Patent application number | Description | Published |
20120324027 | Building a Social Graph with Sharing Activity Between Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. | 12-20-2012 |
20140129349 | Building a Social Graph with Sharing Activity Between Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. | 05-08-2014 |
20140129660 | Building a Social Graph with Sharing Activity Between Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. | 05-08-2014 |
20140257982 | Building a Social Graph Using Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. | 09-11-2014 |
20150046566 | Building a Social Graph Using Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. Building of the social graph can include creating an edge in the social graph that is representative of a particular category type. | 02-12-2015 |
20150058137 | Building a Social Graph Using Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. | 02-26-2015 |
20150066663 | Building a Social Graph Using Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. Building of the social graph can include creating an edge in the social graph that is representative of a particular category type. | 03-05-2015 |
20150066912 | Building a Social Graph Using Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. Building of the social graph can include creating an edge in the social graph that is representative of a particular category type. | 03-05-2015 |
20150186523 | Building a Social Graph Using Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. Building of the social graph can include creating an edge in the social graph that is representative of a particular category type. | 07-02-2015 |
Patent application number | Description | Published |
20140304243 | METHOD AND SYSTEM FOR MANAGING AND SECURING SUBSETS OF DATA IN A LARGE DISTRIBUTED DATA STORE - A system groups multiple entities in a large distributed data store (DDS), such as directories and files, into a subset called a domain. The domain is treated as a unit for defining policies to detect and treat sensitive data. Sensitive data can be defined by enterprise or industry. Treatment of sensitive data may include quarantining, masking, and encrypting, of the data or the entity containing the data. Data in a domain can be copied as a unit, with or without the same structure, and with transformations such as masking or encryption, into parts of the same DDS or to a different DDS. Domains can be the unit of access control for organizations, and assigned tags useful for identifying their purpose, ownership, location, or other characteristics. Policies and operations, assigned at the domain level, may vary from domain to domain, but within a domain are uniform, except for specific exclusions. | 10-09-2014 |
20150026823 | METHOD AND SYSTEM FOR ENTITLEMENT SETTING, MAPPING, AND MONITORING IN BIG DATA STORES - A method and system for securing sensitive data content in big data stores is provided. In an example method, entities within the big data store that contain sensitive data are identified. Then, users who have entitlement to access these sensitive entities are identified, along with their level of entitlement. Access controls are then set, based on which users can operate on the sensitive entities. Access or attempts to access these entities is monitored on an ongoing basis. An example system maps entitlement to entities within the big data store that contain sensitive content, to monitor access to these entities and to set access controls for users accessing the big data store. | 01-22-2015 |
Patent application number | Description | Published |
20140032738 | METHOD, APPARATUS AND SYSTEM FOR ESTIMATING SUBSCRIPTION HEADROOM FOR A STORAGE POOL - Techniques and mechanisms for determining that subscription headroom is available for a storage pool. In an embodiment, the storage pool is classified based on a current subscription level for the storage pool and respective levels of one or more metrics for the storage pool. A signal is generated in response to a storage pool classification indicating availability of subscription headroom. In another embodiment, a target subscription level is determined for generating the signal, where the target subscription level is based on the current subscription level, a first metric of the one or more metrics, and a high utilization threshold corresponding to the first metric. | 01-30-2014 |
20140055339 | ADAPTIVE VISUAL OUTPUT BASED ON MOTION COMPENSATION OF A MOBILE DEVICE - Systems, storage medium, and methods associated with motion compensation of visual output on a mobile device are disclosed herein. In embodiments, a storage medium may have instructions to enable the mobile device to acquire data associated with motion of an environment in which the mobile device may be situated. The instructions may also enable the mobile device to calculate motion compensation for at least a portion of visual output of an application of the mobile device. The instruction may enable the mobile device to calculate motion compensation based at least in part on the data associated with motion, for use by the application to adapt at least the portion of visual output of the application. Other embodiments may be disclosed or claimed. | 02-27-2014 |
20140057675 | ADAPTIVE VISUAL OUTPUT BASED ON CHANGE IN DISTANCE OF A MOBILE DEVICE TO A USER - Systems, storage medium, and methods associated with adaptive visual output on a mobile device are disclosed herein. In embodiments, a storage medium may have instructions to enable the mobile device to determine a change in a distance between the mobile device and a user of the mobile device. The instruction may also enable the mobile device to operate an end-user application that may adaptively present a visual output based at least in part on a result of the change in the distance. Other embodiments may be disclosed or claimed. | 02-27-2014 |
20140087656 | Providing A Locking Technique For Electronic Displays - In one embodiment, the present invention includes a method for receiving in a persistent electronic display an authentication code from an end user, determining whether the received authentication code corresponds to a stored authentication code, and displaying a selected image on the persistent electronic display if the received authentication code corresponds to the stored authentication code, and otherwise displaying an obscured image on the persistent electronic display. This obscured image may be in an unreadable format in which information of the selected image is unreadable but a type of document represented by the selected image is determinable. Other embodiments are described and claimed. | 03-27-2014 |
20140092006 | DEVICE AND METHOD FOR MODIFYING RENDERING BASED ON VIEWER FOCUS AREA FROM EYE TRACKING - Devices and methods for modifying content rendered on the display of a computing device as a function of eye focus area include receiving sensor data from one or more eye tracking sensors, determining an eye focus area on the display screen as a function of the sensor data, and adjusting one or more visual characteristics of the rendered content as a function of the eye focus area. Perceived quality of the rendered content may be improved by improving the visual characteristics of the content displayed within the eye focus area. Rendering efficiency may be improved by degrading the visual characteristics of the content displayed outside of the eye focus area. Adjustable visual characteristics include the level of detail used to render the content, the color saturation or brightness of the content, and rendering effects such as anti-aliasing, shading, anisotropic filtering, focusing, blurring, lighting, and/or shadowing. | 04-03-2014 |
20140092142 | DEVICE AND METHOD FOR AUTOMATIC VIEWING PERSPECTIVE CORRECTION - Devices and methods for improving viewing perspective of content displayed on the display screen of a computing device include determining one or more viewing angles relative to a viewer of the content, generating a content transformation to apply a corrective distortion to the content to improve the viewing perspective when viewed at the one or more viewing angles, and rendering the content as a function of the content transformation. The viewing angles relative to a viewer of the content may be determined automatically using viewer location sensors, or may be input manually by the viewer. The content transformation visually scales the content by an appropriate factor to compensate for visual distortion experienced by the viewer at one or more viewing angles. Content may be transformed as a function of a single approximate viewing angle or multiple viewing angles. | 04-03-2014 |
20140172929 | ADAPTIVE DATA STRIPING AND REPLICATION ACROSS MULTIPLE STORAGE CLOUDS FOR HIGH AVAILABILITY AND PERFORMANCE - Technologies for adaptively striping data across multiple storage clouds include receiving user constraints corresponding one or more cloud storage providers, receiving a file to be striped across the cloud storage providers, splitting the received file into file blocks, allocating each of the file blocks to a different one of the cloud storage providers as a function of the user constraints and operating conditions of each of the cloud storage providers, and sending each of the file blocks to the cloud storage provider to which each file block is allocated. In some embodiments, file blocks may be re-allocated from one cloud storage provider to another cloud storage provider as a function of changing user constraints or operating conditions. In addition, each of the file blocks may be retrieved from the cloud storage providers to re-assemble the file. | 06-19-2014 |
20140173752 | HANDLING REPEATED REQUESTS FOR THE SAME USER DATA - In accordance with some embodiments, data may be automatically provided on preordained conditions for specific types of data. Thus specific types of data or specific requestors may be treated differently. The system may be programmed to respond appropriately to requests for certain types of data from certain types of requestors. This offloads the need to review specific requests in many cases and enables an automated system for providing requested data as appropriate. | 06-19-2014 |
20140181576 | MEMORY ALLOCATION FOR VIRTUAL MACHINES USING MEMORY MAP - Apparatuses and methods associated with memory allocations for virtual machines are disclosed. In embodiments, an apparatus may include a processor; a plurality of memory modules; and a memory controller configured to provide a layout of the memory modules. The apparatus may further include a VMM configured to be operated by the processor to manage execution of a VM by the processor including selective allocation of the memory modules to the VM using the layout of the memory modules provided to the VMM by the memory controller. Other embodiments may be described and claimed. | 06-26-2014 |