Postoyko
John Postoyko, Boxmoor GB
Patent application number | Description | Published |
---|---|---|
20090077211 | NETWORK MANAGEMENT SYSTEM ACCELERATED EVENT DESKTOP CLIENT - This invention relates to a network management system accelerated event desktop client. This invention also relates to a method and computer program product for controlling an accelerated event desktop client in a network management system. The network management system comprises: a probe for intercepting a system event from a monitored system and creating an event item or modifying an event item associated with the system event; a collection database server collecting, in database of event items, a new event item or modification to an existing event item; a first client and a second client; a notifying means for notifying the first client of the new event item or event item modification; and first client notifying means for notifying the second client of the new event or event item modification. Additionally the second client can retrieve event item data, corresponding to the event notification received from the first client, from the database where the event item is collected. | 03-19-2009 |
John Postoyko, Hemel Hempstead Hertfordshire GB
Patent application number | Description | Published |
---|---|---|
20120265878 | NETWORK MANAGEMENT SYSTEM ACCELERATED EVENT DESKTOP CLIENT - A method, a system, and a computer program product associated with a network management system are disclosed. The method includes storing event data associated with a system event in a network as an event item at a database. The method also includes processing the event item at a control system of a collection server when a fast track flag is identified in the stored event item of the database. Processing the event item by the control system includes generating processing data to send a first notification associated with the event item to a first client. The first notification includes an identifier enabling the first client to obtain the stored event data from the database. Processing the event item by the control system also includes purging the processing data from the control system after sending the first notification. | 10-18-2012 |
John D. Postoyko, Hemel Hempstead GB
Patent application number | Description | Published |
---|---|---|
20090247224 | Pluggable Input Device for Chiral Customization of a Mobile Phone - A method of attaching a removable user interface (UI) input device to a mobile phone in a handedness-neutral manner is presented. The method includes incorporating a left-side module socket and a right-side module socket into a mobile phone, such that the left-side module socket is oriented on a left side of the mobile phone, the right-side module socket is oriented on a right side of the mobile phone, and the left-side module socket and the right-side module socket are each capable of electrically and physically coupling with a removable user interface (UI) input device. The UI input device is then selectively coupled to the left-side module socket or the right-side module socket according to a left or right handedness of a user of the mobile phone. | 10-01-2009 |
John D. Postoyko, London GB
Patent application number | Description | Published |
---|---|---|
20110119771 | SYSTEMS AND METHODS FOR HANDLING ELECTRONIC MESSAGES - Systems and methods for handling electronic messages are provided. One method includes monitoring a message and recipients of the message, detecting a reference in the monitored message to an entity, obtaining an access control list for the detected entity, the access control list defining permitted access to the entity, identifying a recipient of the message who is not permitted to access the entity, and performing a predefined action in response to the identification of the non-permitted recipient. The predefined action includes one or more specific actions such as identifying an administrator for the access control list, generating a reporting message, and transmitting the reporting message to the administrator. The predefined action additionally or alternatively includes preventing the transmission of the message to the non-permitted recipient and/or providing an alert to the author of the message. One system includes a processor and memory storing code for performing the above method. | 05-19-2011 |