Patent application number | Description | Published |
20110179045 | Template-Based Management and Organization of Events and Projects - A space in which a user may organize data and collaborate with other users is provided. Project data and metadata may be saved into a reusable template and stored in a repository, wherein other users may discover and download the template for use as a resource for a related project type. A template may contain various document types that may expose a breadth of applications and application functionalities that may be utilized for a given task or project. Questions and answers, task templates, and terminology may also be provided. Project templates may allow for collaboration on projects, wherein business and/or social groups may collaborate quickly, easily, and more completely. | 07-21-2011 |
20110179049 | Automatic Aggregation Across Data Stores and Content Types - Project-related data may be aggregated from various data sources, given context, and may be stored in a data repository or organizational knowledge base that may be available to and accessed by others. Documents, emails, contact information, calendar data, social networking data, and any other content that is related to a project may be brought together within a single user interface, irrespective of its data type. A user may organize and understand content, discover relevant information, and act on it without regard to where the information resides or how it was created. | 07-21-2011 |
20110179060 | Automatic Context Discovery - An automatic discovery of content to add to a data store for a project is disclosed. A data item may be parsed for data features that are contextually relevant to a given project or task. Discovered interesting data may be extracted and mapped to various search mechanisms. A search may be built and applied to various data sources to discover data items based on the contextually relevant data features. Search results from various search mechanisms may be displayed in a single user interface and may be presented to a user. | 07-21-2011 |
20110179061 | Extraction and Publication of Reusable Organizational Knowledge - An analysis module, when triggered by a synchronization framework when a new data item is added to a project data store, runs a series of analysis feature extractors on the new content. An analysis may be conducted, and features of interest may be extracted from the data item. The analysis utilizes natural language processing, as well as other technologies, to provide an automatic or semi-automatic extraction of information. The extracted features of interest are saved as metadata within the project data store, and are associated with the data item from which it was extracted. The analysis module may be utilized to discover additional information that may be gleaned from content that is already in the project data store. | 07-21-2011 |
20160098645 | HIGH-PRECISION LIMITED SUPERVISION RELATIONSHIP EXTRACTOR - Automatic relationship extraction is provided. A machine learning approach using statistical entity-type prediction and relationship predication models built from large unlabeled datasets is interactively combined with minimal human intervention and a light pattern-based approach to extract relationships from unstructured, semi-structured, and structured documents. Training data is collected from a collection of unlabeled documents by matching ground truths for a known entity from existing fact databases with text in the documents describing the known entity and corresponding models are built for one or more relationship types. For a modeled relationship-type, text chunks of interest are found in a document. A machine learning classifier predicts the probability that one of the text chunks is the entity being sought. The combined machine learning and light pattern-based approach provides both improved recall and high precision through filtering and allows constraining and normalization of the extracted relationships. | 04-07-2016 |
Patent application number | Description | Published |
20110194737 | METHOD, SYSTEM, AND COMPUTER-ACCESSIBLE MEDIUM FOR AUTHENTICATION OF PAPER USING A SPECKLE PATTERN - An exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a portion of a non-digital medium for a document, by receiving at least one image of at least one first marked portion of the non-digital medium for the document, extracting at least one first speckle pattern of the at least one first marked portion, and comparing the first speckle pattern of the at least one first marked portion with at least one second speckle pattern relating to the non-digital medium to determine if a similarity between the first and second speckle patterns equals or exceeds a predetermined amount. | 08-11-2011 |
20130212027 | SYSTEMS, METHOD AND COMPUTER-ACCESSIBLE MEDIUMS FOR PROVIDING SECURE PAPER TRANSACTIONS USING PAPER FIBER IDENTIFIERS - Exemplary systems, methods and computer-accessible mediums can receive information comprising a first speckle pattern(s) associated with a portion(s) of the paper. The information can be generated by an optical arrangement, and the first speckle pattern(s) can be compared with a second speckle pattern(s) to determine if a similarity, measure based on local or global descriptors is of equal to a predetermined amount or within a predetermined range. | 08-15-2013 |
20140205153 | SYSTEMS, METHODS AND COMPUTER-ACCESSIBLE MEDIUMS FOR AUTHENTICATION AND VERIFICATION OF PHYSICAL OBJECTS - Exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a non-digital medium of a physical object, by receiving at least one image of video of at least one marked or unmarked region, and comparing the first microscopic image or video of at least one marked or unmarked region with at least one second microscopic image or video relating to the non-digital medium to determine if a similarity between the first and second microscopic images or videos matches or exceeds a predetermined amount. | 07-24-2014 |
20150365408 | SECURE TRANSACTIONS USING ALPHACODES - Systems and method for sending a first alphacode to a first participant over a secure channel. Sending a second alphacode to a second participant over a secure channel. Receiving a first encoded message, a second encoded message, and a plaintext message. The first encoded message is based on the first alphacode and the second encoded message is based on the second alphacode. Generating a first ciphertext based on the first alphacode and the plaintext message. Comparing the first ciphertext to the first encoded message and determining the authenticity of the first encoded message based at least on the comparing to the first ciphertext. Comparing the second ciphertext to the second encoded message and determining the authenticity of the second encoded message based at least on the comparing to the second ciphertext. Sending a first confirmation to the first participant and sending a second confirmation to the second participant. | 12-17-2015 |
Patent application number | Description | Published |
20090215125 | DEVICES AND PROCESSES FOR NUCLEIC ACID EXTRACTION - Devices, processes, and kits for the extraction of nucleic acids from biological samples are disclosed. The devices comprise a first port, a second port, and a binding chamber intermediate and in fluid communication with the first port and the second port. The binding chamber comprises an unmodified flat glass surface effective for binding a heterogeneous population of nucleic acids. The first port, second port, and binding chamber define a continuous fluid pathway that is essentially free of nucleic acid-specific binding sites. | 08-27-2009 |
20120237939 | DEVICES AND PROCESSES FOR NUCLEIC ACID EXTRACTION - Devices, processes, and kits for the extraction of nucleic acids from biological samples are disclosed. The devices comprise a first port, a second port, and a binding chamber intermediate and in fluid communication with the first port and the second port. The binding chamber comprises an unmodified flat glass surface effective for binding a heterogeneous population of nucleic acids. The first port, second port, and binding chamber define a continuous fluid pathway that is essentially free of nucleic acid-specific binding sites. | 09-20-2012 |
Patent application number | Description | Published |
20120107787 | ADVISORY SERVICES NETWORK AND ARCHITECTURE - Systems and methods are provided to implement an advisory services network that enables organizations to identify complex business problems from apparent business problems, immerse a diverse group of people in the businesses of the organizations, and promote collaboration to develop viable solutions to the complex business problems. An enterprise organization can supply case studies of real-life scenarios, data, ethnographic interviews to convey multiple views of problematic areas, etc., to enable members of the diverse group of people to immerse themselves into the problem space, participate in creative communications, such as discussions, and brainstorm potential solutions. Further, the advisory services network can include a gaming platform on which instances of serious games can be developed and deployed. The serious games enables sharing of ideas among players, discussions among players, and other player interactions to facilitate compounding of perspectives and solutions among a diverse group while providing an entertaining and through-provoking environment. | 05-03-2012 |
20120110455 | VIDEO VIEWING AND TAGGING SYSTEM - Systems and methods are provided to view, manipulate, and share videos within a gaming platform implemented as an advisory services network. Within the context of a serious game designed around a complex business problem of an organization, players can review videos conveying ethnographic information, mark segments of the videos, tag the videos or segments for categorization, create discussions around the videos or segments, add the videos or segments as evidence to a dossier, embed the videos or segments into existing discussions, or the like. | 05-03-2012 |
Patent application number | Description | Published |
20120225721 | GAME DOSSIER FOR AN ADVISORY SERVICES NETWORK - Systems and methods are provided to maintain and operate a player-generated dossier within a gaming platform implemented as an advisory services network. Within the context of a serious game designed around a complex business problem of an organization, players can navigate a plurality of narrative scenes associated with pieces of evidence. A player, leveraging individuality, can select specific pieces of evidence to be included in a dossier. Further mechanisms are provided to enable the user to remove items from the dossier, add portions of evidence to the dossier, publish the dossier to other players of the serious game, and arrange items in the dossier according to a variety of ordering schemes. | 09-06-2012 |
20120225722 | CASCADING POINTS SYSTEM - Systems and methods are provided to maintain player scores within a gaming platform implemented as an advisory services network. Within the context of a serious game designed around a complex business problem of an organization, players can review and navigate a plurality of narrative scenes with associated evidence, extract items of evidence, participate in discussions, provide solution concepts, develop prototypes, and other related actions. A player can receive points for performing actions. In addition, the player can receive points for actions of disparate players when the actions of the disparate players are influenced by or reference actions of the player. | 09-06-2012 |
20130109452 | INTERACTIVE LEARNING USING AN ADVISORY SERVICES NETWORK | 05-02-2013 |
20130109453 | TALENT IDENTIFICATION WITHIN AN ADVISORY SERVICES NETWORK | 05-02-2013 |
20160096112 | VIDEO VIEWING AND TAGGING SYSTEM - Systems and methods are provided to view, manipulate, and share videos within a gaming platform implemented as an advisory services network. Within the context of a serious game designed around a complex business problem of an organization, players can review videos conveying ethnographic information, mark segments of the videos, tag the videos or segments for categorization, create discussions around the videos or segments, add the videos or segments as evidence to a dossier, embed the videos or segments into existing discussions, or the like. | 04-07-2016 |
Patent application number | Description | Published |
20090259870 | MANAGING TIMERS IN A MULTIPROCESSOR ENVIRONMENT - Timers are managed in a multiprocessing environment. Some timers are local to a given logical processor; such a local timer is inserted on and will be canceled only from that logical processor. Other timers are global to a logical processor. A global timer which was inserted on a given logical processor may be canceled from that logical processor or from another logical processor. Global timers are serviced in response to expiration of an associated local timer. | 10-15-2009 |
20110225342 | OPPORTUNISTIC PAGE CACHING FOR VIRTUALIZED SERVERS - A system described herein includes a receiver component that receives an indication that at least one page in virtual memory is free and the at least one page in virtual memory is classified as short-lived memory, wherein the virtual memory is accessible to at least one virtual machine executing on a computing device. The system also includes a cache updater component that dynamically updates a cache to include the at least one page, wherein the cache is accessible to the at least one virtual machine. | 09-15-2011 |
20120047312 | VIRTUAL MACHINE MEMORY MANAGEMENT IN SYSTEMS WITH ASYMMETRIC MEMORY - A system is described herein that includes a predictor component that predicts accesses to portions of asymmetric memory pools in a computing system by a virtual machine, wherein the asymmetric memory pools comprise a first memory and a second memory, and wherein performance characteristics of the first memory are non-identical to performance of the second memory. The system also includes a memory management system that allocates portions of the first memory to the virtual machine based at least in part upon the accesses to the asymmetric memory pools predicted by the predictor component. | 02-23-2012 |
20120324236 | Trusted Snapshot Generation - A hypervisor provides a snapshot protocol that generates a verifiable snapshot of a target machine. The verifiable snapshot includes a snapshot and a signed quote. In one implementation, a challenger requests a snapshot of the target machine. In response to the snapshot request, the hypervisor initiates Copy-on-Write (CoW) protection for the target machine. The hypervisor snapshots and hashes each of the memory pages and the virtual central processing unit (CPU) of the target machine. The hypervisor generates a composite hash by merging all individual memory page hashes and the CPU state hash. The hypervisor requests a quote including integrity indicators of all trusted components and the composite hash. The quote uses a cryptographic signature from a trusted platform module, which ensures that any compromise of the integrity of the snapshot is detectable. The snapshot and signed quote are returned to the challenger for verification. | 12-20-2012 |
Patent application number | Description | Published |
20080281833 | Configuration change management tool - A change management system for managing configurable devices such as computer systems uses a set of rules for validating change requests, linking change requests, and determining inconsistencies within various configuration states. Analysis and validation may happen at the time the change request is created with respect to the current environment, as well as analysis and validation with respect to other pending requests and proposals, and historical actual states. The maintenance of accurate and consistent state and change information may enable various automated tools to analyze and manipulate change requests, including analysis of future desired states, historical actual states, pending change requests, and current state. The change request may be processed through an approval cycle all the while being incorporated into a scheduling system that may be used to detect inconsistent, illogical or harmful configurations in potential future configurations. | 11-13-2008 |
20090183185 | Declarative and Extensible Process Definition - An enterprise application may operate on a platform that is able to execute a solution pack that may have various configurable items incorporated into the solution pack. During runtime, the platform may present the configurable items in a user interface. The items may be embedded within the solution pack, which may contain various descriptors of a business process, including workflow definitions, data types handled in the process, and various rules or other definitions. The options made available within the solution pack may alter the workflow, alter conditions used within the workflow, change data types, or change any other element. The options may also be made available through an application programming interface to the platform. | 07-16-2009 |
Patent application number | Description | Published |
20150124641 | COMMUNITY WI-FI NETWORK JOINED ACCESS POINT CONFIGURATION - Various technologies described herein pertain to configuring an access point in a local network for operation in a community Wi-Fi network. The community Wi-Fi network includes access points in differing local networks that share respective network bandwidth capacities with member computing devices of the community Wi-Fi network. A request to join the access point to the community Wi-Fi network is transmitted from the access point to a community aggregation system. Responsive to the request, the community aggregation system transmits a firmware update to the access point. The access point installs the firmware update in memory of the access point. Moreover, responsive to installation of the firmware update, the access point can share network bandwidth capacity with the member computing devices of the community Wi-Fi network. Further, the community aggregation system supports transparent handoffs between access points in to the community Wi-Fi network. | 05-07-2015 |
20150124791 | DELIVERY OF SHARED WIFI CREDENTIALS - Various technologies described herein pertain to delivering shared WiFi credentials. According to various embodiments, at least one server computing device is configured to transmit shared WiFi credentials to a mobile device. The at least one server computing device receives a request, where the request includes data that identifies the mobile device. Moreover, the request indicates that the mobile device desirably receives credentials for a shared WiFi network. Responsive to receiving the request, the at least one server computing device determines that the mobile device is authorized to receive the credentials for the shared WiFi network based at least in part upon the data that identifies the mobile device. Moreover, the at least one server computing device transmits the credentials for the shared WiFi network to the mobile device responsive to determining that the mobile device is authorized to receive the credentials for the shared WiFi network. | 05-07-2015 |
20150127436 | COMMUNITY WI-FI NETWORK - Various technologies described herein pertain to joining a computing device in a local network to a community Wi-Fi network. The community Wi-Fi network includes disparate computing devices that share respective network bandwidth capacities with member consumer devices of the community Wi-Fi network. The computing device receives an opt-in signal indicating that the computing device desirably be added to the community Wi-Fi network. Responsive to receiving the opt-in signal, the computing device retrieves account parameters. The account parameters include data indicating a network bandwidth capacity allocated to the account, which is usable by the computing device. A shared portion of the network bandwidth capacity is determined based at least in part upon the parameters of the account. The computing device is configured to share the shared portion of the network bandwidth capacity for consumption by member consumer device(s). The computing device communicates with the member consumer device(s) over a Wi-Fi connection | 05-07-2015 |
20150139082 | Generating Sequenced Instructions For Connecting Through Captive Portals - Embodiments produce a set of instructions for connecting to a network through a network access point based on data crowdsourced from mobile computing devices. The crowdsourced data describes interactions between the mobile computing devices and the network access point when establishing a connection to the network. A cloud service analyzes the crowdsourced data to identify a set of instructions for association with the network access point. The mobile computing devices replay the set of instructions when subsequently attempting to connect to the network access point. | 05-21-2015 |
20150142946 | Applying Sequenced Instructions to Connect Through Captive Portals - Embodiments apply a set of sequenced instructions to connect to a network through a captive portal. A computing device detects a network access point and obtains the instruction set corresponding to the network access point. The instruction set is derived by a cloud service from crowdsourced data describing interactions between mobile computing devices and the network access point. Applying the instruction set includes performing actions such as navigating web pages to accept terms and conditions, provide user or device information, and more. | 05-21-2015 |
20150142947 | Configuring Captive Portals With a Cloud Service - Embodiments provision captive portals on network access points (NAPs). In response to a request from a NAP owner, a cloud service associates a NAP with the NAP owner and provides a control channel for configuring the NAP. The NAP owner inputs configuration settings describing the captive portal. The cloud service processes the configuration settings to generate configuration data. The cloud service transmits the configuration data to the NAP. The NAP applies the configuration data to configure the NAP. Some embodiments configure Wi-Fi hotspots with captive portals for gated access to the Internet. | 05-21-2015 |
20150142980 | Context-Based Selection of Instruction Sets for Connecting Through Captive Portals - Embodiments personalize a set of network access points (NAPs) acting as captive portals for each user and/or user device. A cloud service, or the user device, accesses context describing the user device. The context identifies at least one NAP, and may include accounting data. One of the NAP is selected for connection based on the context, and an instruction set associated with the selected NAP is provided for replay by the user device to connect through the NAP. In some embodiments, instructions within the instruction set are also personalized to the user and/or user device based on the context. | 05-21-2015 |
20150188800 | MANAGEMENT OF COMMUNITY WI-FI NETWORK - Various technologies described herein pertain to managing and accessing a community Wi-Fi network. The community Wi-Fi network can include sharer computing devices in differing local networks that share respective network bandwidth capacities with consumer computing devices. Feedback information pertaining to network bandwidth capacity available at different geographic locations covered by the community Wi-Fi network can be collected and evaluated to enable generation of maps for visualizing coverage of the community Wi-Fi network. A consumer computing device can display a map that includes visual information pertaining to the geographic coverage of the community Wi-Fi network relative to a geographic location of the consumer computing device. Community Wi-Fi network coverage can be analyzed to detect geographic locations at which network coverage is desirably added; network coverage can be added by incentivizing a potential sharer computing device to opt in to share network bandwidth capacity or controlling beamforming of sharer computing device(s). | 07-02-2015 |