Patent application number | Description | Published |
20080301470 | TECHNIQUES FOR SECURING CONTENT IN AN UNTRUSTED ENVIRONMENT - Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. The first key is used to decrypt the encrypted version of the content encryption/decryption key. The content delivery service is unaware of the content encryption/decryption key and the first key; and the content held by the content delivery service is encrypted with the content encryption/decryption key. Principals securely share, create, manage, and retrieve the encrypted versions of the content encryption/decryption key and the first key from the content delivery service using secure communications. The encrypted content is obtainable via insecure communications from the content delivery service. | 12-04-2008 |
20090282046 | TECHNIQUES FOR ACCESSING REMOTE FILES - Techniques for accessing remote files are presented. A local user, via a local client, requests access to a file. A local file system determines that the file is associated with a junction. The junction is resolved and an associated remote file system is contacted by the local file system to acquire results for the request. The local file system then delivers the results to the local user via the local client. | 11-12-2009 |
20100306676 | DYNAMIC COLLABORATIVE TECHNIQUES - Techniques for dynamic collaboration are provided. A main collaboration session having multiple interacting parties proceeds in a sequential and linear fashion. An element of the main collaboration session, where the element is not a last or most recent element of the main collaboration session, is acted upon and a sub communication session is initiated. The main collaboration session and the sub communication session proceed independent of one another but remained linked and can be later re-integrated with one another. | 12-02-2010 |
20110093707 | TECHNIQUES FOR SECURING CONTENT IN AN UNTRUSTED ENVIRONMENT - Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. The first key is used to decrypt the encrypted version of the content encryption/decryption key. The content delivery service is unaware of the content encryption/decryption key and the first key; and the content held by the content delivery service is encrypted with the content encryption/decryption key. Principals securely share, create, manage, and retrieve the encrypted versions of the content encryption/decryption key and the first key from the content delivery service using secure communications. The encrypted content is obtainable via insecure communications from the content delivery service. | 04-21-2011 |
20120047170 | TECHNIQUES FOR ACCESSING REMOTE FILES - Techniques for accessing remote files are presented. A local user, via a local client, requests access to a file. A local file system determines that the file is associated with a junction. The junction is resolved and an associated remote file system is contacted by the local file system to acquire results for the request. The local file system then delivers the results to the local user via the local client. | 02-23-2012 |
20120197952 | UNIVERSAL CONTENT TRACEABILITY - Techniques for universal content traceability are presented. A piece of content is tagged with one or more content identifiers and with a unique instance identifier. The content also is tagged with content and instance-level metadata. The tagged information is maintained with the document and separately from the document in a centralized or distributed database system or table. As operations are performed on the content, the tagged information may be updated as necessary. The content can then use the tagged information in connection with the database to trace its origins and history during its lifecycle. | 08-02-2012 |
20120254140 | DISTRIBUTED, UNIFIED FILE SYSTEM OPERATIONS - Apparatus, systems, and methods may operate to receive a request to access a file from a client node at one of a plurality of lookup nodes, the lookup nodes storing portions of a distributed table having lookup information associated with the file. The distributed table, which may comprise a distributed hash table, includes replicated references to virtualized and non-virtualized file elements of varied granularity in a unified file system. Additional activity may comprise forwarding the request to another one of the lookup nodes until the lookup information is located, or chaining the request to one of the plurality of lookup nodes and implementing activity that has been requested. Additional apparatus, systems, and methods are disclosed. | 10-04-2012 |
Patent application number | Description | Published |
20130290854 | METHOD AND APPARATUS FOR ISOLATING ANALYTICS LOGIC FROM CONTENT CREATION IN A RICH INTERNET APPLICATION - A method for isolating analytics logic from content creation is a rich Internet application. In an embodiment, a method for isolating analytics tracking logic comprises receiving a rich Internet application, identifying a plurality of event elements within the content separate from content creation, tagging the identified plurality of event elements, wherein the event elements are tagged in isolation of content creation, and storing the content including the tagged event elements. The set of tagged event elements may be modified in isolation of content creation. | 10-31-2013 |
20140289700 | Methods and Systems for Visual Code Refactoring - Embodiments include a method comprising providing a design interface that depicts a plurality of interface elements of an application under development, each element defined in source code accessible by the application development environment in a declarative markup language. The method can comprise receiving, through the design interface, data representing a selection of a plurality of the interface elements, identifying the declarative expressions corresponding to the selected interface elements, defining a new declarative expression, and generating at least one code segment using the identified declarative expressions. The method an comprise storing the generated code segment in a computer readable medium, with the stored code segment associated with the new declarative expression, so that the new declarative expression can be inserted into the source code in place of the identified declarative expressions and/or can used in a second application under development. | 09-25-2014 |