Month of May 2007 - Page Number 18

Showing 171 - 180 of 403 from May 2007
Browse Prior Art Database
  1. 171.
    This disclosed system allows a user to utilize a laptop keyboard as a user input device to a mobile device.
    IPCOM000153001D | Original Publication Date: 2007-May-21
  2. 172.
    Password-locked screensavers are commonly used to prevent unauthorized access to the applications running on a user's computer system. The screensaver function is typically provided by the operating system and typically locks access to the entire desktop. Although some individual applications are designed to...
    IPCOM000153000D | Original Publication Date: 2007-May-21
  3. 173.
    It is often very difficult to locate an arbitrary resource within a large enterprise (a Lotus Notes* database, website, relational database, net share, etc.). There is typically no single directory that can be used to publish a heterogeneous set of resources.
    IPCOM000152999D | Original Publication Date: 2007-May-21
  4. 174.
    In a typical application deployment, there is a need for a mechanism to intelligently monitor the availability of the back-end servers in the topology. Typically requests flow through a web server or a proxy server and is handled by the back-end server. When any of the back-end servers is hung and is not able to...
    IPCOM000152998D | Original Publication Date: 2007-May-21
  5. 175.
    The article discusses a method for preventing click fraud activities through synchronous sharing of ID. By Sharing of ID's between the advertising agent (ex: Google) and the advertiser organizations can minimize the effects of click fraud and reduce overall cots.
    IPCOM000152997D | Original Publication Date: 2007-May-21
  6. 176.
    Traditionally, a reverse proxy server that fronts an application server needs to rewrite the absolute URLs in response messages because these URLs may contain the address of the back-end application server. The rewriting of these URLs can be complex to configure and can negatively impact proxy server performance. ...
    IPCOM000152996D | Original Publication Date: 2007-May-21
  7. 177.
    The JavaTOC tool generates the customized Eclipse Javadoc Help containing Eclipse-style XML navigation files that allow writers/developers to generate a TOC navigation on top of the Javadoc documentation files. The tool works with the Javadoc tool in an Eclipse environment. The tool generates the Eclipse plug-in...
    IPCOM000152995D | Original Publication Date: 2007-May-21
  8. 178.
    Numerous applications require high-performing data transports in order to meet or exceed the requirements of the customer. For example, highly-trafficked websites may need to fulfill requests within N seconds or else risk dissatisfying the end-user. Processing data in and out of the network is generally a significant...
    IPCOM000152994D | Original Publication Date: 2007-May-21
  9. 179.
    Due to more intense airport security, increased airline traffic delays, and fewer direct flights, it is normally difficult to plan a trip without multiple flight segments. Thus, travelers are often required to run through airports carrying computers and other heavy items trying to make a connection to the next flight...
    IPCOM000152993D | Original Publication Date: 2007-May-21
  10. 180.
    In Batch environments exists a concept known as checkpointing, where the state of a given workload is to be recoverable and therefore persisted after some interval- be it after X records have been processed, every Y seconds, etc. The checkpoint interval directly influences the amount of available resources (both...
    IPCOM000152992D | Original Publication Date: 2007-May-21