Andrew Jonathan
  • Franklin,David Richard
  • Stewart,Kristian Jon
출원인 / 주소
  • Micromuse Ltd.
대리인 / 주소
    Brown Raysman Millstein Felder &
인용정보 피인용 횟수 : 68  인용 특허 : 127

초록

Described herein are methods and systems for preparing to efficiently distribute data to be extracted from a data store to clients and for distributing such prepared data to the clients. The methods and system have particular utility in the context of a network monitoring system which captures and s

대표청구항

What is claimed is: 1. A computer implemented method for preparing to distribute data to be extracted from a data store to a plurality of clients, the method comprising: storing in a table as primary requests one or more client requests for periodic updates of data to be extracted from the data sto

이 특허에 인용된 특허 (127) 인용/피인용 타임라인 분석

  1. Levin Michael (Arlington MA) Hyde Benjamin A. (Arlington MA) David Mark H. (Brookline MA), Access restrictions as a means of configuring a user interface and making an application secure.
  2. Graves, John; Poteryakhin, Viktor, Aggregation of resource requests from multiple individual requestors.
  3. Tyburski Edward (San Diego CA) Hartmann Paul R. (Escondido CA), Alarm correlation system for a telephone network.
  4. Orr Timothy L. ; Gray Eric W., Apparatus and method for determining a computer network topology.
  5. Lewis Lundy ; Datta Utpal, Apparatus and method for evaluation network traffic performance.
  6. Yemini Yechiam (Briarcliff Manor NY) Yemini Shaula (Briarcliff Manor NY) Kliger Shmuel (Ossining NY), Apparatus and method for event correlation and problem reporting.
  7. Datta Utpal ; Lewis Lundy, Apparatus and method for network capacity evaluation and planning.
  8. Dev Roger H. (Hudson NH) Steinberg Gabriel (Watertown MA) Kam John B. (Concord MA) Comer Stewart A. (Hollis NH), Apparatus for distributing data processing across a plurality of loci of control.
  9. Budde David L. (Portland OR) Carson David G. (Hillsboro OR) Cornish Anthony L. (Essex OR GB2) Johnson David B. (Portland OR) Peterson Craig B. (Portland OR), Apparatus for recovery from failures in a multiprocessing system.
  10. Budde David L. (Portland OR) Carson David G. (Hillsboro OR) Cornish Anthony L. (Essex OR GB2) Johnson David B. (Portland OR) Peterson Craig B. (Portland OR), Apparatus for redundant operation of modules in a multiprocessing system.
  11. Budde David L. (Portland OR) Carson David G. (Hillsboro OR) Cornish Anthony L. (Essex OR GB2) Hosler Brad W. (Portland OR) Johnson David B. (Portland OR) Peterson Craig B. (Portland OR), Apparatus of fault-handling in a multiprocessing system.
  12. Vuong, Tony T.; Bapat, Subodh; Horan, Gerard, Apparatus, methods, and computer program products for transactional support of network management operations.
  13. Turner Jonathan S. (St. Louis MO), Bandwidth management and congestion control scheme for multicast ATM networks.
  14. Hardy Steven (Palo Alto CA) Joyce Robert H. (San Jose CA), Basic expert system tool.
  15. Edelman Fredric M., Computer assisted and/or implemented process and architecture for customer account creation, maintenance and administration for an investment and/or retirement program.
  16. Matthews Wallace ; Vaishnavi Vick, Configurations tracking system using transition manager to evaluate votes to determine possible connections between port.
  17. Schneider Peter (San Ramon CA), Database system with subquery optimizer.
  18. Kemper Christian T. (Winter Park FL) Osborne Robert L. (Winter Springs FL) Bellows James C. (Maitland FL), Diagnostic system and method.
  19. Seymour Leslie G. (Barrington IL), Distributed computer system with network and resource status monitoring.
  20. Matthews Wallace E. ; Dev Roger ; Raj Alex Edward, Distribution of communication load over multiple paths based upon link utilization.
  21. Imai Toru,JPX, Document requesting and providing system using safe and simple document linking scheme.
  22. Lyon, David L.; Huettner, Robert E.; Holsinger, Jerry L.; Falkenstein, Don I.; Piracha, Imtiaz; Ching, Dennis T., Enhanced communications network testing and control system.
  23. Jeffords Jason ; Crowley Todd A. ; Dev Roger, Establishing control of lock token for shared objects upon approval messages from all other processes.
  24. Whitney Christopher (Bath GBX), Event correlation in telecommunications networks.
  25. Daniel, Arthur A.; McKelvey, Mark A.; Modry, John A.; Roubal, Eric G.; Sandstrom, Andrew E.; Wildt, Patrick M., Event handling mechanism having a process and an action association process.
  26. Yamaguchi Masashi,JPX ; Kamihira Ichikai,JPX, Evolutionary controlling system with behavioral simulation.
  27. Yamaguchi Masashi,JPX ; Kamihira Ichikai,JPX, Evolutionary controlling system with behavioral simulation.
  28. Winokur Alex (Haifa ILX) Shiloach Joseph (Kirat Tiv\on ILX) Ribak Amnon (Misgav TX ILX) Huang Yuangene (Austin TX), Expert based system and method for managing error events in a local area network.
  29. Kung Ching Y. (Fort Lauderdale FL), Expert system for communications network.
  30. Clark Mark E. (San Jose CA) Greever Richard G. (Sunnyvale CA) Schmier Larry J. (Santa Rosa CA) Wong Jerome D. (Sunnyvale CA), Expert system for processing errors in a multiplex communications system.
  31. Elliott ; Jr. William M. (Palm Bay FL) Schneider Mordechay (Indialantic FL), Fault finder expert system.
  32. Doolan Paul D., Gateway for using legacy telecommunications network element equipment with a common management information protocol.
  33. Bennett James S. (Palo Alto CA) Lark Jay S. (Palo Alto CA), Hierarchical knowledge system.
  34. Wimmer Warren K. (Tigard OR), High speed Boolean logic trigger oscilloscope vertical amplifier with edge sensitivity and nested trigger.
  35. Hamaguchi Naohisa (Yokohama JPX), Image information distribution system.
  36. Hershey Paul C. (Manassas VA) Barker Kenneth J. (Cary NC) Lingafelt ; Sr. Charles S. (Durham NC) Waclawsky John G. (Frederick MD), Information collection architecture and method for a data communications network.
  37. Itoh Shigeyuki (Kawasaki JPX) Aizawa Iwao (Yokohama JPX), Information transmission/reception system for transmitting information to requesters, where it is recorded, in response.
  38. Hanatsuka Mitsuhiro (Yokohama JPX), Knowledge base management method and system.
  39. Fahl Richard L. ; Anderson Todd William ; Moses Christopher Robert ; Allen Daniel Mason, Lock for coupling cam arms.
  40. Ross Ken (Santa Cruz CA) Margozzi Michael (San Jose CA) White Kevin (Los Gatos CA) First Carl (San Jose CA), Method and apparatus for analyzing networks.
  41. Lewis Lundy M. ; St. Onge David H. ; Soper G. Michael, Method and apparatus for automatically populating a network simulator tool.
  42. Daniel Arthur A. (Rochester MN) Irvin David R. (Raleigh NC) Moore Robert E. (Durham NC), Method and apparatus for communication network alert record identification.
  43. Malik Rajiv ; Sycamore Steve ; Tracy Bill, Method and apparatus for configuration management in communications networks.
  44. Rajiv Malik ; Steve Sycamore ; Bill Tracy, Method and apparatus for configuration management in communications networks.
  45. Murata Richard Y., Method and apparatus for controlling access to network information sources.
  46. Jeffords Jason ; Crowley Todd ; Hazel Thomas ; Sexton Donald, Method and apparatus for coordination of a shared object in a distributed system.
  47. Jeffords, Jason; Crowley, Todd; Hazel, Thomas; Sexton, Donald, Method and apparatus for coordination of a shared object in a distributed system.
  48. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  49. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  50. Aggarwal Ajay (Somersworth NH) Scott Walter (Salem NH) Rustici Eric (Londonderry NH) Bucciero David (Nashua NH) Haskins Andrew (Lee NH) Matthews Wallace (Exeter NH), Method and apparatus for determining a communications path between two nodes in an Internet Protocol (IP) network.
  51. Bosa Patrick A. ; Mayo Gregory E. ; Crowell Christopher, Method and apparatus for determining frame relay connections.
  52. Datta Utpal ; Carlson David G., Method and apparatus for digital data compression.
  53. Lewis Lundy ; Arrowsmith Russell ; Datta Utpal ; Taylor David, Method and apparatus for distributed object filtering.
  54. Lewis, Lundy; Arrowsmith, Russell; Datta, Utpal; Taylor, David, Method and apparatus for distributed object filtering.
  55. Atkinson William D. (Los Gatos CA), Method and apparatus for image compression and manipulation.
  56. Lewis Lundy ; St. Onge David ; Mehta Ruchika, Method and apparatus for integrated network and systems management.
  57. Lewis Lundy, Method and apparatus for inter-domain alarm correlation.
  58. Lewis Lundy, Method and apparatus for inter-domain alarm correlation.
  59. Lewis Lundy, Method and apparatus for inter-domain alarm correlation.
  60. Lundy Lewis, Method and apparatus for inter-domain alarm correlation.
  61. Glackemeyer Richard E. (Harvard MA) Petty Robert C. (Princeton MA) Page Calvin F. (Brookline NH), Method and apparatus for isolating faults in a digital logic circuit.
  62. Lewis Lundy ; Datta Utpal, Method and apparatus for learning network behavior trends and predicting future behavior of communications networks.
  63. Ghannam, Jeff; Loomis, Todd A.; Lewis, Lundy M.; Datta, Utpal, Method and apparatus for managing data for use by data applications.
  64. Datta Utpal (Bedford NH) Wagner Mark (Merrimack NH), Method and apparatus for managing multiple server requests and collating reponses.
  65. Lewis Lundy (Mason NH), Method and apparatus for monitoring and controlling communications networks.
  66. Dev Roger H. (Durham NH) Nelson Mark H. (Fremont NH), Method and apparatus for monitoring the status of non-pollable device in a computer network.
  67. Dev Roger H. ; Nelson Mark H., Method and apparatus for monitoring the status of non-pollable devices in a computer network.
  68. Dev Roger H. ; Nelson Mark H., Method and apparatus for monitoring the status of non-pollable devices in a computer network.
  69. Vaishnavi Vick ; Kenny Patrick R. ; Rydeen Michael J., Method and apparatus for network synchronization.
  70. Arrowsmith Russell ; Tracy William, Method and apparatus for policy-based alarm notification in a distributed network management environment.
  71. Arrowsmith Russell ; Tracy William, Method and apparatus for policy-based alarm notification in a distributed network management environment.
  72. Arrowsmith Russell ; Tracy William, Method and apparatus for policy-based alarm notification in a distributed network management environment.
  73. Poliquin Lynn R. (Goffstown NH) Arrowsmith Russell (Merrimack NH) Lewis Lundy (Mason NH) Tracy William (Chelmsford MA), Method and apparatus for policy-based alarm notification in a distributed network management environment.
  74. Russell Arrowsmith ; William Tracy, Method and apparatus for policy-based alarm notification in a distributed network management environment.
  75. Lundy Lewis ; Rajiv Malik ; Steve Sycamore ; Utpal Datta ; Giff Hammar, Method and apparatus for reactive and deliberative configuration management.
  76. Bill McKinnon ; Tim Newhouse ; Eric Rustici, Method and apparatus for representing objects as visually discernable entities based on spatial definition and perspective.
  77. Lewis Lundy (Mason NH), Method and apparatus for resolving faults in communications networks.
  78. Lewis Lundy ; Spargo Glenn ; Datta Utpal, Method and apparatus for surveillance in communications networks.
  79. Dube Craig ; Arsenault Michael ; Crowell Christopher, Method and apparatus for testing the responsiveness of a network device.
  80. Yanacek Judith A. ; Clements Bruce G. ; Len Theodore C., Method and apparatus to establish a tap-point in a switched network using self-configuring switches having distributed c.
  81. Scott Richard Ball ; Joseph H. Greenwald ; Bob Jones ; Kyle Pause, Method and system for enforcing floating licenses.
  82. Berg Myron, Method and system of service impact analysis in a communications network.
  83. Oliver Ibe ; Vick Vaishnavi ; Roger Dev, Method for automatic partitioning of node-weighted, edge-constrained graphs.
  84. Matthews Wallace (North Hampstead NH), Method for determining a best path between two nodes.
  85. Modera Mark P. ; Carrie Francois R.,FRX, Method for sealing remote leaks in an enclosure using an aerosol.
  86. Conley Patrick O. (Portland OR) Cobb Loren (Corrales NM), Method of analyzing computer source code.
  87. Toyoda Keiichi (Katsuta JPX) Teranishi Tsugutomo (Hitachi JPX), Method of and apparatus for monitoring performance of steam power plant.
  88. Risch Tore J. M. (Menlo Park CA), Method of monitoring changes in attribute values of object in an object-oriented database.
  89. Wakil Youssef Salih ; Thornton Spencer P. ; Pallikaris Ioannis G.,GRX, Method of refractive surgery.
  90. Wakil Youssef Salih ; Thornton Spencer P. ; Pallikaris Ioannis G.,GRX, Method of refractive surgery.
  91. Dobbins Kurt ; Andlauer Phil ; Oliver Chris ; Parker Tom ; Grimes Andy ; Nutbrown Bruce ; Hullette Dan ; Dev Roger ; Jeffords Jason, Method of transmitting data packets in a packet switched communications network.
  92. Chao Ming-Te (Edison NJ), Methods and apparatus for fault recovery.
  93. Bouloutas Anastasios T. (Athens NY GRX) Calo Seraphin B. (Peekskill NY) Finkel Allan J. (New City NY), Methods and systems for alarm correlation and fault localization in communication networks.
  94. Smith Mark D. ; Caswell Deborah L. ; Ramanathan Srinivas, Modeling of internet services.
  95. Suzuki Masaki,JPX, Multimedia server with efficient multimedia data access scheme.
  96. Mayo Gregory E. ; Desroches Roger G. ; Nedde David N., Network connection status monitor and display.
  97. Stilwell Larry R. ; Gokhale Vishwae V., Network device simulator.
  98. Faigon Anat ; Kotmire Girish ; Raab Ilan ; Romero Robert Magnus, Network fault correlation.
  99. Dobbins Kurt (Bedford NH) Andlauer Phil (Londonderry NH) Oliver Chris (Rochester NH) Parker Tom (Merrimack NH) Grimes Andy (Cape Neddick ME) Nutbrown Bruce (Campton NH) Hullette Dan (Wilton NH) Dev R, Network having secure fast packet switching and guaranteed quality of service.
  100. Kagei Takashi (Yokohama) Sasaki Ryoichi (Fujisawa) Suzuki Michio (Yokohama) Mizoguchi Keizou (Naka) Kobayashi Hideaki (Naka) Iioka Kenzo (Hadano JPX), Network management method and system.
  101. Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Scott Walter P. (Salem NH) Wiggin Dwayne S. (Rochester NH), Network management system using interconnected hierarchies to represent different network dimensions in multiple display.
  102. Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
  103. Roger H. Dev ; Dale H. Emery ; Eric S. Rustici ; Howard M. Brown ; Dwayne S. Wiggin ; Eric W. Gray ; Walter P. Scott, Network management system using model-based intelligence.
  104. Dev Roger H. (Durham NH) Gray Eric W. (Manchester NH) Rustici Eric S. (Londonderry NH) Scott Walter P. (Salem NH), Network management system using multifunction icons for information display.
  105. Dev Roger H. (Durham NH) Brown Howard M. (Brighton MA) Rustici Eric S. (Londonderry NH), Network management system using status suppression to isolate network faults.
  106. Staas ; Jr. Philip C. (Phoenixville PA) Knee Rob (Lansdale PA) Schilling Roy (Norristown PA) Murray Robert E. (Malvern PA), Object oriented control of real-time processing.
  107. Walter Chris J. (Columbia MD) Kieckhafer Roger M. (Ellicott City MD) Finn Alan M. (Amston CT), Operations controller for a fault tolerant multiple node processing system.
  108. Dlugos Daniel F. (Huntington CT), Operator prompting system.
  109. Strauss ; Jr. Irvin Richard ; Thai Lam H., Optimized query interface for database management systems.
  110. Dev Roger ; Jeffords Jason ; Quinn Martin S., Perspective-based shared scope address resolution method and apparatus.
  111. Suzanne Thebaut ; Walter Scott ; Eric Rustici ; Prasan Kaikini ; Lundy Lewis ; Rajiv Malik ; Steve Sycamore ; Roger Dev ; Oliver Ibe ; Ajay Aggarwal ; Todd Wohlers, Policy management and conflict resolution in computer networks.
  112. Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan ; Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Dev Roger ; Ibe Oliver ; Aggarwal Ajay ; Wohlers Todd, Policy management and conflict resolution in computer networks.
  113. Vaishnavi Vick (Danville NH) Matthews Wallace (Northwood NH) Kenny Patrick (Dover NH), Port-link configuration tracking method and apparatus.
  114. Vaishnavi Vick ; Matthews Wallace ; Kenny Patrick, Port-link configuration tracking method and apparatus.
  115. Whynacht Charles (Glastonbury CT), Remote elevator monitoring system.
  116. Simpkins Lorenz G. (Merritt Island FL) Owens Richard C. (Kawaski FL JPX) Rochette Donn A. (Cocoa FL), Remote maintenance monitoring system.
  117. Jeffords Jason ; Dev Roger, Replicated resource management system for managing resources in a distributed application and maintaining a relativistic view of state.
  118. Jeffords Jason ; Dev Roger, Replicated resource management system for managing resources in a distributed application and maintaining a relativistic view of state.
  119. Malhotra Ashok (Croton-on-Hudson NY) Perry Kenneth J. (Riverdale NY), Storage clustering and packing of objects on the basis of query workload ranking.
  120. Oliver Chris (Rochester NH) Hullette Dan (Wilton NH), System and method for allocating a shared resource among competing devices.
  121. Puranik Vineeta ; Datta Utpal ; Barlow Rachael, System for determining network connection availability between source and destination devices for specified time period.
  122. Dev Roger H. ; Nelson Mark H., System for determining the status of an entity in a computer network.
  123. Lirov Yuval V. (Aberdeen NJ) Yue On C. (Middletown NJ), Technique for producing an expert system for system fault diagnosis.
  124. Deborah L. Caswell ; Srinivas Ramanathan ; James D. Hunter ; Scott S. Neal ; Frederick A. Sieker ; Mark D. Smith, Template-driven approach for generating models on network services.
  125. Denny Luan J. (Sunnyvale CA), Threshold alarms for processing errors in a multiplex communications system.
  126. Dev Roger (Durham NH) Kaikini Prasan (Cambridge MA) Jeffords Jason (Dover NH) Matthews Wallace (North Hampstead NH), Use of multipoint connection services to establish call-tapping points in a switched network.
  127. Dev Roger ; Kaikini Prasan ; Jeffords Jason ; Matthews Wallace, Use of multipoint connection services to establish call-tapping points in a switched network.

이 특허를 인용한 특허 (68) 인용/피인용 타임라인 분석

  1. Njemanze, Hugh S.; Aguilar-Macias, Hector, Adjusting sensor time in a network security system.
  2. McDermott, Ellen; Hudis, Efim, Analysis of event information to perform contextual audit.
  3. Sugisawa, Koutarou; Mizogami, Satoshi; Kamada, Takahiro, Communication system and communication apparatus.
  4. Tidwell, Kenny; Dash, Debabrata, Comparing events from multiple network security devices.
  5. Njemanze, Hugh S.; Kothari, Pravin S.; Dash, Debabrata; Wang, Shijie, Correlation engine with support for time-based rules.
  6. Kennedy, Jon Christopher; Trimble, Ronald Ray; McMaster, Carey Jay; Petrangelo, John Henry; Sorel, Roland Leo; Grinwald, Patrick James, Detection and deduplication of backup sets exhibiting poor locality.
  7. Njemanze, Hugh S.; Bhatt, Rajesh P., Displaying information regarding time-based events.
  8. Dash,Debabrata; Beedgen,Christian, Dynamic security events and event channels in a network security system.
  9. Anglin, Matthew J.; Cannon, David M.; Martin, Howard N., Efficient transfer of deduplicated data.
  10. Sandorfi, Miklos; Reiter, Timmie G., Emulated storage system.
  11. Krishnamurthy, Rajaram B.; Siddique, Naseer S.; DeCusatis, Casimer M.; Rao, Anuradha; Onghena, Michael, Energy management for datacenters.
  12. Dash, Debabrata; Aguilar-Macias, Hector, Event aggregation in a network.
  13. Njemanze,Hugh S., Expression editor.
  14. Tidwell, Kenny; Beedgen, Christian; Njemanze, Hugh S.; Kothari, Pravin S., Hierarchical architecture in a network security system.
  15. Tidwell, Kenny; Beedgen, Christian; Njemanze, Hugh S.; Kothari, Pravin S., Hierarchical architecture in a network security system.
  16. Aguilar Macias,Hector; Mantry,Girish, Merging multiple log entries in accordance with merge properties and mapping properties.
  17. Aguilar-Macias, Hector; Subrahmanyam, Rajiv, Message parsing in a network security system.
  18. Muchow, James D., Method and apparatus for configuring nodes as masters or slaves.
  19. Bakke,Mark A.; Muchow,James D.; Johnson,Craig A.; Teske,Donald W., Method and apparatus for exchanging configuration information between nodes operating in a master-slave configuration.
  20. Muchow, James D., Method and apparatus for exchanging heartbeat messages and configuration information between nodes operating in a master-slave configuration.
  21. Muchow,James D., Method and apparatus for exchanging heartbeat messages and configuration information between nodes operating in a master-slave configuration.
  22. Muchow,James D.; Bakke,Mark, Method and apparatus for supporting communications between nodes operating in a master-slave configuration.
  23. Yan, Weipeng Paul; Nesanoney, Diaz H.; Younas, Fayyaz Ahmad; Radalj, Maurice Mate; Jazayeri, Nasrollah, Method and system for dynamically initializing a view for a streaming data base system.
  24. Njemanze, Hugh S.; Aguilar-Macias, Hector; Beedgen, Christian Friedrich, Method for batching events for transmission by software agent.
  25. Njemanze,Hugh S.; Aguilar Macias,Hector; Beedgen,Christian Friedrich, Method for batching events for transmission by software agent.
  26. Nesamoney, Diaz H.; Krishnan, Vaikom B.; Handwerker, Martin L.; Jazayeri, Nasrollah, Method for performing real-time analytics using a business rules engine on real-time heterogeneous materialized data views.
  27. Nesamoney,Diaz H.; Handwerker,Martin Lewis; Krishnan,Vaikom B.; Jazayeri,Nasrollah, Method for performing real-time analytics using a business rules engine on real-time heterogeneous materialized data views.
  28. Nesamoney, Diaz H.; Yan, Weipeng Paul; Martin, Jameison Bear; Radalj, Maurice Mate; Younas, Fayyaz Ahmad, Method for providing a real time view of heterogeneous enterprise data.
  29. Nesamoney, Diaz H.; Yan, Weipeng Paul; Martin, Jameison Bear; Radalj, Maurice Mate; Younas, Fayyaz Ahmad, Method for providing a real time view of heterogeneous enterprise data.
  30. Nesamoney, Diaz H.; Yan, Weipeng Paul; Martin, Jameison Bear; Radalj, Maurice Mate; Younas, Fayyaz Ahmad, Method for providing a real time view of heterogeneous enterprise data.
  31. McCasland, Paul, Method system and storage medium for detecting network elements.
  32. Tobin, Thomas J.; Sakizli, Ceren; Agarwal, Anshu, Methods and systems for filtering data for interactive display of database data.
  33. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich, Modular agent for network security intrusion detection system.
  34. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich, Modular agent for network security intrusion detection system.
  35. Trimble, Ronald Ray; Tofano, Jeffrey V.; Ramsdell, Thomas R.; Kennedy, Jon Christopher, Multi-node hybrid deduplication.
  36. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich; Kothari, Pravin S., Network security monitoring system employing bi-directional communication.
  37. Tidwell, Kenny; Beedgen, Christian, Network zone identification in a network security system.
  38. Ward, Chad; Lahoti, Ankur; Tidwell, Kenny, Object reference in a system.
  39. Ward, Chad; Lahoti, Ankur; Tidwell, Kenny, Object reference in a system.
  40. Anglin, Matthew J.; Cannon, David M.; Martin, Howard N., Optimized simultaneous storing of data into deduplicated and non-deduplicated storage pools.
  41. Saurabh,Kumar; Tidwell,Kenny, Pattern discovery in a network security system.
  42. Saurabh, Kumar; Tidwell, Kenny C., Pattern discovery in a network system.
  43. Anglin, Matthew J.; Cannon, David M., Policy based sharing of redundant data across storage pools in a deduplicating system.
  44. Njemanze, Hugh S.; Kothari, Pravin S., Real time monitoring and analysis of events from multiple network security devices.
  45. Njemanze,Hugh S.; Kothari,Pravin S., Real time monitoring and analysis of events from multiple network security devices.
  46. Anglin, Matthew J., Retrieval and recovery of data chunks from alternate data stores in a deduplicating system.
  47. Anglin, Matthew J., Retrieval and recovery of data chunks from alternate data stores in a deduplicating system.
  48. Kuik,Timothy J.; Thompson,David Patrick; Bakke,Mark A.; Haapala,Clayton Stuart; De Groote,Stephen P.; Johnson,Craig A.; Muchow,James D., SCSI-based storage area network having a SCSI router that routes traffic between SCSI and IP networks.
  49. Kuik,Timothy J.; Thompson,David Patrick; Bakke,Mark A.; Haapala,Clayton Stuart; De Groote,Stephen P.; Johnson,Craig A.; Muchow,James D., SCSI-based storage area network having a SCSI router that routes traffic between SCSI and IP networks.
  50. Dash, Debabrata; Aguilar-Macias, Hector, Security event aggregation at software agent.
  51. Woodruff, Roger, Storage area network interconnect server.
  52. Haapala,Clayton S., Storage router and method for routing IP datagrams between data path processors using a fibre channel switch.
  53. Gupta, Sanjeev Kumar, Streaming multidimensional data by bypassing multidimensional query processor.
  54. Njemanze, Hugh S., Synchronizing network security devices within a network security system.
  55. Prawdiuk,Pawlo P.; Thorn,Eric; De Groote,Stephen P., System and method for configuring fibre-channel devices.
  56. Patrick, Robert; Key, Christopher; Holzberger, Paul, System and method for coordinating network incident response activities.
  57. Woodruff,Roger, System and method for interconnecting a storage area network.
  58. Donovan, Steven R.; Roach, Adam B.; Campbell, Ben A.; Deo, Ajay P., System and method for maintaining resiliency of subscriptions to an event server.
  59. Trimble, Ronald Ray; Kennedy, Jon Christopher, System and method for multi-scale navigation of data.
  60. Reiter, Timmie G.; McMaster, Carey Jay; Trimble, Ronald Ray; King, Stefan Merrill; Biernacki, David Michael; Kennedy, Jon Christopher, System and method for summarizing data.
  61. Thompson, David P., System and method for supporting VLANs in an iSCSI.
  62. Bakke,Mark A.; Thompson,David P., Systems and methods for network address failover.
  63. Trimble, Ronald Ray; Kennedy, Jon Christopher; Reiter, Timmie G.; Biernacki, David Michael; McMaster, Carey Jay; King, Stefan Merrill, Systems and methods of locating redundant data using patterns of matching fingerprints.
  64. Tidwell, Kenny C.; Saurabh, Kumar; Dash, Debabrata; Njemanze, Hugh S.; Kothari, Pravin S., Threat detection in a network security system.
  65. Tidwell,Kenny; Saurabh,Kumar; Dash,Debabrata; Njemanze,Hugh S.; Kothari,Pravin S., Threat detection in a network security system.
  66. Njemanze, Hugh S., Timestamp modification in a network security system.
  67. Njemanze, Hugh S.; Bhatt, Rajesh P., User interface for network security console.
  68. Kuik, Timothy J.; Bakke, Mark A., Virtual MAC address system and method.

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 특허

해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로