Akamai Technologies (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Akamai Technologies" in English language version.

refsWebsite
Global rank English rank
low place
low place
1st place
1st place
407th place
241st place
786th place
558th place
187th place
146th place
3,341st place
2,191st place
49th place
47th place
415th place
327th place
572nd place
436th place
2,740th place
2,050th place
38th place
40th place
3,829th place
2,507th place
low place
low place
272nd place
225th place
616th place
430th place
28th place
26th place
132nd place
96th place
low place
6,516th place
low place
low place
1,333rd place
957th place
99th place
77th place
518th place
331st place
low place
low place
14th place
14th place
712th place
526th place
23rd place
32nd place
2,911th place
1,596th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
153rd place
151st place
low place
low place
low place
low place
3,263rd place
1,976th place
low place
low place
4,121st place
2,662nd place
low place
6,978th place
low place
low place
low place
low place
140th place
115th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
8,773rd place
low place
low place

akamai.com

archive.today

avnetwork.com

bizjournals.com

bloomberg.com

bloxx.com

businessinsider.com

markets.businessinsider.com

businessweek.com

cnet.com

news.cnet.com

cnn.com

cnn.com

money.cnn.com

concord.io

datacenterknowledge.com

datavisualization.ch

emergingthreats.net

doc.emergingthreats.net

fundinguniverse.com

gigaom.com

hostadvice.com

hulu.com

investors.com

laipla.net

  • It is usually possible, however, to write such method patent claims in a way that all steps are performed by a single actor, for example, by replacing a step of sending a signal to the person performing the other steps with a step, instead, of receiving that signal. See, e.g., Michael Dzwonczyk Bulletproofing Method Claims for Post-Limelight Enforcement (Feb. 2014). Dzwonczyk asserts that the patent claim "could easily have been rewritten as a single-actor method claim that would not require the performance of any step by a second actor," and provides a rewritten version. See also Harold Wegner, Akamai II: Direct Infringement Déjà Vu (Aug. 2014) at 20-21, to similar effect.

microsoft.com

docs.microsoft.com

mit.edu

newsoffice.mit.edu

tech.mit.edu

ocw.mit.edu

nasdaq.com

nczonline.net

netcraft.com

sitereport.netcraft.com

networkworld.com

omnisperience.com

onlinevideowatch.com

readwrite.com

reuters.com

reuters.com

in.reuters.com

robtex.com

sec.gov

securityweek.com

sigcomm.org

smh.com.au

sophos.com

nakedsecurity.sophos.com

streamingmedia.com

sughrue.com

  • It is usually possible, however, to write such method patent claims in a way that all steps are performed by a single actor, for example, by replacing a step of sending a signal to the person performing the other steps with a step, instead, of receiving that signal. See, e.g., Michael Dzwonczyk Bulletproofing Method Claims for Post-Limelight Enforcement (Feb. 2014). Dzwonczyk asserts that the patent claim "could easily have been rewritten as a single-actor method claim that would not require the performance of any step by a second actor," and provides a rewritten version. See also Harold Wegner, Akamai II: Direct Infringement Déjà Vu (Aug. 2014) at 20-21, to similar effect.

techcrunch.com

teck.in

thefreelibrary.com

twitter.com

umass.edu

people.cs.umass.edu

groups.cs.umass.edu

venturebeat.com

wbur.org

web.archive.org

wiredpen.com

xconomy.com

yahoo.com

finance.yahoo.com

zdnet.com