Month of July 2008 - Page Number 17

Showing 161 - 170 of 466 from July 2008
Browse Prior Art Database
  1. 161.
    Disclosed is a method to automatically prevent users from falling victim to phishing scams on the internet. Using this method, an internet user can safely submit his/her username/password to any website (including phishing sites) and does not need to worry about username/password being stolen. Only the intended...
    IPCOM000173007D | Original Publication Date: 2008-Jul-24
  2. 162.
    Users of email programs often wish to send a web link within an email and sometimes forget to include the link before sending the email. This problem typically results from the user forgetting to include the link after filling out other parts of the email such as the Subject field, the To field, and the body. The...
    IPCOM000173006D | Original Publication Date: 2008-Jul-24
  3. 163.
    This idea describes how a group of servers acting independently elects a server out of the group to function as a coordinator. The coordinator is responsible for selecting the target server(s) for the rest of the group to communicate with and relaying that information to the other members of the group.
    IPCOM000173000D | Original Publication Date: 2008-Jul-24
  4. 164.
    An assembly and method for securely connecting a cable to a device are described. A cable has a signal carrier and a plurality of reinforcements running along its longitudinal axis. A first member has a tapered aperture through it and a second member has an aperture though it which can receive at least the signal...
    IPCOM000172999D | 2008-Jul-24
  5. 165.
    Current web audit mechanisms concentrate mostly on the data rather than the view. Even by generated reports based on collected data, it is still hard to track users’ actions for non-IT specialists. On the other hand, some tracking applications need client side deployment to collect client actions. That is...
    IPCOM000172994D | Original Publication Date: 2008-Jul-24
  6. 166.
    IPCOM000172993D | Original Publication Date: 2008-Jul-24
  7. 167.
    The DMA APIs Cell SDK provided have some limitations for end users such as size limitation, address limitation etc. Otherwise, there will be a "bus error". It is inconvenient for end user so we find a method to do all the size/address DMA get/put operations. This article describe how to combine DMA with DMA...
    IPCOM000172992D | Original Publication Date: 2008-Jul-24
  8. 168.
    Synchronization is a fundamental challenge in computer science. It is becoming a major performance and design issue for concurrent programming on modern architectures, and for the design of distributed systems. Classic synchronization problems include Producer-consumer problem, Reader-writer problem, and Dinning...
    IPCOM000172991D | Original Publication Date: 2008-Jul-24
  9. 169.
    In the device management industry, the Common Information Model (CIM) has been accepted as an industry standard model by Distributed Management Task Force (DMTF). In a CIM implementation, the CIM Object Manager (CIMOM) manages the objects to be managed through the CIM protocol among a CIM Agent and a CIM Client....
    IPCOM000172990D | Original Publication Date: 2008-Jul-24
  10. 170.
    This article proposes an application process that creates a one step request to launch and authenticate a Java application through the web. It takes advantage of Java Network Launching Protocol (JNLP), Asynchronous JavaScript And XML (AJAX) and Webseal technologies. The application implements a client-side login...
    IPCOM000172989D | Original Publication Date: 2008-Jul-24