Month of July 2008 - Page Number 25

Showing 241 - 250 of 466 from July 2008
Browse Prior Art Database
  1. 241.
    IPCOM000172855D | Original Publication Date: 2008-Jul-16
  2. 242.
    This article describes a method of selecting and citing previous messages and/or conversations within an instant messaging client. It describes a history citation component as an addition to an existing instant messaging infrastructure, which provides the user with an option to include previous historical chat...
    IPCOM000172854D | Original Publication Date: 2008-Jul-16
  3. 243.
    A web application is disclosed for the prioritisation of messages within an Enterprise Service Bus (ESB). The application provides dynamic prioritisation of ESB messages as they request bandwidth, thereby ensuring that the underlying resource access control technology is able to provide guaranteed QoS in...
    IPCOM000172853D | Original Publication Date: 2008-Jul-16
  4. 244.
    In a memory of an identification card are stored information authenticating a cardholder and a communication program providing connectivity between the card and a plurality of data depositories. After positive authentication, the cardholder may use the same card to access various data depositories.
    IPCOM000172851D | Original Publication Date: 2008-Jul-16
  5. 245.
    IPCOM000172823D | 2008-Jul-16
  6. 246.
    Formulation contains active substance three sodium risedronate dihydrate salt
    IPCOM000172809D | 2008-Jul-16
  7. 247.
    Disclosed is a method to improve the display of preview of a message in an Email Client system. This is achieved by making the preview available On-Demand and improving the space utilization of the Email Client window by using the Navigator Space in a relatively efficient manner. The On-Demand feature refers to...
    IPCOM000172808D | Original Publication Date: 2008-Jul-16
  8. 248.
    A new sametime chat plugin
    IPCOM000172805D | Original Publication Date: 2008-Jul-16
  9. 249.
    Disclosed is a system to protect potential password data from I/O hacking and also from phishing web sites. To achieve this, an encryption method is proposed. The user can enter encrypted password rather than plain password that the user has in mind. This method requires a password, a key and an encryption table....
    IPCOM000172804D | Original Publication Date: 2008-Jul-16
  10. 250.
    Disclosed is a system to achieve maximum throughput during Just In Time (JIT) Compilation of Enterprise *JAVA Applications.
    IPCOM000172803D | Original Publication Date: 2008-Jul-16