| 11016869 |
Extensibility model for usage analytics used with a system |
Adrian Fanaru, Gunnar Ljosdahl Rasmussen, Krister Mikalsen, Dag Steinnes Eidesen, Rune Devik +1 more |
2021-05-25 |
| 10402299 |
Configuring usage events that affect analytics of usage information |
Adrian Fanaru, Gunnar Ljosdahl Rasmussen, Krister Mikalsen, Dag Steinnes Eidesen, Rune Devik +1 more |
2019-09-03 |
| 10216394 |
Secured and filtered personal information publishing |
Ralph Abdo, Eric Wong, Theodore L. Michel, Cameron Stillion |
2019-02-26 |
| 10089311 |
Ad-hoc queries integrating usage analytics with search results |
Dag Steinnes Eidesen, Adrian Fanaru, John D. Fan, Vegar Skjærven WANG, Krister Mikalsen +1 more |
2018-10-02 |
| 9466065 |
Integrating usage information with operation of a system |
Gunnar Ljosdahl Rasmussen, Krister Mikalsen, Dag Steinnes Eidesen, John D. Fan, Adrian Fanaru |
2016-10-11 |
| 9218417 |
Ad-hoc queries integrating usage analytics with search results |
Dag Steinnes Eidesen, Adrian Fanaru, John D. Fan, Vegar Skjærven WANG, Krister Mikalsen +1 more |
2015-12-22 |
| 9165161 |
Setting options for publishing calendar |
Ralph Abdo, Eric Wong, Theodore L. Michel, Cameron Stillion |
2015-10-20 |
| 8806218 |
Management and security of personal information |
— |
2014-08-12 |
| 8200699 |
Secured and filtered personal information publishing |
Ralph Abdo, Eric Wong, Theodore L. Michel, Cameron Stillion |
2012-06-12 |
| 7472385 |
Method and computer-readable medium for installing an upgrade to an application program |
Benjamin C. Chamberlain, Robert C. Collie |
2008-12-30 |
| 6735766 |
Method and computer-readable medium for installing an upgrade to an application program |
Benjamin C. Chamberlain, Robert C. Collie |
2004-05-11 |
| 6565608 |
Method and system for customizing alert messages |
Ronald A. Fein, Ronald Stephen Giesen |
2003-05-20 |
| 6427236 |
Method for installing a patch based on patch criticality and software execution format |
Benjamin C. Chamberlain, D. Gordon Hardy |
2002-07-30 |
| 6057837 |
On-screen indentification and manipulation of sources that an object depends upon |
Howard Wesley Cherry, John P. O'Neill, Russell S. Johnson, Juha Niemisto |
2000-05-02 |