Matches 151 - 200 out of 388 < 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20110078196 RATIONED COMPUTER USAGE  
A computing system includes an access prevention module that selectively locks use of one or more system resources of that computing system. A vision-based input module is configured to recognize...
US20130061336 STANDING ORDER DATABASE SEARCH SYSTEM AND METHOD FOR INTERNET AND INTRANET APPLICATION  
An internet and/or intranet based system and method for limiting access to confidential records to properly authorized and authenticated parties. The system's central premise is that the person to...
US20100153452 Discardable files  
The present application includes methods and system for managing a storage device. In one implementation, a storage allocator that is present in a host or a storage device receives a request to...
US20100185675 SECURITY CONTROL OF ANALYSIS RESULTS  
A system and a method are provided. The method includes assigning an entity to a ticket group associated with an ID thereof, displaying to the entity reports, which are each organized with an...
US20110196764 System and method for virtually staging property  
A system for virtually staging property to market real estate including a computing device communicably linked to a computer network, a database accessible by the computing device containing a...
US20140156705 HYBRID FILE SYSTEMS  
Systems and computer program products may provide a virtual system with direct access to one or more sectors of a resource of a computer system. The system and computer program products may...
US20150012565 SELECTIVE DATA TRANSFORMATION AND ACCESS FOR SECURE CLOUD ANALYTICS  
Providing analytics information from a cloud service includes maintaining an analytics database that is separate from data and servers accessed by users of the cloud service, selectively pushing...
US20100131558 SYSTEM AND METHOD FOR MANAGING COPYRIGHT LICENSING  
A system and method for storing and managing copyright licensing. There is provided a device for monitoring a business's performance of music or other copyrighted works to determine if the...
US20100287170 INSTANT ANSWERS AND INTEGRATED RESULTS OF A BROWSER  
A method, system, and medium are provided for searching multiple search services in parallel and utilizing multiple search providers in a computer system. Multiple search providers are installed...
US20110107231 METHOD AND SYSTEM FOR PROVIDING PROCESS-BASED ACCESS CONTROL FOR A COLLABORATION SERVICE IN ENTERPRISE BUSINESS SOFTWARE  
The present invention relates to access control objects directly associated with collaboration process nodes, which are themselves associated with a collaborative software object. The direct...
US20100224678 Automated contact management  
A method for contact management using software wherein the user creates an editable personal profile that is assigned a unique identifier code that can be used by a code recipient to access the...
US20140095545 METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO CUSTOM OBJECTS IN A DATABASE  
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable embodiments to utilize a key for the...
US20120110020 METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO CUSTOM OBJECTS IN A DATABASE  
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable embodiments to utilize a key for the...
US20120124093 INTELLIGENT NETWORK INTERFACE CONTROLLER  
A network interface device includes a security database and a security services engine. The security database is configured to store patterns corresponding to predetermined malware. The security...
US20100082677 CONTENT ACCESS AND ANNOTATION SYSTEM AND METHOD  
Disclosed herein are systems and methods for controlling access to content, and/or regions thereof, as well as controlling access to annotations to the content, or regions thereof. An audience can...
US20110208778 MANAGING DIGITAL IDENTITY INFORMATION  
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more...
US20120271853 ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD  
An access permissions management system including a hierarchical access permissions repository including access permissions relating to data elements arranged in a data element hierarchy, wherein...
US20100241947 ADVANCED FEATURES, SERVICE AND DISPLAYS OF LEGAL AND REGULATORY INFORMATION  
Systems and techniques are disclosed that allow a user to enter a query in a query input region of a graphical user interface and respond to the query by automatically directing it to an...
US20100100524 APPROVAL SYSTEM IN NETWORK FOR THE DATA PRESERVATION  
The present invention relates to an approval system in a network for data security. The approval system includes a management server (10), a plurality of client terminals (30, 30′ end 30″), having...
US20120011159 MONITORING COMMUNICATIONS  
Methods, computer readable media, and apparatuses for monitoring communications are presented. A communication that includes non-public information may be identified. Subsequently, it may be...
US20100121882 Method and System for Implementing and Managing an Enterprise Identity Management for Distributed Security in a Computer System  
A method and system for facilitating the management of user identities includes an ownership component, a registration component, and a servicing component. When a user first desires to access a...
US20140156706 Hybrid File Systems  
Methods may provide a virtual system with direct access to one or more sectors of a resource of a computer system. The method may include providing, by a computer system to a virtual system, first...
US20100088341 COMPUTING DATA SECURITY SETTINGS IN A MULTI-DIMENSIONAL SYSTEM  
Disclosed is a method and system for computing data security settings in a multi-dimensional system. The method includes receiving a query from a user to access a dataset, retrieving a membership...
US20100318569 POPULATING A CACHE SYSTEM BASED ON PRIVILEGES  
A cache system is updated upon determining that a current privilege has not been checked for the session. Updating the cache system includes receiving all data items that are accessible for the...
US20150006580 CONTROLLING ACCESS TO ONE OR MORE DATASETS OF AN OPERATING SYSTEM IN USE  
A method and system for controlling access to data. Each dataset of L datasets is stored, via storage access controller (SAC) software external to an operating system, on at least one physical...
US20110099203 Cross domain discovery  
Aspects of the disclosure provide methods and systems for cross domain discovery. According to the disclosure, an object can include multiple entities defined by an originator. The multiple...
US20140129592 BUILD POOLED DATA SOURCE BASED ON HANA SAML LOGIN  
A system receives a request from a request processor of a database connection pool to access a database. The system determines whether a database connection from the database connection pool is...
US20120166485 Information Processor, Privilege Management Method, Program, and Recording Medium  
In an information technology (IT) environment, a technique to manage privileges given to personnel to whom a process is assigned. An information processor includes: a configuration management...
US20100205216 TECHNIQUES FOR CHANGING PERCEIVABLE STIMULI ASSOCIATED WITH A USER INTERFACE FOR AN ON-DEMAND DATABASE SERVICE  
In accordance with embodiments, there are provided techniques for providing perceivable stimuli in an interface of a multi-tenant on-demand database system. These techniques for providing...
US20140040315 CONTENT MANAGEMENT  
A method, computer program product, and computer system for receiving, at a second computer device, data content sent from a first computer device. The data content includes a first set of user...
US20100299340 DISTRIBUTED CONTACT INFORMATION DISCOVERY AND SHARING  
A contact sharing system is described herein that allows multiple people to share their address books of contact information so that a person can search for contact information among the address...
US20100125576 USER ORIENTED INFORMATION SYSTEM AND METHOD OF CONTROLLING THE USER ORIENTED INFORMATION SYSTEM  
Provided is a user oriented information system that may retrieve user oriented information or may provide the user oriented information to a mobile device, and a method of controlling the user...
US20140289277 FIXED CONTENT STORAGE WITHIN A PARTITIONED CONTENT PLATFORM USING NAMESPACES  
Content platform management is enhanced by logically partitioning a physical cluster that comprises a redundant array of independent nodes. Using an interface, an administrator defines one or more...
US20110270885 SECURITY CONFIGURATION SYSTEMS AND METHODS FOR PORTAL USERS IN A MULTI-TENANT DATABASE ENVIRONMENT  
A computer-implemented system and method includes method includes receiving a data request for data in a database from a user; determining if the user is an internal user or a portal user;...
US20100262625 METHOD AND SYSTEM FOR FINE-GRANULARITY ACCESS CONTROL FOR DATABASE ENTITIES  
Method and system embodiments of the present invention are directed to providing fine-granularity access control to data entities within databases. Certain method and system embodiments of the...
US20100250607 PERSONAL INFORMATION MANAGEMENT APPARATUS AND PERSONAL INFORMATION MANAGEMENT METHOD  
The present invention relates to an apparatus and method that prevents personal information, which is provided from a user to a website when the user joins the website, from being illegally used....
US20110161289 Data Replication Across Enterprise Boundaries  
Systems and methods for synchronizing verification data in a distributed database including client and server databases. The server database may exchange verification data regarding one-time...
US20100169363 SYSTEM AND METHOD FOR MANAGING AND DISPLAYING ADDITIVE CONTENT IN A WEB BROWSER  
A method and apparatus is provided for use with a web browser for managing and displaying additive content relating to web sites. For example, users can associate user generated content with third...
US20110035409 HIERARCHICAL STORAGE SYSTEM AND COPY CONTROL METHOD OF FILE FOR HIERARCHICAL STORAGE SYSTEM  
An interface for controlling an inhibition of a recall is prepared for an application, and a judgment of necessity of a recall is informed of to a hierarchical storage before the application...
US20100138430 GATEWAY SERVER, FILE MANAGEMENT SYSTEM, AND FILE MANAGEMENT METHOD AND PROGRAM  
With a new function introduced neither to a file server nor to a client terminal, control of displaying only a file or a folder whose access right is held by a user is enabled by using existing...
US20100153373 WEATHER INFORMATION RECEPTION AND OUTPUT DEVICE  
A weather information reception and output device includes a server access unit accessing a server in a meteorological office and retrieving a database to check if there is a new message to be...
US20150199535 ORGANIZATION-BASED POLICIES  
Techniques for representating, managing and storing data related to an organization are provided. An identity management system is disclosed that is configured to manage, represent and store data...
US20150234843 INFORMATION MANAGEMENT METHOD, INFORMATION MANAGEMENT DEVICE, PROGRAM, AND PROGRAM PROVISION METHOD  
An information management method allows presenting the usage of each of storage areas in a visually intuitive manner, the method including: obtaining user configuration information in each of the...
US20110153642 Client Relationship Management  
Managing a relationship between an organization and clients of the organization based on data stored on a server by the organization includes determining that data stored on the server represents...
US20120059832 Portable Hash-Based Key Location Mechanism  
A system and method for locating a data entry in a server cluster using a hash function and hash codes that can be implemented on any platform, system, or in any language. In one embodiment, a...
US20100262624 DISCOVERY OF INACCESSIBLE COMPUTER RESOURCES  
A request for a search of computer resources can be received at a search engine. The search of the resources can be conducted, and search results can be produced. The search results can include an...
US20100145997 User driven ad-hoc permission granting for shared business information  
An apparatus and method for sharing information between a person having certain permissions, and another person or group of persons having insufficient permissions for the information. The...
US20150100602 SYSTEM AND METHOD FOR THIRD PARTY REMOTE ACCESS TO PERSONAL MEDICAL RECORDS  
A portable healthcare electronic data security key for an individual that is configured for use in combination with a portable computerized data access device that can wirelessly communicate with...
US20100257205 Method and System for Implementing and Managing an Enterprise Identity Management for Distributed Security  
An Enterprise Identity Management system includes a registration component, an ownership component, and an audit component. The registration component is configured to associate a user ID with...
US20150006581 Method for a Storage Device Accessing a File and Storage Device  
A method for a storage device accessing a file and apparatus. A method for a storage device accessing a file, wherein the storage device comprises a memory, wherein the memory stores at least two...

Matches 151 - 200 out of 388 < 1 2 3 4 5 6 7 8 >