$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Transferring data and storing metadata across a network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
  • G06F-017/30
  • G06F-009/44
출원번호 UP-0286560 (2002-10-31)
등록번호 US-7617222 (2009-11-23)
우선권정보 CA-2391717(2002-06-26)
발명자 / 주소
  • Coulthard, Phil
  • Dykstal, David
  • Voutsinas, George
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Hardelsman, Libby Z.
인용정보 피인용 횟수 : 163  인용 특허 : 35

초록

Data is now able to be transferred back and forth between computer systems which have disparate file systems, e.g., between a computer having a hierarchical file system and a computer having a nonhierarchical file system. The differences, however, are not limited to the file storage system. Data ma

대표청구항

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows: 1. A method to transfer data from a first computer to a second computer, the first and second computer having disparate file structures, each of the file structures characterized by its m

이 특허에 인용된 특허 (35)

  1. Curley John L. (North Andover MA) Hirsch Thomas S. (Bedford MA) Wurz David A. (Winchester MA), Apparatus and method for alterable resource partitioning enforcement in a data processing system having central processi.
  2. Muhlestein, Mark, Backup and restore for heterogeneous file server environment.
  3. Blumer Thomas P. ; Amstein Peter R. ; Drellishak Scott F. ; Forgaard Randy J. ; Schulert Andrew J., Computer system and computer-implemented process for remote editing of computer files.
  4. Drummond Shattuck Reed ; Peter Earnshaw Heymann ; Steven Mark Mushero ; Kevin Benard Jones ; Jeffrey Todd Oberlander ; Dan Banay, Computer-based communication system and method using metadata defining a control-structure.
  5. Curtis Bryce Allen, Cross platform installer-with the ability to create platform independent variables of specific operating system variables from a scripting language.
  6. Lowry Edward S. (Acton MA), Data processing system having a data structure with a single, simple primitive.
  7. Anceau Francois (Gieres FR) Beauducel Claude (Franconville FR) Courboulay Pierre (Paris FR) Cretin Jacques (Le Chesnay FR), Device for coupling several data processing units to a single memory.
  8. Amatsu Keiji (Kamakura JPX) Butoh Zenhachiroh (Tokyo JPX) Hirai Hiroshi (Ryugasaki JPX) Massaki Minoru (Kawasaki JPX) Morita Hirofumi (Kawasaki JPX) Nakajima Takeo (Yokohama JPX) Nomura Nobuo (Mitaka, Distributed data processing system having front-end and back-end computers with different operating systems.
  9. McGurrin Scott ; Shah Ahmed ; Pasalis John, Drag and drop object subclassing.
  10. Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
  11. Dave Bharat P. ; Jha Niraj K., Hardware-software co-synthesis of hierarchical heterogeneous distributed embedded systems.
  12. Cousins, Robert E., Hierarchical file system structure for enhancing disk transfer efficiency.
  13. Bowers, Sandra Ann; Panico, Michael William; Rojas, Hypatia; Tran, Kim-Khanh Vu, Management graphical user interface for a network file system.
  14. Buxton Jeffrey J., Method and apparatus for distributing templates in a component system.
  15. Warshavsky, Alex S.; Bhavsar, Chandrakant R.; Fischer, Jeffrey M., Method and apparatus for mapping between XML and relational representations.
  16. Glasser Daniel S. ; McCurdy Ann Elizabeth ; Price Robert M., Method and system for controlling user access to a resource in a networked computing environment.
  17. Brown Michael Wilfrid (Austin TX) Hickerson Lester Brooks (Austin TX) Powell Colin Victor (Highland Beach FL) Tims William Chapel (Austin TX) Tycast Robert Leonard (Boca Raton FL) Verburg Richard Lee, Method and system for displaying applications of different operating systems on a single system using the user interface.
  18. Ghosh Sakti P. (San Jose CA) Lorie Raymond A. C. (San Jose CA), Method and system for facilitating processing of statistical inquires on stored data accessible through a data access st.
  19. Douglas Stephen Noddings ; Matthew Joseph Anglin, Method and system for supporting hierarchical storage management (HSM) file system across multiple platforms.
  20. Cornelius, Shawn S.; Huffman, Arnold Z.; Klug, Matthew C.; Krahn, Richard R.; Su, Eric C.; Sweeney, Michael S., Method and system for translating data associated with a relational database.
  21. Crozier Keith (Acton MA), Method for mapping, translating, and dynamically reconciling data between disparate computer platforms.
  22. Garcia Ben L. (Conyers GA) Klappert Walter R. (Topanga CA) Harmon Edward (Burbank CA), Method of creating CD-ROM image of files of different format with proper directories to be read by respective operating.
  23. Tharakan George, Methods and apparatus for a property editing mechanism for a network computer environment.
  24. Bacon David Francis ; Wegman Mark N. ; Zadeck Frank Kenneth, Object oriented dispatch optimization.
  25. Acker Liane Elizabeth ; Conner Michael Haden ; Martin Andrew Richard, Object oriented framework for specifying the format of compiler output with a template facility.
  26. Bond Barry ; Gershony Ori ; Hastings David E. ; Lew Jonathan C. ; Warwick Alan M., Program-interface converter for multiple-platform computer systems.
  27. Tibbetts John J., Proposal based architecture system.
  28. Carter John B. ; Davis Scott H. ; Frank Steven J., Remote access and geographically distributed computers in a globally addressable storage environment.
  29. Truong Timothy M., Remote editor system.
  30. Sluiman Harm,CAX ; Starkey Michael,CAX, Source code files in a file directory system having multiple hierarchies representing contextual views.
  31. Dunham, Douglas Paul; Dunn, Andrew; Dunton, Tina Lynn; Perkins, Jason Michael; Yip, Ophelia K., Storage area network methods and apparatus for display and management of a hierarchical file system extension policy.
  32. Danforth Scott Harrison ; Forman Ira Richard ; Madduri Hari Haranath, System and method for enabling tracing of program execution in an object-oriented system.
  33. Faustini Antony Azio, System, method and article of manufacture for creating an object oriented component having multiple bidirectional port.
  34. Faustini Antony Azio, System, method and article of manufacture for creating hierarchical folder components for use in a java application or a.
  35. Marullo Frank Robert ; Randall ; Jr. Donald Husted, Virtual dynamic browsing system and method for automated web server and testing.

이 특허를 인용한 특허 (163)

  1. Mizik, Andrey; Zen, Lee-Ming; McCullagh, Gavin Derek; Santoso, Yohanes; Meleshuk, Vadim; Gu, Yu; Lai, Minli; Mistrianu, Ivan; Weiss, Rebecca Claire; Chen, Yi Cheng; Hoskinson, Ronald Andrew, Adaptive resolution of domain name requests in virtual private cloud network environments.
  2. Watson, Ryan F.; Howard, Craig Wesley; Solapurkar, Chaitanya Ashok, Adaptive transfer rate for retrieving content from a server.
  3. Dabbiere, Alan, Advanced authentication techniques.
  4. Arsintescu, Bogdan G.; Lamant, Gilles S. C., Annotation management for hierarchical designs of integrated circuits.
  5. Phanse, Shruti; Kumar, Bhavesh Krishna, Anonymized application scanning for mobile devices.
  6. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  7. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  8. Brannon, Jonathan Blake, Attempted security breach remediation.
  9. Marshall, John; Sorensen, Christian Blake, Attendance tracking via device presence.
  10. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  11. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  12. Klein, Matthew D.; Marr, Michael David, Automated profiling of resource usage.
  13. Marr, Michael David; Klein, Matthew D., Automated profiling of resource usage.
  14. Marr, Michael David; Klein, Matthew D., Automated profiling of resource usage.
  15. Dabbiere, David, Autonomous device interaction.
  16. Richardson, David R.; Scofield, Christopher L., Cache optimization.
  17. Richardson, David R.; Scofield, Christopher L., Cache optimization.
  18. Dabbiere, Alan; Stuntebeck, Erich, Certificate based profile confirmation.
  19. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley Eugene; Uribe, Mauricio Alberto, Client side cache management.
  20. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley Eugene; Uribe, Mauricio Alberto, Client side cache management.
  21. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley E., Content delivery reconciliation.
  22. Hollis, Benjamin R.; Strand, William Alexander, Content distribution network.
  23. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley E.; Scofield, Christopher L., Content management.
  24. Marshall, John; Stuntebeck, Erich, Controlling access to resources on a network.
  25. Stuntebeck, Erich, Controlling access to resources on a network.
  26. Marshall, John; Rykowski, Adam; Stuntebeck, Erich; Halebeed, Jyothiprakash, Controlling distribution of resources in a network.
  27. Marshall, John; Stuntebeck, Erich; Jayaprakash, Gopinath; Manton, John Joseph; Brannon, Jonathan Blake, Controlling distribution of resources on a network.
  28. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a network environment.
  29. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  30. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  31. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  32. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  33. Stuntebeck, Erich, Data access sharing.
  34. Stuntebeck, Erich, Data access sharing.
  35. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  36. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  37. Manton, John Joseph, Delegating authorization to applications on a client device in a networked environment.
  38. Manton, John Joseph; Kommireddy, Sridhara Babu; Rykowski, Adam Stephen, Delegating authorization to applications on a client device in a networked environment.
  39. Dabbiere, Alan, Device management macros.
  40. Dabbiere, Alan; Stuntebeck, Erich, Distribution of variably secure resources in a networked environment.
  41. Marshall, Bradley E.; Velummylum, Piragash; Gabrielson, Jacob, Dynamic content delivery.
  42. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  43. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  44. Marshall, John, Enterprise-specific functionality watermarking and management.
  45. Marshall, John, Enterprise-specific functionality watermarking and management.
  46. Marshall, John, Enterprise-specific functionality watermarking and management.
  47. Mizik, Andrey; Zen, Lee-Ming; Kaplin, Pavlo; Gu, Yu; Lai, Minli, External health checking of virtual private cloud network environments.
  48. Stuntebeck, Erich, Facial capture managing access to resources by a device.
  49. Ellsworth, Joseph L.; Porter, Brandon William; Suver, Christopher Allen; Newcombe, Christopher Richard, Forward-based resource delivery network management techniques.
  50. Ellsworth, Joseph L.; Porter, Brandon William; Suver, Christopher Allen; Newcombe, Christopher Richard, Forward-based resource delivery network management techniques.
  51. Ellsworth, Joseph L.; Porter, Brandon William; Suver, Christopher Allen; Newcombe, Christopher Richard, Forward-based resource delivery network management techniques.
  52. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  53. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  54. Marshall, John, Functionality watermarking and management.
  55. Marshall, John, Functionality watermarking and management.
  56. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  57. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  58. Radlein, Anton Stephen; Jones, Harvo Reyzell; Dye, Nathan Alan; Howard, Craig Wesley, Identifying sources of network attacks.
  59. Radlein, Anton Stephen; Jones, Harvo Reyzell; Howard, Craig Wesley; Dye, Nathan Alan, Identifying targets of network attacks.
  60. DiRico, John; Stuntebeck, Erich, Individual-specific content management.
  61. Phanse, Shruti; Kumar, Bhavesh Krishna, Integrated application scanning and mobile enterprise computing management system.
  62. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Latency measurement in resource requests.
  63. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Latency measurement in resource requests.
  64. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Latency measurement in resource requests.
  65. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Latency measurement in resource requests.
  66. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W.S., Latency measurement in resource requests.
  67. Velummylum, Piragash; Marshall, Bradley E.; Gabrielson, Jacob, Local resource delivery network.
  68. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley Eugene, Locality based content distribution.
  69. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley Eugene, Locality based content distribution.
  70. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley Eugene, Locality based content distribution.
  71. Sivasubramanian, Swaminathan; Richardson, David R.; Marshall, Bradley Eugene, Locality based content distribution.
  72. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Location-based configuration policy toggling.
  73. Herf, Michael B.; Asgeirsson, Sigurdur, Making modified content available.
  74. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan, Managing CDN registration by a storage provider.
  75. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Sr., Tal, Managing content delivery network service providers.
  76. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal, Managing content delivery network service providers.
  77. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal, Managing content delivery network service providers.
  78. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal, Managing content delivery network service providers.
  79. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal, Managing content delivery network service providers.
  80. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal; Patel, Imran S., Managing content delivery network service providers by a content broker.
  81. Mostert, André, Managing network computing components utilizing request routing.
  82. Mostert, André, Managing network computing components utilizing request routing.
  83. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Managing request routing information utilizing client identifiers.
  84. Richardson, David R.; Marshall, Bradley E.; Sivasubramanian, Swaminathan, Managing resources in resource cache components.
  85. Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Richardson, David R., Managing resources using resource expiration data.
  86. Richardson, David R.; Abrar, Mustafa I.; Johnson, Don; Cormie, John; Marshall, Bradley E.; Cavage, Mark Joseph, Managing secure content in a content delivery network.
  87. Richardson, David R.; Abrar, Mustafa I.; Johnson, Don; Cormie, John; Marshall, Bradley Eugene; Cavage, Mark Joseph, Managing secure content in a content delivery network.
  88. Richardson, David R.; Abrar, Mustafa I.; Johnson, Don; Cormie, John; Marshall, Bradley Eugene; Cavage, Mark Joseph, Managing secure content in a content delivery network.
  89. Gerken, Christopher H., Method and apparatus for generating a model-driven development user interface.
  90. Radlein, Anton Stephen; Dye, Nathan Alan; Howard, Craig Wesley; Jones, Harvo Reyzell, Mitigating network attacks.
  91. Radlein, Anton Stephen; Dye, Nathan Alan; Howard, Craig Wesley; Jones, Harvo Reyzell, Mitigating network attacks.
  92. Radlein, Anton Stephen; Dye, Nathan Alan; Howard, Craig Wesley; Jones, Harvo Reyzell, Mitigating network attacks.
  93. DeWeese, William; Brannon, Jonathan Blake; Stuntebeck, Erich, Multi-persona devices and management.
  94. Richardson, David R.; Marshall, Bradley Eugene; Pope, Elmore Eugene; Scofield, Christopher L.; Sivasubramanian, Swaminathan; Cormie, John, Network resource identification.
  95. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  96. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  97. Dabbiere, David, Peripheral device management.
  98. Dabbiere, David, Peripheral device management.
  99. Puchala, Katarzyna Anna; Radlein, Anton Stephen; Dunlap, David Alexander, Point of presence based data uploading.
  100. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Point of presence management in request routing.
  101. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Point of presence management in request routing.
  102. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Point of presence management in request routing.
  103. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Point of presence management in request routing.
  104. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W.S., Point of presence management in request routing.
  105. Watson, Ryan F., Processing DNS queries to identify pre-processing information.
  106. Watson, Ryan F., Processing DNS queries to identify pre-processing information.
  107. Richardson, David R.; Cormie, John; Marshall, Bradley E.; Pope, Elmore Eugene; Sivasubramanian, Swaminathan, Processing of DNS queries.
  108. Baldwin, Matthew Graham; Watson, Ryan F., Request management for hierarchical cache.
  109. Richardson, David R.; Sivasubramanian, Swaminathan; Marshall, Bradley Eugene; Scofield, Christopher L.; Pope, Elmore Eugene, Request routing based on class.
  110. Richardson, David R.; Sivasubramanian, Swaminathan; Marshall, Bradley Eugene; Scofield, Christopher L.; Pope, Elmore Eugene, Request routing based on class.
  111. Richardson, David R.; Sivasubramanian, Swaminathan; Marshall, Bradley Eugene; Scofield, Christopher L.; Pope, Elmore Eugene, Request routing based on class.
  112. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Request routing in a networked environment.
  113. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Request routing in a networked environment.
  114. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Request routing management based on network components.
  115. Richardson, David R.; Cormie, John; MacCarthaigh, Colm; Redman, Benjamin W. S., Request routing management based on network components.
  116. MacCarthaigh, Colm; Richardson, David R.; Redman, Benjamin W. S., Request routing processing.
  117. Richardson, David R.; MacCarthaigh, Colm; Redman, Benjamin W. S., Request routing processing.
  118. Richardson, David R.; Marshall, Bradley E.; Sivasubramanian, Swaminathan, Request routing using a popularity identifier at a DNS nameserver.
  119. Richardson, David R.; Marshall, Bradley E.; Sivasubramanian, Swaminathan, Request routing using a popularity identifier to identify a cache component.
  120. Sivasubramanian, Swaminathan; Richardson, David R.; Scofield, Christopher L.; Marshall, Bradley E., Request routing using network computing components.
  121. Richardson, David R.; Cormie, John; Patel, Imran S.; Redman, Benjamin W. S.; Sheehan, Richard, Request routing utilizing client location information.
  122. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal, Request routing utilizing cost information.
  123. Sonkin, Dmitry; Acharya, Prashanth A.; Liborski, Valeri; Meleshuk, Vadim; Mutz, Darren H.; Patel, Imran S.; Rosen, Lee B.; Slot, Martin Cornelis Frederik, Request routing utilizing point of presence load information.
  124. Baldwin, Matthew Graham, Reserved cache space in content delivery networks.
  125. Baldwin, Matthew Graham, Reserved cache space in content delivery networks.
  126. Marshall, John; DeWeese, William, Resource watermarking and management.
  127. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  128. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  129. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  130. Raftery, James Brendan, Routing based request correlation.
  131. Raftery, James Brendan, Routing based request correlation.
  132. Howard, Craig Wesley; Uppal, Hardeep Singh, Routing mode and point-of-presence selection service.
  133. Howard, Craig Wesley; Uppal, Hardeep Singh, Routing mode and point-of-presence selection service.
  134. Howard, Craig Wesley; Uppal, Hardeep Singh, Routing mode and point-of-presence selection service.
  135. DeWeese, William; Stuntebeck, Erich, Secondary device as key for authorizing access to resources.
  136. Marshall, John; Stuntebeck, Erich; Sorensen, Blake, Secure application leveraging of web filter proxy services.
  137. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan; Saraf, Tal, Service provider registration by a content broker.
  138. Marshall, John; DeWeese, William, Shared resource watermarking and management.
  139. Sorensen, Christian Blake, Social media and data sharing controls for data security purposes.
  140. Petersen, Kirk Arlo; Jayamohan, Ajith; Chatterjee, Preetha, Source-dependent address resolution.
  141. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  142. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  143. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  144. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  145. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  146. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  147. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  148. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  149. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  150. Stuntebeck, Erich, Systems and methods for controlling email access.
  151. Stuntebeck, Erich, Systems and methods for controlling email access.
  152. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  153. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  154. Stuntebeck, Erich; Burnett, Michelle, Systems and methods for controlling network access.
  155. Fisher, Jeffrey O., Systems and methods for synchronizing software execution across data processing systems and platforms.
  156. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration policy toggling.
  157. Stewenius, Henrik C., Tracking image origins.
  158. Uppal, Hardeep Singh; Acharya, Prashanth; Howard, Craig Wesley, Traffic surge management for points of presence.
  159. Uppal, Hardeep Singh; Acharya, Prashanth; Howard, Craig Wesley, Traffic surge management for points of presence.
  160. Uppal, Hardeep Singh; Acharya, Prashanth; Howard, Craig Wesley, Traffic surge management for points of presence.
  161. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan, Translation of resource identifiers using popularity information upon client request.
  162. Richardson, David R.; Marshall, Bradley Eugene; Sivasubramanian, Swaminathan, Updating routing information based on client location.
  163. Dabbiere, Alan; Stuntebeck, Erich, Watermarking detection and management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로