Electrical computers and digital processing systems: multicomput – Network-to-computer interfacing
Reexamination Certificate
1999-04-23
2002-02-26
Lim, Krisna (Department: 2153)
Electrical computers and digital processing systems: multicomput
Network-to-computer interfacing
C709S249000
Reexamination Certificate
active
06351777
ABSTRACT:
BACKGROUND OF THE INVENTION
The present invention relates to the field of distributed computer systems. More specifically, the present invention relates to a computer system that facilitates interchange of information between two or more users sitting at respective computer terminals included in the computer system. According to one aspect of the present invention, two or more dissimilar computer terminals can present identical information to respective users and each of these users can annotate and/or update the information presented to all users.
Several services within the U.S. Military often need to interoperate, i.e., interact and communicate, with one another in order to plan and to subsequently carry out Joint Missions. More specifically, the participants in a Joint Mission must be able to share information including text data, images, and, more importantly, various computer generated displays of consolidated tactical information. Moreover, even when interoperability concerns are satisfied, this only assures that information can be transferred from the source of the information to the user of the information; there still exists the concern that the various users will be unable to coordinate their efforts, i.e., collaborate with one another, in planning and executing the mission and in critiquing completed missions. For example, while collaboration between various intelligence agencies and military branch during mission planning is essential, it often does not occur due the logistics involved in assembling the requisite personnel in one location. Thus, planning often involves an exchange of documents as one group develops a mission plan and the other groups or individuals critique the plan. Such planning is conducted using messages in the military realm or Email in the civilian world. Similar concerns exist in a corporate environment.
It will be appreciated that the various components of the U.S. Military use a heterogeneous collection of computers running a wide variety of operating systems, e.g., MS-DOS, Windows 3.1, Windows-95, Windows-NT, O/S-2, Macintosh O/S, and several versions of UNIX. The number of different systems which must be interconnected varies with each Joint Mission, making it extremely difficult for the components of the U.S. Military to interoperate. In particular, it is extremely difficult for the various military components to share a homogeneous view of tactical information. The degree of difficulty is often increased when the various military components are physically separated from one another over long distances. Although communication channels are available to interconnect the various computers, wide geographic separation generally dictates the use of a narrow band communications link.
Military components can share text data, maps and/or photographs used in conveying tactical data, after a fashion, even when using dissimilar computers. For example, map data may be displayed using a particular computer program, assuming that a version of the particular computer program tailored to run on each variation of the individual computers forming a computer system is available. It should be mentioned, however, that each branch of the service often uses branch-specific symbols for displaying information; the Army may designate ground troops using one symbol while the naval vessels providing fire support may use a completely different symbol to represent the identical ground troops. Moreover, the U.S. Military is often required to expend manpower and funds to generate a computer program for each variation of computer used in the Joint Mission.
It will be appreciated that the foregoing discussion assumes that several versions of the same program can be installed on the various computers being networked to one another; the problem is exacerbated when the computer systems which must be networked are running incompatible operating systems. For example, the Joint Mission parameters often dictate that a UNIX computer acting as a server, i.e., the computer providing data, be interconnected to various desktop computer and workstation clients, i.e., the computers receiving the data, which clients are running several other incompatible operating systems.
The advent of the Internet, and particularly the World Wide Web (the Web), has provided at least two technical advances which promise to preserve the investment made by large computer operators such as the U.S. Military in hardware, software and training. In particular, these two technical advances provide techniques for distributing applications, or pseudo-applications within hypertext markup language (HTML) documents sent by the server to at least one client over the public Internet or a private Intranet. The latter case will be discussed first.
It is now possible for servers to provide clients with HTML documents having expanded Is capabilities by virtue of their use of a scripting language such as JavaScript, i.e., a limited programming language designed to extend the capabilities of another application. For example, the numerical clock illustrated in
FIG. 1
was generated by the JavaScript routine also illustrated in FIG.
1
. The JavaScript routine is downloaded to a client running an appropriate JavaScript Interpreter, which causes the client computer to display, by way of another example, an order form (not shown) in the downloaded Web page. It will be appreciated that the data generated using the JavaScript form is transferred to a common gateway interface (CGI) program in the conventional manner.
Alternatively, the server may provide clients with JAVA™ applications (Applets) embedded into the HTML document. It will be appreciated that a JAVA™ Applet is a small program which can be run automatically as soon as the associated HTML document is transferred from the server to the client(s); several JAVA™ Applets may be transferred to a client within a single HTML document. It will be noted that current technology is moving away from fat clients, i.e., full programs, to thin clients, i.e., JAVA™ Applets. The principal advantage to the latter approach is in program configuration control, i.e., just the server side program is updated; the client automatically receives the latest version, for example, of the JAVA™ Applet when the associated HTML document is transferred to the client(s).
In short, an unacceptable amount of time and money is still required to ensure interoperability between the participants of the Joint Mission, even after moving from the fat client approach to the thin client approach to facilitate configuration control.
As discussed briefly above, the ability for remotely located users to collaborate with one another is significantly different from the ability to collaborate with several co-located individuals. Some discussion of the differences between these two disparate forms of collaboration would probably be helpful at this point.
As discussed in U.S. Pat. No. 5,206,934, which patent is incorporated herein by reference for all purposes, when a user performs an operation in a stand alone application with an input device such as a mouse or keyboard, an event is generated by the operating system and passed to the application program for execution. The stand alone application interprets the events and performs operations to change its internal data in response to the users' request. Such events include, for example, performing a deletion step in a word processing program or creating a graphic element in a computer-aided design (CAD) program.
When the application is expanded from a single user into a multiple user environment, such as simulating a conference over a network or a modem, each user must be able to manipulate the same data and see all of the modifications made to the data. To do this, each machine must interpret and transmit information about what the user is doing and what the user is seeing. There are three basic approaches to accomplish these results. These approaches correspond to three levels of data manipulation referred to as user input, data modification and visual displa
Bechtel, Esq. James B.
Lim Krisna
Powell, Jr., Esq. Raymond
The United States of America as represented by the Secretary of
LandOfFree
Computer software for converting a general purpose computer... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer software for converting a general purpose computer..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer software for converting a general purpose computer... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2966371