An invention is disclosed for processes, apparatuses, devices, articles, structures, supports and systems for setting of floral items. In particular, embodiments of the present invention provide improved processes, methods, apparatuses, devices, articles, structures, supports, systems, and means for coupling one or more floral items or elements with or via one or more holders, bases, containers, receptacles, or artifacts, among other benefits and advantages. For instance, an embodiment may comprise a three-dimensional shape, one or more ridges, and another shape. The shape may comprise an empty space, which is adjacent to one or more surfaces associated with the shape. The other shape may comprise a cross section, where the one or more ridges are on the one or more surfaces, at least a portion of the empty space is adjacent to the one or more ridges, and at least a portion of the other shape is in contact with at least a portion of the one or more ridges.
An invention is disclosed for apparatuses, articles, structures, and supports for faux or artificial floral arrangements. Embodiments of such an apparatus, article, structure and support would provide, among other benefits and advantages, a more reliable, adaptable and extensible support for elaborate and extensive arrangements of faux floral artifacts over an extended area in a three-dimensional manner. In addition, faux floral products that incorporate or are otherwise equipped with the invention would become more environmental friendly and cost effective, and easier to manufacture and transport than the current approaches in the art aimed for the same goals or benefits.
An invention is disclosed for systems, methods, processes, and products of providing computing and online services. An embodiment of such a system, method, process, or product, among other things, may provide a more reliable, accurate, or otherwise effective way of determining and presenting relevant information to users, consumers, and the like.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
An invention is disclosed for systems, methods, processes, and products of providing information to users based on their relationships with other users. Such a system, method, process, or product provides a more reliable, accurate, or otherwise effective way of determining and presenting relevant information to users, consumers, and the like.
G06F 16/2457 - Query processing with adaptation to user needs
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
An invention is disclosed for systems, methods, processes, and products, including but not limited to, one that provides for user communication and interaction with as well as access to resources available on or via a computing device. An embodiment of the invention includes providing a digital resource gathering and dissemination system, method, or process that can accommodate digital resources of interest for heterogeneous groups and communities of online users for the same topic, demographic, or some other categories as provided by a particular classification scheme. Such a system, method, or process also provides a more reliable or otherwise representative selection of digital resources of interest to the population as a whole.
Privacy and restricted access are provided for functions, applications, and services on a computing device. An area accessible to a user interface is provided. A request from a user is accepted, the request for associating with the area with one or more available functions. The one or more functions are then associated with the area, and are made invisible. Another request from the user is accepted, the other request for gaining access to the area. Authentication against the user is requested. Access to the one or more functions is granted if the authentication is successful. According to another embodiment, an authorized user may send and receive messages via another device that belongs to another user based on identification of the user by the other user.
An invention for providing privacy and restricted access to functions available on a computing device. According to one embodiment, an area accessible to a user interface on a computing device is provided. A request from a user of the device is accepted, the request for associating with the area one or more functions available on the device. The one or more functions are then associated with the area, and the one or more functions are made invisible. Another request from the user is accepted, the other request for gaining access to the area. Authentication against the user is requested. Access to the one or more functions is granted if the authentication is successful, and access to the one or more functions is not granted if the authentication is not successful.
An invention is disclosed for providing a digital resource gathering and dissemination system, method, or process that can accommodate digital resources of interest for heterogeneous groups and communities of online users for the same topic, demographic, or some other categories as provided by a particular classification scheme. Such a system, method, or process also provides a more reliable or otherwise representative selection of digital resources of interest to the population as a whole.
Methods and systems for automated retrieval of content embedded in or referred to in a message received in a user account are provided. A UCM and/or a UCR may access a user account and retrieve a message from the account. The message may be then analyzed to extract information related to the content that may be included in the message. The content associated with the extracted information is accessed and retrieved. The retrieved content is presented to the user.