Ex parte WEN - Page 2




          Appeal No. 96-1119                                                          
          Application 07/690,176                                                      


          12, 14 and 16.  Claims 1, 3, 5, 7, 9, 11, 13 and 15 had been                
          previously cancelled.  A first amendment after final rejection              
          was filed on October 11, 1994 but was denied entry by the                   
          examiner [Paper No. 15].  A second amendment after final                    
          rejection was filed on August 21, 1995 and was entered by the               
          examiner.  This amendment cancelled claims 10, 12, 14 and 16.               
          A third amendment after final rejection was filed concurrently              
          with the reply brief on October 6, 1995.  This amendment                    
          amended claims 2, 4, 6 and 8 and was marked “Enter this                     
          amendment” by the examiner, and the amendment has been                      
          entered.  As a result of the above amendments, this appeal is               
          directed to the rejections of claims 2, 4, 6 and 8, which                   
          constitute all the claims remaining in the application.                     
          The disclosed invention pertains to a method and                            
          apparatus for developing application software which is to be                
          operated on multiple processors.                                            
          Representative claim 2 is reproduced as follows:                            
               2.  A method for multiple software development,                        
          comprising:                                                                 
               (a)  a host computer directly monitoring at least one                  
          master processor;                                                           
               (b) the host computer indirectly monitoring a slave                    
                                          2                                           





Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  Next 

Last modified: November 3, 2007