Novadigm patents diff(1) and rdist(1).

Robert Hettinga rah at shipwright.com
Thu Aug 28 13:18:04 PDT 1997




--- begin forwarded text


Resent-Date: Thu, 28 Aug 1997 09:06:38 -0400
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef at substance.abuse.blackdown.org
Subject: Novadigm patents diff(1) and rdist(1).
Date: Thu, 28 Aug 1997 09:02:11 -0400
From: glen mccready <glen at qnx.com>
Resent-From: 0xdeadbeef at substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/2159
X-Loop: 0xdeadbeef at substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org


Forwarded-by: Nev Dull <nev at bostic.com>
Forwarded-by: Sean Eric Fagan <sef at Kithrup.COM>

Novadigm sues Marimba and threatens W3C.

http://www.novadigm.com/aB5.htm

About The Patent
	Novadigm's Patent (Number 5,581,764) "Distributed Computer Network
	Including Hierarchical Resource Information Structure and Related
	Method of Distributing Resources" describes the processes needed
	to generate from a common reference model a unique content
	configuration for each target end user, and to "difference" the
	"desired state" configuration with the actual-state of the target,
	yielding highly granular and very specific updates to distributed
	content automatically. The patent covers two central areas:

	Desired state configuration-processes which incorporate essential
	elements of both "push" and "pull" distribution models. By
	generating from common reference model a unique user configuration
	which describes the specific software or content a target user
	should have, producers can automatically 'push' content to
	specific servers, desktops, or users; or groups of users. In
	addition, the 'pull' process provides a means for users to control
	when the flow of information takes place, what information is
	delivered, and where it is stored.  Fractional
	Differencing-processes for comparing and contrasting the desired
	state configuration identifying what components a target should
	have with the resources it actually has, resulting in a concise
	and highly detailed difference configuration describing what
	components are needed-or should by removed-to ensure the targeted
	user is properly configured with a minimum of network traffic.

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/








More information about the cypherpunks-legacy mailing list