Patent application number | Description | Published |
20130050118 | GESTURE-DRIVEN FEEDBACK MECHANISM - Systems and methods disclosed herein may operate to detect, via a user device corresponding to a user, a user gesture performed on or in proximity of the user device during execution of a user interface in relation with an application; compare the user gesture against at least one predetermined gesture; and generate a feedback message associated with the application based on determining that the user gesture matches the at least one predetermined gesture, with the generating including automatically capturing a screen image of the user interface and inserting the screen image as at least part of the feedback message. | 02-28-2013 |
20130054325 | MOBILE PLATFORM FOR REDEEMING DEALS - Systems and methods disclosed herein may operate to create, distribute and redeem offers on a mobile platform. In various embodiments, an indication to purchase an offer for a product or service provided by a second user may be received from a mobile device corresponding to a first user. The offer may be previously presented to the user via the mobile device. A voucher for the product or service may be transmitted to the mobile device in response to the indication. A request to redeem the voucher may be received from the mobile device. The request may include an identification code. The identification code may be compared with a shop identification code identifying the second user. An indication of redemption of the voucher may be provided to a computing device corresponding to the second user upon determining that the identification code received from the mobile device matches the shop identification code. | 02-28-2013 |
20130054335 | MOBILE PLATFORM FOR GENERATING AND DISTRIBUTING DEALS - Systems and methods disclosed herein may operate to create, distribute and redeem offers on a mobile platform. In various embodiments, a first set of information describing terms of an offer for a product or service, and a second set of information identifying a first zone and a second zone, may be received from a computing device corresponding to a merchant. The offer may be generated based, at least in part, on the first set of information. An exclusion zone and an inclusion zone may be generated based, at least in part, on the information identifying the first zone and the second zone, respectively. The offer may be selectively distributed across a network to a first plurality of mobile devices located outside the exclusion zone and within the inclusion zone such that the offer is invisible to a second plurality of mobile devices located within both the exclusion and inclusion zones. | 02-28-2013 |
Patent application number | Description | Published |
20130205027 | Automatic Cloud Provisioning Based on Related Internet News and Social Network Trends - An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold. | 08-08-2013 |
20150040217 | DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT - An approach for monitoring and protecting electronic data in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, an activity monitor gathers characteristics of data traffic of one or more virtual machines. The data traffic is analyzed to determine whether any of the data traffic is indicative of a malicious activity (e.g., unauthorized data transfers). If it appears a VM is engaging in malicious activity, then a counter for the VM is incremented by a predefined value that is associated with the malicious activity. When the counter for the VM exceeds a point threshold, a remediation action is taken with respect to the VM. | 02-05-2015 |
20150293762 | Smart Source Code Evaluation and Suggestion System - A method for s identifying program files within one or more programs that will likely require update to implement a proposed programming task is disclosed. A processor identifies a previous programming task that matches the proposed programming task. The processor also identifies a set of program files that were updated to implement the previous programming task. The processor then displays the set of program files or existing versions of the set of program files as program files that will likely require update for the proposed programming task. | 10-15-2015 |
20160034275 | CODING CONVENTION DISCOVERY AND ENFORCEMENT - In general, embodiments of the invention provide an approach to discover and enforce coding conventions among a group of developers. Specifically, source code files for a group of developers are imported from a code repository. The source code files are analyzed to discover the commonly used coding conventions of the group. Convention templates are generated based on these coding conventions. Each convention template is assigned a weighted value, and the convention templates are reviewed and approved based on the weighted value. | 02-04-2016 |
20160054143 | UNMANNED AERIAL VEHICLE NAVIGATION ASSISTANCE - In an approach to providing navigation assistance, one or more computer processors receive a request for navigation assistance to a destination from a first user. The one or more computer processors dispatch a navigation assistance UAV to the first user. The one or more computer processors determine a route for the first user to follow to the destination. The one or more computer processors provide navigation assistance for the route to the first user using the navigation assistance UAV. | 02-25-2016 |
20160059962 | UNMANNED AERIAL VEHICLE FOR HAZARD DETECTION - In an approach to hazard detection, one or more computer processors determine whether an obstruction of view for a user in a first vehicle is detected. Responsive to determining the obstruction is detected, the one or more computer processors deploy a first unmanned aerial vehicle (UAV) associated with the first vehicle. The one or more computer processors determine whether one or more hazards associated with a path of the first vehicle are detected. | 03-03-2016 |
20160091338 | GENERATING AN OPTIMAL REFUELING PLAN FOR ROAD VEHICLES - Generating a refueling plan for a vehicle on a route including the steps of monitoring fuel consumption of the vehicle and an amount of fuel remaining within the vehicle. When a fuel level within the vehicle falls below a threshold, determining a number of miles remaining on the route and fuel mileage of the vehicle and generating a list of fuel stations which are within driving range of the vehicle based on the vehicle's fuel mileage. The list may also include fuel stations which are outside the driving range of the vehicle which have a service for delivery of fuel to a point within the driving range of the vehicle and at least a price of the fuel and brand of the fuel at each of the fuel stations. The list of fuel stations is provided to a user of the vehicle for selecting a fuel station for refueling. | 03-31-2016 |
Patent application number | Description | Published |
20160047177 | Connector Apparatus - Apparatus and method for sealingly connecting tubular members in a wellbore. In an arrangement where a portion of a tubular member is radially expanded into sealing contact within a second tubular member, and the second tubular member has circumferential recesses on an inner surface, a resilient member protrudes from a side wall of the recesses. The resilient member is acted on by the portion of the tubular member during expansion and maintains sealing contact to the portion after expansion. | 02-18-2016 |
20160047178 | Morphing Tubulars - Apparatus and method for sealingly connecting tubular members in a wellbore. In a connector apparatus where a portion of a tubular member is radially expanded into sealing contact within a second tubular member, and the second tubular member has circumferential recesses on an inner surface, an annular resilient band member is arranged in the recesses. The annular resilient band member is acted on by the portion of the tubular member during expansion and maintains sealing contact to the portion after expansion. | 02-18-2016 |
20160097254 | Isolation Barrier - Apparatus and method for creating a barrier across an annulus in a well bore. First and second morphable sleeves are arranged side by side on a tubular body and sealed thereto to. Adjacent ends of each sleeve meet at a valve housing having a valve arrangement with a first position in which fluid flows from the throughbore of the tubular body to the first and second sleeves and a second position which prevents the flow of fluid between the throughbore, the first chamber and the second chamber. At opposing ends of the sleeves rupturable barrier devices are positioned. The sleeves can be morphed together and by rupturing the barriers, each side of the barrier is active to pressure and collapse is prevented regardless of the pressure differential across the barrier. | 04-07-2016 |
20160102522 | Packer - A morphable packer and method of setting the packer in a wellbore. The packer is a tubular member having a throughbore with a central portion having a greater diameter than each end portion with tapered portions there between. Gripping elements are arranged on the tapered portions. Morphing of the tubular member creates a seal between the central portion and an outer cylindrical structure, such as a wellbore or casing, and the gripping elements are moved radially outwards to engage with the cylindrical structure. The gripping elements act as slips which are activated by morphing the tubular member. Embodiments are described with the tubular member being a sleeve on a base pipe and, additionally, sealing and securing features in the form of elastomeric bands, lugs and wedges. | 04-14-2016 |