Patent application number | Description | Published |
20130313318 | SYSTEMS AND METHODS FOR NETWORK INVENTORY MANAGEMENT UTILIZING MOBILE TECHNOLOGY - A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining, via the mobile device, whether the hardware or software component is a network component (NC), based on the scanned code. The hardware or software component may be a call manager, server, client device, interface card, repeater, hub, bridge, switch, router, or firewall, for example. | 11-28-2013 |
20140089148 | SYSTEMS AND METHODS FOR NETWORK INVENTORY MANAGMENT UTILIZING MOBILE TECHNOLOGY - A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining, via the mobile device, whether the hardware or software component is a network component (NC), based on the scanned code. The hardware or software component may be a call manager, server, client device, interface card, repeater, hub, bridge, switch, router, or firewall, for example. | 03-27-2014 |
20140173591 | DIFFERENTIATED SERVICE LEVELS IN VIRTUALIZED COMPUTING - In one implementation, a host provides virtualized computing to one or more customer networks. The virtualized computing may include hardware virtualization quantified in the resources of the virtual machines, services virtualization quantified in the quantity or types of services performed on host, or processing virtualization quantified by process occurrences. When the host receives a request for computing virtualization from a user device, the host derives an authentication value and accesses a virtualization service level from a memory. The host is configured to deliver the computing virtualization to the user device according the virtualization service level. | 06-19-2014 |
Patent application number | Description | Published |
20110050459 | SYSTEM AND METHOD TO ENHANCE SAFETY AND LEGAL COMPLIANCE BY LOCATION ANALYSIS - Various exemplary embodiments relate to a method and related device including one or more of the following: determining a current location of the vehicle; determining, for the current location, an appropriate maximum speed which the vehicle should not exceed; determining a current speed at which the vehicle is traveling; determining whether the current speed is greater than the appropriate maximum speed; and indicating to the operator of the vehicle, when the current speed is greater than the appropriate maximum speed, that the vehicle is traveling at a speed that is greater than the appropriate maximum speed. Various alternative embodiments also provide for predicting a future speed of the vehicle using the current acceleration and indicating to the operator, when the future speed is greater than the appropriate maximum speed, that the vehicle will soon be traveling at a speed that is greater than the appropriate maximum speed. | 03-03-2011 |
20140089189 | SYSTEM, METHOD, AND APPARATUS TO EVALUATE TRANSACTION SECURITY RISK - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a request for a transaction associated with personally identifiable information (PII); determining values for a plurality of security parameters based on the requested transaction; determining that the transaction should be authorized based on the values for the plurality of security parameters; and based on determining that the transaction should be authorized, authorizing the transaction. | 03-27-2014 |
20140090090 | SYSTEM, METHOD, AND APPARATUS TO MITIGATERISK OF COMPROMISED PRIVACY - Various exemplary embodiments relate to a method and related network node including one or more of the following: retrieving a record of a first transaction, wherein the first transaction is associated with personally identifiable information of an owner; determining a first privacy risk value based on: a first transaction security metric associated with the first transaction, wherein the first transaction security metric includes a first set of security parameters, and a first set of weights correlated to the first set of security parameters; determining the current security status based on the first privacy risk value; and transmitting the current security status to the entity. | 03-27-2014 |
Patent application number | Description | Published |
20090080526 | DETECTING VISUAL GESTURAL PATTERNS - A processing device and method are provided for capturing images, via an image-capturing component of a processing device, and determining a motion of the processing device. An adaptive search center technique may be employed to determine a search center with respect to multiple equal-sized regions of an image frame, based on previously estimated motion vectors. One of several fast block matching methods may be used, based on one or more conditions, to match a block of pixels of one image frame with a second block of pixels of a second image. Upon matching blocks of pixels, motion vectors of the multiple equal-sized regions may be estimated. The motion may be determined, based on the estimated motion vectors, and an associated action may be performed. Various embodiments may implement techniques to distinguish motion blur from de-focus blur and to determine a change in lighting condition. | 03-26-2009 |
20120159404 | DETECTING VISUAL GESTURAL PATTERNS - A processing device and method are provided for capturing images, via an image-capturing component of a processing device, and determining a motion of the processing device. An adaptive search center technique may be employed to determine a search center with respect to multiple equal-sized regions of an image frame, based on previously estimated motion vectors. One of several fast block matching methods may be used, based on one or more conditions, to match a block of pixels of one image frame with a second block of pixels of a second image. Upon matching blocks of pixels, motion vectors of the multiple equal-sized regions may be estimated. The motion may be determined, based on the estimated motion vectors, and an associated action may be performed. Various embodiments may implement techniques to distinguish motion blur from de-focus blur and to determine a change in lighting condition. | 06-21-2012 |