Examples relate to digital context aware (DCA) data collection. In some examples, a DCA start location component is positioned at a first location along a travel route, and a DCA end location component is positioned at a second location along the travel route. In response to using a wireless interface to detect the DCA start location component, data collection of measurements by a sensor are initiated. In response to using the wireless interface to detect the DCA end location component, the data collection by the sensor is halted.
B61L 25/02 - Indicating or recording positions or identities of vehicles or trains
B61L 3/12 - Devices along the route for controlling devices on the vehicle or train, e.g. to release brake or to operate a warning signal at selected places along the route, e.g. intermittent control controlling electrically using magnetic or electrostatic inductionDevices along the route for controlling devices on the vehicle or train, e.g. to release brake or to operate a warning signal at selected places along the route, e.g. intermittent control controlling electrically using radio waves
B61L 23/04 - Control, warning or like safety means along the route or between vehicles or trains for monitoring the mechanical state of the route
B61L 27/53 - Trackside diagnosis or maintenance, e.g. software upgrades for trackside elements or systems, e.g. trackside supervision of trackside control system conditions
G06V 20/56 - Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
G08G 9/00 - Traffic control systems for craft where the kind of craft is irrelevant or unspecified
2.
SYSTEMS AND METHOD FOR MANAGEMENT OF COMPUTING NODES
In examples provided herein, upon receiving notification of a computational task requested by a package to provide an experience to a user, a remote node management engine identifies computing nodes for performing the computational task and determining available processing resources for each computing node, where a computing node resides at networked wearable devices associated with the user. The remote node management engine further selects one of the computing nodes as a primary controller to distribute portions of the computational task to one or more of the other computing nodes and receive results from performance of the portions of the computational task by the other computing nodes, and provides to the selected computing node information about available processing resources at each computing node.
In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone.
Various embodiments of the present disclosure can include systems, methods, and non-transitory computer readable media configured to receive an input image associated with a test object. A set of edges are identified in the input image. A set of circles are identified based on the set of edges. A subset of circles is selected from the set of circles. The subset of circles is matched to a set of reference circles associated with a reference object. An authentication score is generated for the test object based on the matching of the subset of circles to the set of reference circles.
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
G06V 10/48 - Extraction of image or video features by mapping characteristic values of the pattern into a parameter space, e.g. Hough transformation
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
In examples provided herein, a system in a vehicle comprises a processor and a memory including instructions executable by the processor to aggregate and transmit to a context- aware platform (CAP) diagnostic data for a vehicle; receive from the CAP responsive information based on analysis of the diagnostic data; and cause the responsive information to be audibly provided to a driver of the vehicle.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
6.
SYSTEMS AND METHOD FOR MANAGEMENT OF COMPUTING NODES
In examples provided herein, upon receiving notification of a computational task requested by a package to provide an experience to a user, a remote node management engine identifies computing nodes for performing the computational task and determining available processing resources for each computing node, where a computing node resides at networked wearable devices associated with the user. The remote node management engine further selects one of the computing nodes as a primary controller to distribute portions of the computational task to one or more of the other computing nodes and receive results from performance of the portions of the computational task by the other computing nodes, and provides to the selected computing node information about available processing resources at each computing node.
In one example of the disclosure, identify data indicative of identity of a user of a mobile device is obtained. Route data indicative of a set of routes provided by a travel provider is obtained. Movement data indicative of movement of the mobile device is obtained from the mobile device. The movement data was determined utilizing a geolocational recognition component at the mobile device without reference to infrastructure of the travel provider. A journey taken by the user and a charge for the journey are determined based upon the identity data, the movement data, and the route data. Journey data indicative of the journey and charge data indicative of the charge are provided to the mobile device for presentation.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
In example implementations, dialog keywords are extracted from a dialog of participants as a search query. The dialog keywords represent primary concepts of the dialog. The search query is modified based on a personalized profile of a participant generated from at least a contextual information source regarding the participant other than prior search queries made by the participant. The modified search query is evaluated against an information store to retrieve search results relevant to the modified search query, and the search results output to the participant.
G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
Examples relate to digital context aware (DCA) data collection. In some examples, a DCA start location component is positioned at a first location along a travel route, and a DCA end location component is positioned at a second location along the travel route. In response to using a wireless interface to detect the DCA start location component, data collection of measurements by a sensor are initiated. In response to using the wireless interface to detect the DCA end location component, the data collection by the sensor is halted.
B61L 25/02 - Indicating or recording positions or identities of vehicles or trains
B61L 23/04 - Control, warning or like safety means along the route or between vehicles or trains for monitoring the mechanical state of the route
B61L 3/12 - Devices along the route for controlling devices on the vehicle or train, e.g. to release brake or to operate a warning signal at selected places along the route, e.g. intermittent control controlling electrically using magnetic or electrostatic inductionDevices along the route for controlling devices on the vehicle or train, e.g. to release brake or to operate a warning signal at selected places along the route, e.g. intermittent control controlling electrically using radio waves
G08G 9/00 - Traffic control systems for craft where the kind of craft is irrelevant or unspecified
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
G06V 20/56 - Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
B61L 27/53 - Trackside diagnosis or maintenance, e.g. software upgrades for trackside elements or systems, e.g. trackside supervision of trackside control system conditions
10.
SYSTEMS AND METHODS FOR UNFOLDING DATA ENTRY FORMS FOR BI-DIRECTIONAL LEARNING
Various embodiments of the present technology can include systems, methods, and non-transitory computer readable media configured to receive milestones to define objects and attributes associated with the objects. The objects and the attributes can define an architecture of a system. A first table associated with a first milestone can be provided. The first table can be configured to receive a first set of objects associated with the first milestone. The first set of objects and a corresponding set of attributes for the first set of objects can be received. An indication to advance to a second milestone that follows the first milestone can be received. A second table associated with the second milestone can be provided. The second table can be configured to receive a second set of objects associated with the second milestone.
Systems, methods, and non-transitory computer-readable media can receive a notification of a user request to securely process a first set of data. A time estimate is calculated, wherein the time estimate is indicative of an expected amount of time for a secure data processing application to process the first set of data. An actual utilization time required for a first instance of the secure data processing application to process the first set of data is measured. A determination is made as to whether the secure data processing application may be compromised based on a comparison of the time estimate and the actual utilization time. In various embodiments, a re-cryptor process is used to change the cryptographic keys accessed by the secure data processing application. In various embodiments, a re-credentialer is used to change the database access credentials the secure data processing application used to access the encrypted data.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
12.
Systems and methods for resource utilization control
Various embodiments of the present technology can include systems, methods, and non-transitory computer readable media configured to receive request information associated with a first request. The request information comprises user information associated with a first user. A first usage threshold associated with the first user is determined based on the user information. A determination is made that the first request has exceeded the first usage threshold. The first request is automatically terminated based on the determination that the first request has exceeded the first usage threshold.
Examples of 3D-printed sensing devices for detecting vascular conditions in an animal body are described. A 3D-printed sensing device may comprise a binding layer to attach the 3D-printed sensing device to a part of the animal body. A sensor layer is extruded atop the binding layer. The sensor layer comprises a piezoresistive transducer to generate an electrical signal based on a pulse detected in the part of the animal body. In an example, the electrical signal is a binary signal having a logical high value at an instant of occurrence of the pulse and is agnostic of a strength of the pulse. An amplification module in the sensor layer may amplify the electrical signal and provide the amplified signal to a transmitter unit of the 3D-printed sensing device to transmit the amplified signal to a monitoring device associated with the 3D-printed sensing device.
An example system receives a plurality of event streams. A separate stream rule is applied to each individual event stream to produce a filtered output event stream. The system also applies a correlation rule to the filtered output event streams to produce correlated event results.
Examples associated with relationship preserving projection of digital objects are disclosed. One example includes identifying suitable locations within a physical space for projection of digital objects. The digital objects may be stored in a virtual space. A representation of a first digital object from the virtual space may be projected onto a first suitable location in the physical space and a representation of a second digital object from the virtual space may be projected onto a second suitable location in the physical space. The first suitable location and the second suitable location may preserve a spatial relationship between the first digital object and the second digital object.
Various embodiments of the present technology can include systems, methods, and non-transitory computer readable media configured to receive milestones to define objects and attributes associated with the objects. The objects and the attributes can define an architecture of a system. A first table associated with a first milestone can be provided. The first table can be configured to receive a first set of objects associated with the first milestone. The first set of objects and a corresponding set of attributes for the first set of objects can be received. An indication to advance to a second milestone that follows the first milestone can be received. A second table associated with the second milestone can be provided. The second table can be configured to receive a second set of objects associated with the second milestone.
Various embodiments of the present technology can include systems, methods, and non-transitory computer readable media configured to receive information about a plurality of regions contained within a hierarchy of a computer network environment, wherein the plurality of regions are assigned respective prime numbers. A first prime number assigned to a first region of the plurality of regions is determined. A second prime number assigned to a second region of the plurality of regions, wherein the second prime number is different from the first prime number is determined. A nearest common region in the hierarchy that includes the first region and the second region based on the respective prime numbers is identified. A security policy associated with the nearest common region is determined.
Various embodiments of the present technology can include systems, methods, and non-transitory computer readable media configured to receive information about a plurality of regions contained within a hierarchy of a computer network environment, wherein the plurality of regions are assigned respective prime numbers. A first prime number assigned to a first region of the plurality of regions is determined. A second prime number assigned to a second region of the plurality of regions, wherein the second prime number is different from the first prime number is determined. A nearest common region in the hierarchy that includes the first region and the second region based on the respective prime numbers is identified. A security policy associated with the nearest common region is determined.
Various embodiments of the present technology can include systems, methods, and non-transitory computer readable media configured to receive information about a plurality of regions contained within a hierarchy of a computer network environment, wherein the plurality of regions are assigned respective prime numbers. A first prime number assigned to a first region of the plurality of regions is determined. A second prime number assigned to a second region of the plurality of regions, wherein the second prime number is different from the first prime number is determined. A nearest common region in the hierarchy that includes the first region and the second region based on the respective prime numbers is identified. A security policy associated with the nearest common region is determined.
Examples associated with room capture and projection are disclosed. One example includes an information management module that may maintain information regarding a virtual space and a first digital object within the virtual space. The first digital object may be associated with an artifact in a physical space. A room calibration module may map the virtual space to the physical space using sensors to detect attributes of the physical space. A capture module may record a modification to the artifact to be maintained by the information management module. A projection module may project a representation of a second digital object into the physical space. The representation may be projected based on a signal from the information management module.
Systems, methods, and non-transitory computer-readable media can receive a notification of a user request to securely process a first set of data. A time estimate is calculated, wherein the time estimate is indicative of an expected amount of time for a secure data processing application to process the first set of data. An actual utilization time required for a first instance of the secure data processing application to process the first set of data is measured. A determination is made as to whether the secure data processing application may be compromised based on a comparison of the time estimate and the actual utilization time. In various embodiments, a re-cryptor process is used to change the cryptographic keys accessed by the secure data processing application. In various embodiments, a re-credentialer is used to change the database access credentials the secure data processing application used to access the encrypted data.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
22.
SYSTEMS AND METHODS FOR CONSTRAINED DIRECTED MEDIA SEARCHES
Systems, methods, and non-transitory computer readable media configured to receive a first media item from a search engine. One or more seed data items can be generated from the first media item. Further, a search query can be generated. The search query can include one or more of the seed data items. Subsequently, the search query can be provided to the search engine.
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
23.
SYSTEMS AND METHODS FOR SECURE PROCESSING OF DATA STREAMS HAVING DIFFERING SECURITY LEVEL CLASSIFICATIONS
The disclosed technology can receive a notification of a user request to securely process a first set of data. A time estimate is calculated, wherein the time estimate is indicative of an expected amount of time for a secure data processing application to process the first set of data. An actual utilization time required for a first instance of the secure data processing application to process the first set of data is measured. A determination is made as to whether the secure data processing application may be compromised based on a comparison of the time estimate and the actual utilization time. In various embodiments, a re-cryptor process is used to change the cryptographic keys accessed by the secure data processing application. In various embodiments, a re-credentialer is used to change the database access credentials the secure data processing application used to access the encrypted data.
Examples disclosed herein relate to control of a drone. In one example, aerial movement of the drone is controlled. In the example, it is determined, based on a plurality of devices, whether the drone is within a line-of-sight with at least a respective one of a plurality of humans within a physical proximity to a respective one of a the devices. In the example, the devices are used by the drone to track the humans. In the example, when the drone is determined to lack the line-of-sight, aerial movement of the drone is controlled to move the drone to become within the line-of-sight.
According to examples, an apparatus includes a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to acquire technical characteristics of a client workload, access client policies, determine an infrastructure to implement the client workload based upon the acquired technical characteristics of the client workload, determine, based upon the determined server sizing and the accessed client policies, a recommended hosting provider that is to host the client workload, and output the determined server sizing and the recommended hosting provider.
In some examples, image based target analysis may include performing a search to identify an image, and determining whether a target is present in the image, and image metadata. Image based target analysis may further include performing, in response to a determination that the target is present in the image, based on a relationship of the target to an entity, and the image metadata, a further search to identify another image, and generating, based on the image and/or the other image, a result indicative of further information on the target.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/532 - Query formulation, e.g. graphical querying
G06K 9/62 - Methods or arrangements for recognition using electronic means
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
A system includes a federated marketplace portal to allow a user to browse, order, and manage business services offered by a plurality of cloud marketplaces based at least in part on application programming interface (API) abstractions. The system includes an integration system to transform the API abstractions into product-specific APIs used by the cloud marketplaces and cause the invocation of the product-specific APIs.
A document management computer system can validate a user with validation codes sent through a plurality of communication modes. The validated user may be provided with access to a stored electronic document.
Textual indicators are extracted from an electronic document. A rule for monitoring information technology user behavior is generated from the extracted textual indicators.
G09B 7/077 - Electrically-operated teaching apparatus or devices working with questions and answers of the multiple-choice answer type, i.e. where a given question is provided with a series of answers and a choice has to be made from the answers providing for individual presentation of questions to a plurality of student stations different stations being capable of presenting different questions simultaneously
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G09B 5/02 - Electrically-operated educational appliances with visual presentation of the material to be studied, e.g. using film strip
G09B 7/10 - Electrically-operated teaching apparatus or devices working with questions and answers of the multiple-choice answer type, i.e. where a given question is provided with a series of answers and a choice has to be made from the answers wherein a set of answers is common to a plurality of questions
G09B 5/12 - Electrically-operated educational appliances providing for individual presentation of information to a plurality of student stations different stations being capable of presenting different information simultaneously
G09B 19/00 - Teaching not covered by other main groups of this subclass
Localization from an access point and mobile device can include receiving information from a mobile device and initiating a location package based on information received from the mobile device to select a location server. Localization information can be requested information from the location server, where the localization information includes localization information from at least one access point and information received from the mobile device. Based on the localization information from the location server and information from the mobile device, at least one of a plurality of packages to be initiated can be determined.
Example implementations relate to a fiber-shaped device for transmitting a distress signal to a remote computer. The fiber-shaped device includes a sensor, an analysis module that determines if a sensor signal from the sensor includes a trigger signal, and a wireless communication module to transmit a distress signal to a remote computer when the sensor signal includes the trigger signal.
G08G 1/08 - Controlling traffic signals according to detected number or speed of vehicles
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 4/02 - Services making use of location information
An example system includes system circuitry that includes an action database. The action database may include an action entry that stores an action for use by a call agent as part of a diagnostic process and an index value associated with the action. The index value may be indicative of a particular state of the diagnostic process. The system circuitry may obtain a state value indicative of a current state of the diagnostic process. The system circuitry may identify the action entry by matching the state value for the diagnostic process to the index value of the action entry. Then, the system circuitry may retrieve the action of the action entry for use in the diagnostic process.
Example implementations relate to an implantable device that can accommodate a vessel of a living body and can detect light transmitted across the vessel. The implantable device transmits a wireless transmitter signal corresponding to the intensity of the detected light. The intensity of the detected light correlates to patency of the vessel.
In one example in accordance with the present disclosure, a method for schedule creation may include interpreting a set of temporal constraints corresponding to a predetermined time period for a user. The set of temporal constraints may include a constraint defining a minimum period of uninterrupted time for a primary job responsibility of the user. The method may also include generating a set of blocks based on the set of temporal constraints. Each block in the set of blocks corresponds to an event to be scheduled during the predetermined time period and each block has a weight. The method may also include creating a schedule including each block in the set of blocks. The schedule may include the minimum period of uninterrupted time for a primary job responsibility of the user.
An example radio frequency identification card monitor is disclosed herein. An example radio frequency identification card monitor includes an example detector to identify radio frequency identification cards, a card tracker to track the radio frequency identification card with a proximity of the apparatus, and an interface to provide alerts when the radio frequency identification cards are not within the proximity.
G06K 19/00 - Record carriers for use with machines and with at least a part designed to carry digital markings
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
Seismic based fracking fluid disposal can in an example embodiment include selecting a first disposal site of a plurality of disposal sites to receive fracking fluid from a fracking site; measuring, via a seismic sensor, seismic waves associated with the first disposal site; and assigning at least some of the fracking fluid from the first disposal site to a second disposal site of the plurality of disposal sites based on the measured seismic waves.
E21B 49/00 - Testing the nature of borehole wallsFormation testingMethods or apparatus for obtaining samples of soil or well fluids, specially adapted to earth drilling or wells
In an example implementation, a converted layout design of a user interface of an application may be generated from a layout design of the user interface and a layout design configuration. The converted layout design may correspond to a form factor. A screenshot of the user interface of the application may be captured on a device with the display resolution. In addition, the converted layout design may be compared with the screenshot.
G06F 9/451 - Execution arrangements for user interfaces
G06F 9/44 - Arrangements for executing specific programs
G06F 8/38 - Creation or generation of source code for implementing user interfaces
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 17/22 - Manipulating or registering by use of codes, e.g. in sequence of text characters
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
38.
Assigning a document to partial membership in communities
Example implementations relate to assigning a document to partial membership in communities. In example implementations, a detected feature of a document may be compared with a training pattern. Based on the comparison, the document may be assigned partial membership in a first community and partial membership in a second community.
Example implementations relate to collecting data to generate specifications for an orthosis. In example implementations, data may be collected from a plurality of pressure sensors. Histograms may be generated that characterize collected data. Specifications for an orthosis may be generated based on the histograms.
G01L 7/00 - Measuring the steady or quasi-steady pressure of a fluid or a fluent solid material by mechanical or fluid pressure-sensitive elements
A61B 5/00 - Measuring for diagnostic purposes Identification of persons
A43B 17/00 - Insoles for insertion, e.g. footbeds or inlays, for attachment to the shoe after the upper has been joined
A61F 5/01 - Orthopaedic devices, e.g. long-term immobilising or pressure directing devices for treating broken or deformed bones such as splints, casts or braces
B29C 64/386 - Data acquisition or data processing for additive manufacturing
B29C 64/112 - Processes of additive manufacturing using only liquids or viscous materials, e.g. depositing a continuous bead of viscous material using individual droplets, e.g. from jetting heads
B29C 64/20 - Apparatus for additive manufacturingDetails thereof or accessories therefor
A tangible, machine readable storage medium stores instructions and implements a method when the instructions are executed by a processor. A source file is received by a gateway engine. The source file is a binary file. The source file is portioned into multiple parts by a breakdown engine. The multiple parts are transferred by a reliable transfer engine using a single port according to a messaging protocol to transfer messages reliably between nodes in the presence of any of software failures, component failures, system failures, or network failures. The multiple parts are reassembled into a copy of the source file by a reassembly engine.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 17/30 - Information retrieval; Database structures therefor
H04L 12/24 - Arrangements for maintenance or administration
41.
Identify server cluster by applying social group analysis
Examples of identifying a cluster of servers and generating a graphical representation of the cluster of servers are disclosed. In one example implementation according to aspects of the present disclosure, a cluster of servers may be identified based on applying a social group analysis to network traffic related to a plurality of interconnected servers. A graphical representation of the identified cluster of servers may be generated.
Example implementations relate to processing of retail offerings and retail rules for implementation in a retail appliance. For example, retail rules and retail offerings may be translated into a retail offer domain-specific language (DSL). The translated retail rules and retail offerings may be expressed as constraints according to a satisfiability modulo theory (SMT) language. A hardware-optimized description of the translated retail rules and retail offerings may be generated that satisfy the constraints, and computer-executable instructions may be generated, based on the hardware-optimized description.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/02 - Reservations, e.g. for tickets, services or events
An example system receives a plurality of event streams. A separate stream rule is applied to each individual event stream to produce a filtered output event stream. The system also applies a correlation rule to the filtered output event streams to produce correlated event results.
An example system for creating an active directory topology may determine whether an active directory site corresponding to a site name stored in a data input list exists and create, in response to a determination that the active directory site does not exist, the active directory site. The system may also determine whether a subnet corresponding to a subnet name stored in the data input list exists and create, in response to a determination that the subnet does not exist, the subnet.
According to an example, a system for managing a fluid condition in a pipe includes a controller to receive temperatures of the pipe detected by the temperature sensor over a period of time. The controller may determine, based upon the temperatures of the pipe over the period of time, a temperature profile of the pipe and may determine that the temperature profile of the pipe indicates that a freezing onset event has occurred. The freezing onset event may include a transition from a drop in temperature to an increase in temperature, in which the temperature during the transition is below a freezing point temperature of a fluid contained in the pipe. The controller may further trigger at least one of an alarm and an activation of a first freezing prevention device in response to the determination that the freezing onset event has occurred.
An example system can receive information regarding an object, and provide navigation to the object. The object can be identified based on the received information. Information regarding an operating parameter about the object can be received, and whether the operating parameter of the object is within a predefined operating range based on the identity of the object and the received operating parameter information can be determined and communicated.
Event clusters can in an example embodiment include converting a description of an event associated with a configuration item (CI) to a standardized description, classifying the event based on a comparison of the standardized description of the event with a standardized description of a prior event included in an existing event cluster, and assigning the classified event to an event cluster.
An example radial histogram matching system may generate a target radial histogram by identifying pixels in an input digital image that are determined to be on, traversing each of the pixels in the input digital image one time to determine how many of the pixels that are turned on are contained in each sector of a circle and assigning to each elements of the target radial histogram the number of on pixels in that element. The system may also compare the target radial histogram to each of an initial and a sequence of rotated radial histograms to determine a match score for each of the comparisons, and identify an offset rotation between a baseline pattern digital image and the input digital image based on the match scores.
Example implementations relate to recorded user actions. For example, user actions in a plurality of different environments are recorded, and a user-activatable element is associated with the recorded user actions. The user-activatable element is caused to be presented.
In example implementations, an image is identified. The image may be received. A radial histogram of each layer of the image is generated. The radial histogram of each layer of the image may be compared to at least one of a plurality of pre-generated radial histograms of a respective layer of a plurality of layers of a known image, wherein the plurality of layers is compressed into a consolidated set of bytes and the comparing is performed in parallel via the consolidate set of bytes. The image may be identified as a match of the known image when a match percentage of the radial histogram of the each layer of the image compared to the at least one of the plurality of pre-generated radial histograms of the respective layer of the plurality of layers of the known image is above a match threshold.
In one implementation, a system for topic recommendation includes an information engine receives topic information relating to a number of events. In addition, the system includes an analysis engine performs a text analysis on the received topic information. In addition, the system includes an index engine indexes the topic information based on the text analysis. In addition, the system includes a display engine compares a search term to the indexed topic information and displays a number of topics on a display of a mobile device, wherein the number of topics are displayed in a size that corresponds to a quantity of topic information associated with each of the number of topics.
An example radio frequency identification capsule is disclosed herein. An example radio frequency identification capsule includes a substrate layer; a radio frequency identification layer on the substrate layer, the radio frequency identification layer including a radio frequency identification tag formed from nanoparticle ink; and a protective layer surrounding the radio frequency identification layer.
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
An example waypoint navigator method includes identifying a local waypoint using image recognition on an image of the local waypoint displayed on a mobile device. The example method also includes overlaying on the image of the local waypoint, a visual direction to the remote waypoint based on identifying the local waypoint, the visual direction based on context. The example method also includes updating the visual direction based on changes in the context.
Examples relate to digital context aware (DCA) data collection. In some examples, a DCA start location component is positioned at a first location along a travel route, and a DCA end location component is positioned at a second location along the travel route. In response to using a wireless interface to detect the DCA start location component, data collection of measurements by a sensor are initiated. In response to using the wireless interface to detect the DCA end location component, the data collection by the sensor is halted.
A barcode device including a barcode scanner to scan barcode labels and provide raw barcode data signals, a processor to receive and process the raw barcode data signals to provide processed barcode data signals and compare at least two of the processed barcode data signals, an indicator to notify a user of barcode data information based on the receipt of barcode data and comparison performed by the processor, and a housing to contain the barcode scanner, the processor, and the indicator, the housing comprising a first end, an opposing second end, and a body extending between the first end and the second end, the housing configured to couple to a back of a glove.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 17/00 - Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups , e.g. automatic card files incorporating conveying and reading operations
A system includes a federated marketplace portal to allow a user to browse, order, and manage business services offered by a plurality of cloud marketplaces based at least in part on application programming interface (API) abstractions. The system includes an integration system to transform the API abstractions into product-specific APIs used by the cloud marketplaces and cause the invocation of the product-specific APIs.
According to an example, correlation based instruments discovery may include extracting text from content identified as being related to instruments for implementing machine readable instructions based products. An identified content object graph model having subjects and features may be generated. A product specifications object graph model having subjects and features may be generated based upon product specifications related to a machine readable instructions based product that is to be implemented. The subjects and features in the identified content object graph model that correspond to the subjects and features in the product specifications object graph model may be correlated and scored. Subjects and features from the identified content object graph model that include respective highest scores for matching subjects and features from the product specifications object graph model may be selected to identify a subset of the content that is related to instruments for implementing the machine readable instructions based product.
In example implementations, a method and apparatus are provided. The method includes identifying portions of a code for a web application on a first browser that are incompatible with a different browser. The portions of the code that are incompatible are adjusted to include a compatible code for the different browser. A match of the different browser and the first browser is verified when executing the web application with the portions of code that are adjusted to include the compatible code. The adjusted code for the web application for the different browser is generated.
Examples of systems and methods for device-type content management are described herein. In an example, at least one of a community policy and a community-device type policy may be generated. The community policy may be generated for a community defined for an enterprise and may be enforced on a plurality of user devices registered with the community. Further, the device-community policy may be enforced on a user device, from among the plurality of user devices, based on a device-type of the user device. The device-community policy may indicate a management service to be used to realize the community policy. Further, a management service agent (MS agent) may be provided to the user device, based on the management service indicated by the device-community policy. The MS agent may provide for managing enterprise content on the user device as indicated by the community policy.
Examples associated with tagged content distribution are disclosed. One example includes a network generation module that builds an implicit network of user relationships based on explicit interactions between users of an enterprise communication network. The example includes a content sharing module to detect a content tag associated with a tagged artifact distributed via the enterprise communication network. The content sharing module also distributes the tagged artifact to users of the enterprise communication network that have expressed interest in the content tag. The example also includes a content recommendation module to recommend the tagged artifact to users of enterprise communication network based on, for example, user relationships, content tags with which users have expressed interest, and so forth.
Examples disclosed herein relate to control of a drone. In one example, aerial movement of the drone is controlled. In the example, it is determined, based on a plurality of devices, whether the drone is within a line- of-sight with at least a respective one of a plurality of humans within a physical proximity to a respective one of a the devices.. In the example, the devices are used by the drone to track the humans. In the example, when the drone is determined to lack the !ine-of-sight, aerial movement of the drone is controlled to move the drone to become within the line-of-sight.
B64C 39/02 - Aircraft not otherwise provided for characterised by special use
B64D 43/00 - Arrangements or adaptations of instruments
B64D 45/00 - Aircraft indicators or protectors not otherwise provided for
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
Comfort-based garment management can include establishing a sensor output threshold for a garment based on comfort data, receiving sensor output data from a number of sensors integrated with the garment, comparing the sensor output data with the sensor output threshold, and sending a notification to a party associated with the garment in response to the sensor output data crossing the sensor output threshold.
Example implementations relate to a traffic management system. For example, the traffic management system may receive data from a plurality of connected vehicles. The traffic management system may determine the relative positions of non-connected vehicles to the connected vehicles and may cluster connected vehicles and non-connected vehicles into a flock. The traffic management system may determine a flock traffic pattern and a nature of the flock traffic pattern, based on data received from the connected vehicles.
Monitoring an object to prevent an occurrence of an issue includes monitoring an object based on a number of parameters, categorizing messages of the object into categories while monitoring for a recurrence of a pattern of messages, detecting a potential issue with the object based on the recurrence of the pattern of messages, and alerting an operations manager agent of the potential issue to prevent an occurrence of the issue.
In some examples, an electronic device includes sensor circuitry and token circuitry. The sensor circuitry may capture sensor data and the contract token circuitry may generate a contract acceptance token including an acceptance indication and sensor data captured by the sensor circuitry. The token circuitry may send the contract acceptance token including the sensor data to a different electronic device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Implementations of the present disclosure provide a method and system for surface wear determination. According to one implementation, an image of an object surface is captured via an input device. A surface pattern is detected from the captured image and object data associated with the object surface is identified based on the detected pattern. Additionally, a surface wear value of the object surface is determined based on the object data and surface pattern.
In one example of the disclosure, identity data indicative of identity of a user of a mobile device is obtained. Route data indicative of a set of routes provided by a travel provider is obtained. Movement data indicative of movement of the mobile device is obtained from the mobile device. The movement data was determined utilizing a geolocational recognition component at the mobile device without reference to infrastructure of the travel provider. A journey taken by the user and a charge for the journey are determined based upon the identity data, the movement data, and the route data. Journey data indicative of the journey and charge data indicative of the charge are provided to the mobile device for presentation.
In examples provided herein, a method for providing a digital context-aware checklist includes calling a geoboundary package to determine whether the user is within a geoboundary of a first location of a first schedule item on a schedule for the user. The method notifies the user of arrival upon determining the user's networked device is within the geoboundary of the first location and calls a checklist package to provide a checklist of items to be performed at the first location. A level of granularity of the checklist items is based on an experience level of the user. Further, upon request from the user via the user's networked device for information pertaining to one of the items of the checklist, the method calls a supporting information package to provide supporting information to the user. The supporting information is selected based on the experience level of the user.
Example implementations relate to a communication association model. For example, a computing device may include a processor. The processor may access a first and a second communication, the second communication originating based on the first communication. The processor may analyze the first communication to obtain first data associated with the first communication and analyze the second communication to obtain second data associated with the second communication, where the first data includes data associated with a first sender and a first recipient of the first communication and the second data includes data associated with a second sender and a second recipient of the second communication. The processor may create an association between the first data and the second data and may generate a model specifying the associated based on the first data and the second data, where the model indicates an impact associated with the first communication and the second communication.
Example implementations relate to activating an alarm if a living being is present in an enclosed space having an ambient temperature outside a safe temperature range. In example implementations, it may be determined whether a living being has been present in an enclosed space, and an ambient temperature of the enclosed space has been outside a safe temperature range, for a threshold amount of time. An alarm may be activated if the living being has been present in the enclosed space, and the ambient temperature of the enclosed space has been outside the safe temperature range, for the threshold amount of time.
G08B 13/18 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength
G08B 5/38 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission using visible light sources using flashing light
G08B 7/00 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups
71.
PERSONALIZED PROFILE-MODIFIED SEARCH FOR DIALOG CONCEPTS
In example implementations, dialog keywords are extracted from a dialog of participants as a search query. The dialog keywords represent primary concepts of the dialog. The search query is modified based on a personalized profile of a participant generated from at least a contextual information source regarding the participant other than prior search queries made by the participant. The modified search query is evaluated against an information store to retrieve search results relevant to the modified search query, and the search results output to the participant.
In example implementations, a personalized profile of a user is generated from at least a contextual information source regarding the user other than prior search queries from the user. An information store is searched using a search query that is modified based on the personalized profile of the user that has been generated.
A portable device includes a communication interface to communicate with a consumer endpoint device, and a reader to receive a payment credential of a payment card detected by the portable device, to support a virtual point-of-sale (POS), card present online transaction between the consumer endpoint device and a merchant server. The portable device can establish a secure session with a host system using a cryptographic key, and send an authorization request comprising the payment credential in the secure session with the host system, the authorization request seeking authorization of payment for the online transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
In example implementations, an amount of ambient light in a real world image is measured. An analysis of the virual image is performed and a user preference for the virtual image is determined. A brightness level of the real world image is modulated based upon the amount of ambient light in the real world image that is measured. The virtual image is adjusted to optimize an appearance of the virtual image on a near eye display that is overlaid on the real world image based upon the analysis of the virtual image, the real world image that is modulated and the user preference for the virtual image.
Examples associated with virtual space calibration are disclosed. One example includes calibrating a first physical space to a virtual space in response to a first signal received from a first device in the first physical space. A second physical space is calibrated to the virtual space in response to a second signal received from a second device in the second physical space. The second device is controlled to project, into the second physical space, a representation of a first artifact from the first physical space. The representation of the first artifact is projected into the second physical space based on the calibration of the first physical space to the virtual space, and based on the calibration of the second physical space to the virtual space.
Examples associated with room capture and projection are disclosed. One example includes an information management module that may maintain information regarding a virtual space and a first digital object within the virtual space. The first digital object may be associated with an artifact in a physical space. A room calibration module may map the virtual space to the physical space using sensors to detect attributes of the physical space. A capture module may record a modification to the artifact to be maintained by the information management module. A projection module may project a representation of a second digital object into the physical space. The representation may be projected based on a signal from the information management module.
Examples associated with relationship preserving projection of digital objects are disclosed. One example includes identifying suitable locations within a physical space for projection of digital objects. The digital objects may be stored in a virtual space. A representation of a first digital object from the virtual space may be projected onto a first suitable location in the physical space and a representation of a second digital object from the virtual space may be projected onto a second suitable location in the physical space. The first suitable location and the second suitable location may preserve a spatial relationship between the first digital object and the second digital object.
In examples provided herein, a method comprises calling a demographics package to analyze data associated with electronic toll tags used on a toll road along which a digital billboard is positioned to determine time-dependent demographics of drivers of vehicles driven on the toll road. The method also includes calling an advertisement selection package to identify an advertisement to be displayed on the digital billboard, where the advertisement to be displayed is based on the time-dependent demographics of the toll road. Further, the method comprises transmitting the advertisement to be displayed to the digital billboard.
In examples provided herein, a system in a vehicle comprises a processor and a memory including instructions executable by the processor to aggregate and transmit to a context-aware platform (CAP) diagnostic data for a vehicle; receive from the CAP responsive information based on analysis of the diagnostic data; and cause the responsive information to be audibly provided to a driver of the vehicle.
B60W 50/02 - Ensuring safety in case of control system failures, e.g. by diagnosing, circumventing or fixing failures
B60W 50/04 - Monitoring the functioning of the control system
B60R 16/02 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric
One example implementation includes an extractor controller to control extraction of blood from a user; a detection fluid manager to mix the blood and a detection fluid to form magnetized test particles, the detection fluid comprising dye coated magnetic particles; a particle flow controller to remove magnetized test particles from the mixed blood and detection fluid; and an allergen detector to detect exposure to an allergen based on a color of the test particles.
A61B 5/1459 - Measuring characteristics of blood in vivo, e.g. gas concentration or pH-value using optical sensors, e.g. spectral photometrical oximeters invasive, e.g. introduced into the body by a catheter
A61B 5/157 - Devices for taking samples of blood characterised by integrated means for measuring characteristics of blood
G01N 33/52 - Use of compounds or compositions for colorimetric, spectrophotometric or fluorometric investigation, e.g. use of reagent paper
G06Q 50/22 - Social work or social welfare, e.g. community support activities or counselling services
Examples disclosed herein relate to determining a power difference in sensor signals. Examples include a first sensor to transmit a first ultrasonic signal into a pregnant woman and to receive a second ultrasonic signal; and a second sensor to transmit a third ultrasonic signal into the pregnant woman and to receive a fourth ultrasonic signal. A processing resource determines a first power difference of the first sensor according to a difference between respective powers of the first ultrasonic signal and the second ultrasonic signal and is to determine a second power difference of the second sensor according to a difference between respective power of the third ultrasonic signal and the fourth ultrasonic signal. In examples, the processing resource is to determine a relative location of the fetal heart according to a comparison of the first power difference and the second power difference.
Example implementations relate to specifying models of an architectural type. In an example implementation, a domain model of the architectural type is captured and a meta-language for the architectural type is defined. A platform-independent representation of the domain model may be exported. The platform-independent representation of the domain model may be transformed into a platform-specific representation of the domain model that is executable on a targeted runtime platform.
Example implementations relate to specifying a model-driven architecture for user-centered design. In an example implementation, a meta-language for the user-centered design may be defined, and a user-experience for a specified domain may be captured. A platform-independent representation of the user-centered design may be exported, and the platform-independent representation may be transformed into a platform-specific representation of the user-centered design that is executable on a targeted runtime platform.
Example implementations relate to a fiber-shaped device for transmitting a distress signal to a remote computer. The fiber-shaped device includes a sensor, an analysis module that determines if a sensor signal from the sensor includes a trigger signal, and a wireless communication module to transmit a distress signal to a remote computer when the sensor signal includes the trigger signal.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
Example implementations relate to an implantable device that can accommodate a vessel of a living body and can detect light transmitted across the vessel. The implantable device transmits a wireless transmitter signal corresponding to the intensity of the detected light. The intensity of the detected light correlates to patency of the vessel.
An example system includes system circuitry that includes an action database. The action database may include an action entry that stores an action for use by a call agent as part of a diagnostic process and an index value associated with the action. The index value may be indicative of a particular state of the diagnostic process. The system circuitry may obtain a state value indicative of a current state of the diagnostic process. The system circuitry may identify the action entry by matching the state value for the diagnostic process to the index value of the action entry. Then, the system circuitry may retrieve the action of the action entry for use in the diagnostic process.
Example implementations relate to receiving vibration notifications from vibration sensors. In example implementations, a subset of a plurality of vibration sensors from which vibration notifications are expected may be identified based on a position of a train along a track. The plurality of vibration sensors may be arranged in a predetermined order on the track. Whether vibration notifications have not been received from consecutive, with respect to the predetermined order, vibration sensors in the subset may be determined.
B61L 25/02 - Indicating or recording positions or identities of vehicles or trains
G01H 11/08 - Measuring mechanical vibrations or ultrasonic, sonic or infrasonic waves by detecting changes in electric or magnetic properties by electric means using piezoelectric devices
Examples relate to detecting potential grey market activities. The examples disclosed herein enable storing, in a product database, a plurality of product identifiers. At least one of the plurality of product identifiers may be associated with a promotion that is intended for at least one end customer. The examples disclosed herein enable triggering a detection of a potential grey market activity in response to receiving customer registration information from a first end customer. The customer registration information may comprise a first product identifier. The detection of the potential grey market activity comprises identifying the first product identifier in the product database and the promotion associated with the first product identifier, and determining whether the first end customer is the end customer for which the promotion associated with the first product identifier is intended.
G06Q 30/06 - Buying, selling or leasing transactions
89.
Presenting relevant content for conversational data gathered from real time communications at a meeting based on contextual data associated with meeting participants
Identifying relevant content for data gathered from real time communications includes obtaining conversational data from a real time communication, identifying contextual data with at least one contextual data source relevant to the real time communication, and inferring a meaning of the conversational data based on the contextual data.
An example method for determining an influence score of a social media blog domain in accordance with aspects of the present disclosure includes receiving data regarding asocial media blog domain based on relevancy to a plurality of keywords, extracting values from the data for a set of categories of metrics for the social media blog domain, assigning a weight to each metric, and calculating an influence score for the social media blog domain based on the weight of the extracted values for each social media profile. The set of categories comprises social engagement, activity, social media page influence and social media blog domain influence.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
91.
Virtual mobile phone interface system and method thereof
Examples of the present invention disclose a virtual mobile phone interface system and method thereof. According to one example, a virtual phone host server collects user phone data and phone interface information from a virtual mobile phone application running on a mobile phone device. Furthermore, a mobile phone emulator is activated on a web browser interface associated with the client device based on the phone interface information and a phone access request received from a user operating a client device.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
Presenting data in a scalable format includes obtaining input from multiple sensors, grouping a subset of the multiple sensors based on similar parameter values, and allocating a section of a display screen to the subset based on a number of the multiple sensors in the subset.
A system for displaying a dashboard display in a vehicle includes a vehicle data bus interface for communicating with vehicle subsystems of a vehicle management system, a dashboard display module, and a dashboard store for storing a dashboard display definition. In one example, the dashboard display module obtains from the vehicle bus information regarding which of the plurality of vehicle subsystems are enabled, and transmits the information regarding which of the plurality of vehicle subsystems are enabled to a device external to the vehicle management system.
B60R 1/00 - Optical viewing arrangementsReal-time viewing arrangements for drivers or passengers using optical image capturing systems, e.g. cameras or video systems specially adapted for use in or on vehicles
B60K 35/00 - Instruments specially adapted for vehiclesArrangement of instruments in or on vehicles
94.
Determining a remedial action for a motorized vehicle based on sensed vibration
An apparatus that includes a vibration sensor and a circuit. The vibration sensor provides an indication of vibration sensed in a motorized vehicle. The circuit determines a remedial action to be taken for the motorized vehicle based at least in part on the sensed vibration.
G01H 1/00 - Measuring vibrations in solids by using direct conduction to the detector
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
Example embodiments relate to providing mobile augmented reality for an enclosed area. In example embodiments, controller device receives a fixed video stream from a fixed camera and a mobile video stream of a current field of view of a mobile user device. The mobile user device comprises a reality augmentation module to project information on the current field of view. Further, the controller device includes a tracking module to identify a position and orientation of a mobile user of the mobile user device based on image processing of the fixed video stream and a fuzzy map module to use a fuzzy map of the enclosed area and the position and orientation of the mobile user to identify items of interest in the current field of view of the mobile user device, where the fuzzy map is generated based on a floor plan of the enclosed area.
G06T 19/00 - Manipulating 3D models or images for computer graphics
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06F 3/0487 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
96.
Federated social media analysis system and method thereof
Embodiments of the present invention disclose a system and method for federated social media analysis. According to one embodiment, aggregating social data from a plurality of social media sources is aggregated and stored in a federated social media database. The aggregated social data is then analyzed to determine content correlations. Furthermore, an application interface is provided for accessing the content correlations associated with the aggregated social media data.
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
A barcode device including a barcode scanner to scan barcode labels and provide raw barcode data signals, a processor to receive and process the raw barcode data signals to provide processed barcode data signals and compare at least two of the processed barcode data signals, an indicator to notify a user of barcode data information based on the receipt of barcode data and comparison performed by the processor, and a housing to contain the barcode scanner, the processor, and the indicator, the housing comprising a first end, an opposing second end, and a body extending between the first end and the second end, the housing configured to couple to a back of a glove.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 17/00 - Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups , e.g. automatic card files incorporating conveying and reading operations
In one example, a product intelligence engine for visualizing matching and non-matching ones of asynchronously-modifiable functional parts, physical parts, and virtual parts of a variant of a product.
A method for analysis of problems is described, comprising receiving values for a plurality of input parameters specifying a problem, analyzing the values of the plurality of input parameters with a fuzzy expert system thereby calculating a fuzzy result, including a value of a linguistic variable and a crisp value, and determining a priority of the problem, wherein the priority is determined based on the value of the linguistic variable and the crisp value of the fuzzy result. Furthermore, a corresponding problem analysis system is provided.
A tangible, machine readable storage medium stores instructions and implements a method when the instructions are executed by a processor. A source file is received by a gateway engine. The source file is a binary file. The source file is portioned into multiple parts by a breakdown engine. The multiple parts are transferred by a reliable transfer engine using a single port according to a messaging protocol to transfer messages reliably between nodes in the presence of any of software failures, component failures, system failures, or network failures. The multiple parts are reassembled into a copy of the source file by a reassembly engine.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/24 - Arrangements for maintenance or administration
G06F 17/30 - Information retrieval; Database structures therefor