Patent application number | Description | Published |
20100042419 | Audience Manager and Data Providers - A system for audience data exchange, the system includes a first network and a second network. The first network has a first data provider for collecting data and providing the data to the first network. The second network is coupled to the first network, and includes a first advertiser and a first publisher. The first network serves as a seller of the data provided by the first data provider. The second network serves as a buyer of the data provided by the first data provider. The first network compensates the first data provider. | 02-18-2010 |
20100042465 | Audience Manager and Custom Segments - A computer readable medium stores a program for audience data exchange, and has sets of instructions for obtaining data and providing the data to a first network within an exchange. The first network comprises a seller of the data provided to the exchange. The instructions are for offering for sale the data to a second network coupled to the first network. The second network serves as a first buyer of the data provided to the first network. The instructions monetize the data without the need for participation in a particular ad call. | 02-18-2010 |
20100042466 | Audience Manager and Resellers - A system for audience data exchange includes a first network and a second network. The first network is configured for obtaining data and providing the data to the exchange system. The first network comprises a seller of the data provided to the exchange system. The second network is coupled to the first network, and serves as a first buyer of the data provided by the first network. The seller monetizes the data without the need for participating in a particular ad call. | 02-18-2010 |
20100042497 | Audience Manager and Data Exchange - A method of data collection for user segmentation receives an interaction of a user with a web page, and generates an ad call in response to the received interaction. The ad call is preconfigured to have an association to a first segment. The method adds the user to the first segment. | 02-18-2010 |
20100042500 | Audience Manager and Sellers - A system for audience data exchange includes a first network and a second network. The first network has a first advertiser, and a first publisher. The second network is coupled to the first network, and has a second advertiser and a second publisher. The first network is a seller of data provided to the exchange system. The second network serves as a buyer of the data provided to the exchange system. | 02-18-2010 |
20100042507 | Audience Manager and Sellers - A method of audience data exchange obtains data and provides the data to a first network within an exchange system. The first network comprises a seller of the data provided to the exchange system. The method offers for sale the data to a second network coupled to the first network. The second network serves as a first buyer of the data provided to the first network within the exchange system. The method monetizes the data without the need for participating in a particular ad call. | 02-18-2010 |
20100042930 | Audience Manager and End Users - A method of providing an opt out feature for an exchange receives a request from a first entity to join the exchange. The request includes a URL address for a web page that is configured to receive user requests to opt out of the first entity's activities. The method generates a hidden opt out segment for the first entity. The hidden opt out segment is inaccessible to entities on the exchange, including the first entity. The method grants permission to the first entity to join the exchange. | 02-18-2010 |
Patent application number | Description | Published |
20100275064 | CONFIGURATION VALIDATION SYSTEM FOR COMPUTER CLUSTERS - A method of validating a configuration of a computer clusters includes transmitting a first neighbor identification to a first flexible service processor (FSP) arranged in the first computer cluster and a second neighbor identification to a second FSP arranged in the second computer cluster, connecting a first end of a cable to a first transceiver arranged in the first cluster and connecting a second end of the cable to a second transceiver arranged in the second cluster. The first neighbor identification is passed from the first transceiver to the second computer cluster and the second neighbor identification is passed from the second transceiver toward the first computer cluster. The first neighbor identification is compared with a desired first neighbor identification to establish a first comparison result, and the second neighbor identification is compared with a desired second neighbor identification to establish a second comparison result and a notice is generated. | 10-28-2010 |
20100275071 | VALIDATION OF COMPUTER INTERCONNECTS - A method of validating multi-cluster computer interconnects includes calculating a cable interconnect table associated with the multi-cluster computer, and distributing the cable interconnect table to a first transceiver in the first computer cluster and a second transceiver in the second computer cluster. The method also includes connecting a first end of a cable to the first transceiver and a second end of the cable to the second transceiver, transmitting a first neighbor identification from the first cluster to the second cluster, and a second neighbor identification from the second cluster to the first cluster, comparing the first neighbor identification with a desired first neighbor identification from the cable interconnect table to establish a first comparison result and the second neighbor identification with a desired second identification from the cable interconnect table to establish a second comparison result, and generating an alert based on the first and second comparison results. | 10-28-2010 |
20140304554 | ENABLING COMMUNICATION OVER CROSS-COUPLED LINKS BETWEEN INDEPENDENTLY MANAGED COMPUTE AND STORAGE NETWORKS - Embodiments relate to providing communication over cross-coupled links between independently managed compute and storage networks. An aspect includes coupling an independently managed local subsystem with an independently managed remote subsystem over cross-coupled links, whereby each subsystem includes compute entities and storage entities. Unique identifiers are assigned to all the compute entities and the storage entities in the local network and the remote network. A determination is then made as to whether each entity is in the local subsystem or the remote subsystem. Accordingly, a global broadcast tree is built to bridge the compute entities in the local subsystem to the storage entities in both the local and remote subsystem. Responsive to an error in a layer of the local subsystem external to a cross-coupled link, the cross-coupled link in the local subsystem is disabled. Accordingly, the remote subsystem may detect that the link has failed. | 10-09-2014 |
Patent application number | Description | Published |
20090075035 | PREPARING NANOPARTICLES AND CARBON NANOTUBES - Apparatus and methods for forming the apparatus include nanoparticles, catalyst nanoparticles, carbon nanotubes generated from catalyst nanoparticles, and methods of fabrication of such nanoparticles and carbon nanotubes. | 03-19-2009 |
20090269269 | COPPER OXIDE NANOPARTICLE SYSTEM - The disclosed subject matter provides a copper oxide nanoparticle, a catalyst that includes the copper oxide nanoparticle, and methods of manufacturing and using the same. The catalyst can be used to catalyze a chemical reaction (e.g., oxidizing carbon monoxide (CO) to carbon dioxide (CO | 10-29-2009 |
20120126199 | PREPARING NANOPARTICLES AND CARBON NANOTUBES - Apparatus and methods for forming the apparatus include nanoparticles, catalyst nanoparticles, carbon nanotubes generated from catalyst nanoparticles, and methods of fabrication of such nanoparticles and carbon nanotubes. | 05-24-2012 |
Patent application number | Description | Published |
20100191594 | SYSTEMS AND METHODS FOR REWARD TRANSACTION MATCHING AND SETTLEMENT - A reward processing method, system, apparatus, and computer program code is provided. Pursuant to some embodiments, the method includes analyzing transaction data associated with a plurality of payment transactions, each payment transaction including data identifying a payment account identifier, a transaction date, a transaction amount, and a merchant identifier, and identifying a first set of the payment transactions involving registered payment account identifiers. A second set of payment transactions involving a registered merchant identifier and a current offer are identified, and a reward amount earned for each of the second set is calculated. The reward amount is credited to each of the payment account identifiers in the second set. | 07-29-2010 |
20110302080 | METHOD AND APPARATUS FOR VALUE INTERCHANGE PRICING - Systems, methods, apparatus, computer program code, and means for processing transactions are provided which include receiving transaction data associated with a payment transaction, said transaction data including a payment account identifier, the payment account identifier identifying a payment account, determining a value score associated with the payment account identifier, determining, based on the value score, an interchange tier associated with the payment account identifier, and providing an indication of the interchange tier to a clearing and settlement process involving the payment account identifier. | 12-08-2011 |
Patent application number | Description | Published |
20080255940 | METHOD AND APPARATUS FOR REWARD CALCULATION AND DISBURSEMENT - A method includes receiving data that represents purchase transactions received from acquirer financial institutions. The method further includes identifying, from the received data, purchase transactions that qualify for customer rebates. The method further includes transmitting rebate data to certain ones of the acquirer financial institutions. The rebate data identifies the purchase transactions that qualify for customer rebates. | 10-16-2008 |
20100114758 | SYSTEM AND METHOD FOR PROVIDING INSTANT-DECISION, FINANCIAL NETWORK-BASED PAYMENT CARDS - A system and method for issuance of a financial network-based payment card (generally known as a “credit card”) almost instantaneously after application, wherein an applicant applies for a credit card by entering data into a data entry system, advantageously by filling in a plurality of predefined forms in a computer-based data entry system. The applicant's data is sent via a data network to a central decision center, which approves or disapproves the application. If the application is approved, data is generated and delivered to a card production system, which embosses and magnetically encodes a card blank. The card is then delivered to the applicant. | 05-06-2010 |
20110288990 | SYSTEM AND METHOD FOR PROVIDING INSTANT-DECISION, FINANCIAL NETWORK-BASED PAYMENT CARDS - A system and method for issuance of a financial network-based payment card (generally known as a “payment card” or a “credit card”) almost instantaneously after application, wherein an applicant applies for a credit card by entering data into a data entry system using a handheld electronic device, advantageously by filling in a plurality of predefined forms in a computer-based data entry system. The applicant's data is sent via a data network to a central decision center, which approves or disapproves the application. If the application is approved, data is generated, a payment card is activated, and a result of the determination to issue is sent to the handheld electronic device | 11-24-2011 |
Patent application number | Description | Published |
20080216223 | Water conservation apparatus - A water conservation system is provided public and domestic lavatories. The system includes a distinctive flush mechanism of two features. One of these features entails a “treatment button” which, upon depression, will cause to emit a fluid compound into urinated wastewater decolorizing and sanitizing it and bringing it back to its original, colorless, odorless condition. Accordingly, potable water is not used for flushing. The urinated wastewater is “treated” and, so, remains through subsequent “treatments” until such time when solid waste is deposited necessitating a conventional flush utilizing the flush lever and usual water use. The savings in volume of water is realized upon considering the number of times the “treatment button” is executed and potable water is “not withdrawn.” The system is revolutionary in that it dispenses with a “necessary flush” each time the toilet is used. Moreover, this novel system addresses the recurring local, and national, drought emergency situations. | 09-11-2008 |
20080224473 | Roto-synchronous electric motor - An electric motor for an automobile is herein introduced as a power source which does not require gas or any other fuel of any kind; nor does it require solar power, batteries, nor fuel cells for its operation. The vehicle will be powered by the dynamics of the physical dynamics of the electromagnetic forces of momentum. This novel idea drastically alters the perception of the automobile with its internal combustion engine, need for a radiator, muffler, anti-freeze, etc. In fact, this vehicle does not have what is usually thought of as an “engine.” It operates under the dynamics of physical laws of electromagnetic force for mechanical propulsion and strength of torque for horsepower. Otherwise, it operates in the same conventional manner as does the typical passenger automobile. Moreover, this novel idea addresses the adverse effects of air pollution upon human health, environmental ecology, global oil depletion, and protracted monetary expense. | 09-18-2008 |
Patent application number | Description | Published |
20100318651 | Network Communication System With Monitoring - The present invention is directed to a network communications system including a data communication path; a user communication device; a tapping device; and a rendering device. The user communications device (for example, a personal computer, a Blackberry type device) is structured, connected and/or programmed to receive web pages from the Internet over a data communication path. The tapping device is structured, located and/or connected to receive the communications and to send the network communication pages a rendering device. The tapping device and the rendering device are both separate from the user communications device. The rendering device converts the visual communications into corresponding bit maps. Preferably, the rendering device permanently stores the bit maps to a data storage device and/or displays the bit maps on a display device. In embodiments where the bit maps are permanently stored, the rendering device preferably compresses the bit maps. | 12-16-2010 |
20110058562 | Network Gateway with Enhanced Requesting - A gateway and/or software for running on a gateway that communicates data units from a connection based network to a connectionless network, where the gateway uses at least some network protocol data from the connection based network in checking against a set of rules to determine whether some responsive reaction is appropriate. Preferably, the network protocol data from the connection based network is low level network protocol data (that is, physical layer and/or data link layer) that would otherwise be discarded by the gateway as the data was de-encapsulated and sent along to the receiving, connectionless network. Some possible responsive reactions include: selectively blocking data communication; slowing down selected data communications; sending responsive communications back to selected data sending machines; and/or alerting of network administrator(s). | 03-10-2011 |
20120174218 | Network Communication System With Improved Security - A computer network communication method and system wherein software rendering software is interposed in the data communication path between a browser running on a user computer and the internet data sources (for example, internet-accessible server computers) that the user browser wants to receive information from. The software rendering application gets data from internet data sources, but this data may contain malware. To provide enhanced security, the software rendering application renders this data to form a new browser readable code set (for example, an xml page with CSS layers), and this new and safe browser readable code set is sent along to the browser on the user computer for appropriate presentation to the user. As part of the rendering process, dedicated and distinct virtual machines may be used to render certain portion of the data, such as executable code. These virtual machines may be watched, and quickly destroyed if it is detected that they have encountered some type of malware. | 07-05-2012 |
Patent application number | Description | Published |
20090214992 | METHODS OF COMBUSTION OF POWDERED FUELS AND POWDERED FUEL DISPERSIONS - Methods of combustion include metering a substantially explosible powder into an oxidizing gas using a positive displacement powder dispersion device to suspend the powder in the gas and directing the powder in the gas to form a controlled stream of a moving explosible powder dispersion. In some embodiments, the method further includes igniting the dispersion with an ignition source to produce a stationary deflagrating combustion wave and sustaining combustion by continuing to meter the powder into the gas. In other embodiments, the method further includes adjusting a nozzle velocity of the dispersion to reflect properties of the dispersion to create a sustainable flame and igniting the dispersion to produce a stationary deflagrating wave of the dispersion. In other embodiments, the method further includes igniting the dispersion in a combustion area to produce a stationary deflagrating wave such that a conductive heat transfer from combustion brings the powder to combustion temperature. | 08-27-2009 |
20090274985 | POWDERED FUEL CONVERSION SYSTEMS AND METHODS - The burner preferably exclusively burns substantially explosible solid fuels and preferably has instant ON-OFF thermostat control, wastes no energy preheating the enclosure or external air supply, achieves stable combustion the moment the powder-air mix is ignited in our burner, is used in the upward vertical mode except for oil burner retrofits, burns a solid fuel in a single-phase regime as if it were a vaporized liquid or gas, is designed to complete combustion within the burner housing itself rather than in a large, high temperature furnace enclosure which it feeds, has an ultra-short residence time requirement, is a recycle consuming burner with self-contained management of initially unburned particles, is much smaller, simpler and lower cost, has a wider dynamic range/turndown ratio, is more efficient in combustion completeness and thermal efficiency, and operates with air-fuel mix approximately at the flame speed. | 11-05-2009 |
20110259250 | Systems And Methods For Converting Biomass In The Field To A Combustible Fluid For Direct Replacement Or Supplement To Liquid Fossil Fuels - Methods, systems, and devices convert biomass from the field to provide heat, motive working gas, electrical energy, or fuel such that the biomass directly replaces or supplements liquid fossil fuels wherever these fuels may be used. The methods include procedures for harvesting the biomass, reducing it to a transportable form, purifying it and blending additives as necessary, and finally reducing the refined biomass to an explosible particle size distribution generally finer than 80 mesh for heating applications or 200 mesh for application in internal or external combustion engines. The present invention preferably includes transportation of the finished powder to storage units at the end user site, where the fuel is used by continuous delivery, metering, and dispersal in air to produce a continuous supply of an explosible fluid dispersion for direct energy conversion. Systems of automatic production for a variety of applications are also described. | 10-27-2011 |
20120104123 | POWDERED FUEL PRODUCTION METHODS AND SYSTEMS USEFUL IN FARM TO FLAME SYSTEMS - The present invention relates to a method of preparing an explosible powder suitable for combustion in an oxidizing gas. This method involves providing a biomass feedstock material and drying the biomass feedstock material to a moisture level of less than or equal to 10%. The dried biomass feedstock material is milled to form an explosible powder suitable for combustion when dispersed in an oxidizing gas. A system for carrying out this method is also disclosed. | 05-03-2012 |
20140352854 | POWDERED FUEL PRODUCTION METHODS AND SYSTEMS USEFUL IN FARM TO FLAME SYSTEMS - The present invention relates to a method of preparing an explosible powder suitable for combustion in an oxidizing gas. This method involves providing a biomass feedstock material and drying the biomass feedstock material to a moisture level of less than or equal to 10%. The dried biomass feedstock material is milled to form an explosible powder suitable for combustion when dispersed in an oxidizing gas. A system for carrying out this method is also disclosed. | 12-04-2014 |
Patent application number | Description | Published |
20140060398 | TIERED SERVING TRAY - A tiered tray is provided that includes a first tier with a first support member coupled thereto; a second tier with a second support member coupled thereto; and a table insert having a cavity therein that accepts at least one of the first and the second support members. The first support member maintains a level of the first tier above a level of a table and the second support maintains a level of the second tier above the level of the first tier, and the first tier is removably attachable to the table insert and the second tier is removably attachable to the first tier. | 03-06-2014 |
20140172681 | Process for Verifying Data Identity for Lending Decisions - The disclosure relates to a process for matching the identify of publically available data to a potential borrower for a business loan. Using the process, a lender can utilize publicly available data regarding a loan applicant, verify with some certainty that the data actually corresponds to the loan applicant, and use that data in conjuction with other information to make a lending decision. The disclosure is directed toward loan transactions for small businesses. | 06-19-2014 |
20140244479 | Process for Utilizing Web Data In Making Lending Decisions - The disclosure relates to a process for utilizing web data, primarily obtained from social media websites in lending decisions business loan. Using the process, a lender can utilize publicly available data regarding a loan applicant, and evaluate that data in conjunction with other information to make lending decisions. The disclosure is directed toward loan transactions for small businesses. | 08-28-2014 |
20140345503 | TIERED SERVING TRAY - A tiered tray is provided that includes a first tier with a first support member coupled thereto; a second tier with a second support member coupled thereto; and a table insert having a cavity therein that accepts at least one of the first and the second support members. The first support member maintains a level of the first tier above a level of a table and the second support maintains a level of the second tier above the level of the first tier, and the first tier is removably attachable to the table insert and the second tier is removably attachable to the first tier. | 11-27-2014 |
Patent application number | Description | Published |
20130215474 | System and Method for Printing Documents Containing Dynamically Generated Security Features - Systems and methods are provided for printing secure documents incorporating hidden security features. In one system, a printer firmware module embeds a security feature in printer instructions to print a secure document. In another system, a software module on a computing device embeds a security feature in printer instructions to print a secure document. In another system, a software module on a computing device provides data to a printer firmware module to embed a security feature in printer instructions to print a secure document. In another system, a print server pre-processor module embeds a security feature in printer instructions to print a secure document. In another system, a security appliance security module generates security features in the form of security instructions that are embedded into a secure document to be printed. | 08-22-2013 |
20130320099 | Barcode Copy Protection System - A copy protection system for barcode includes a barcode pattern that is printed together with a security pattern that includes a line screen that intersects elements of the barcode pattern. A difference in print density between the barcode elements and the security pattern is sufficient to allow the barcode pattern to be read by a barcode scanner. However, upon reproduction of the printed barcode pattern and security pattern by a copier, the barcode pattern is not similarly readable on the resulting reproduction. | 12-05-2013 |
20140105449 | System and Method for Analysis and Authentication of Covert Security Information Using a Smart Device - A system and method for hidden security feature detection, analysis and authentication using a smart device is disclosed. The smart device can detect and analyze hidden security features using the camera capability of the smart device to capture a digital image, and then analyze and authenticate that image using a security service including a database of security feature data, processing rules, and other information. The security service can support a variety of smart devices and security features. The smart device includes a security-specific autofocus function that allows the smart device to be positioned within a range of distances and angles from a target document that includes hidden/covert security feature(s). The smart device can display an enhanced image showing the hidden security feature(s) and/or report if the security feature is valid or invalid, along with related information, via beeps, vibration, display, text messaging, or other reporting capabilities. | 04-17-2014 |
20140355069 | System and Method for Dynamic Generation of Embedded Security Features in a Document - A system for dynamically generating a digital image comprising a security feature for a document. The system includes a processor | 12-04-2014 |
Patent application number | Description | Published |
20080235168 | POLICY-BASED MANAGEMENT SYSTEM WITH AUTOMATIC POLICY SELECTION AND CREATION CAPABILITIES BY USING SINGULAR VALUE DECOMPOSITION TECHNIQUE - A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions. With a feedback mechanism, new knowledge can be acquired as new situations occur and the corresponding policies to manage them are recorded and used to generate new event and policy correlations. Consequently, based on these new correlations, new recommended policies can be derived. | 09-25-2008 |
20080256633 | Method and Apparatus for Determination of the Non-Replicative Behavior of a Malicious Program - Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity. The result of the analysis can also be used for informing a user of an anti-virus system of the non-replicative changes made to the environment. | 10-16-2008 |
20080271016 | HYPERVISOR WITH CLONING-AWARENESS NOTIFICATIONS - A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining. | 10-30-2008 |
20090237304 | METHOD FOR MAPPING MACHINE ROOMS AND LOCATING MACHINES WITHIN MACHINE ROOMS - A system and method automatically maps computer center rooms and locates data center components within computer centers. Radio triangulation is used to determine the locations and, optionally, orientation, of machines within a computer center. | 09-24-2009 |
20100235844 | DISCOVERING AND IDENTIFYING MANAGEABLE INFORMATION TECHNOLOGY RESOURCES - Allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous information technology (IT) management system by providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource. A services oriented architecture (SOA) defines one or more services needed to manage the resource within the management system. A component model defines one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system. | 09-16-2010 |
20120233330 | DISCOVERING AND IDENTIFYING MANAGEABLE INFORMATION TECHNOLOGY RESOURCES - A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system. | 09-13-2012 |
Patent application number | Description | Published |
20090030643 | METHOD FOR COLLECTING STATISTICS FOR MOVIE THEATERS - A movie theater includes an infrared camera disposed in an auditorium of a movie theater which infrared camera captures an image of one or more persons in the movie theater; and an algorithm that determines the number of persons present in the movie theater. | 01-29-2009 |
20090060256 | METHOD OF ADVERTISEMENT SPACE MANAGEMENT FOR DIGITAL CINEMA SYSTEM - A method for automatically collecting viewer statistics from one or more persons in a movie theater, the method including the steps of capturing an image of the one or more persons in the movie theater with an infrared camera; using a face recognition algorithm to determine persons present in the movie theater; and determining one or more categories from characteristics from persons present to compute the viewer statistics. | 03-05-2009 |
20100141592 | DIGITAL CAMERA WITH CHARACTER BASED MODE INITIATION - A digital camera includes a touch-screen for receiving individually or in any combination one ore more characters all of which are short-hand notation for corresponding camera modes or functions from a user; memory for storing one or more characters all of which individually or in any combination are short-hand notation for corresponding camera modes or functions; and a processor that receives the user input from the touch-screen and correlates the received input to one of the stored characters and directing the selected camera mode or function to initiate. | 06-10-2010 |
20100289921 | DIGITAL CAMERA HAVING LAST IMAGE CAPTURE AS DEFAULT TIME - A digital camera includes a clock for keeping time; memory for receiving and storing time updates; and a processor for directing the time updates to be recorded in the memory upon occurrence of any of a plurality of camera operations; wherein a default time for the clock is dynamically updated as the time of the last recorded time in the memory. | 11-18-2010 |
20110090367 | CAMERA FOR DISPLAYING DIGITAL IMAGES - A camera includes memory for storing one or more stored images each with at least a day and month of capture; a processor which, based on the stored images, determines which day and month at least an image was captured; and a display that displays only the day and month on which at least an image was captured along with a visual indicator of whether a plurality of images was captured on the displayed day and month. | 04-21-2011 |
20110093775 | METHOD FOR DISPLAYING DIGITAL IMAGES - A method for presenting images to a user on a display, the method comprising the steps of providing one or more stored images each with at least a day and month of capture; based on the stored images, determining which day and month at least an image was captured; and displaying only the day and month on which at least an image was captured; and a visual indicator of whether a plurality of images was captured on the displayed day and month. | 04-21-2011 |
20110149138 | VARIABLE RATE BROWSING OF AN IMAGE COLLECTION - A method for browsing a collection of digital images on a display screen with a touch screen user interface, comprising: forming an ordered sequence of digital images; entering an image review mode and displaying a first digital image from the ordered sequence of digital images on the display screen; initiating a sequential image display process in response to a user touching the touch screen, wherein the sequential image display process sequentially displays digital images in the ordered sequence of digital images on the touch screen until such time that the user stops touching the touch screen, wherein a time interval between the display of sequential images is specified by a scroll rate which is controlled responsive to the position that the user is touching the touch screen. | 06-23-2011 |
20110243397 | SEARCHING DIGITAL IMAGE COLLECTIONS USING FACE RECOGNITION - A method for searching a collection of digital images on a display screen, comprising: entering an image review mode and displaying on the display screen a first digital image from the collection of digital images; designating a face contained in the first digital image by using an interactive user interface to indicate a region of the displayed first digital image containing the face; using a processor to execute an automatic face recognition algorithm to identify one or more additional digital images from the collection of digital images that contain the designated face; and displaying the identified one or more additional digital images on the display screen. | 10-06-2011 |
20120113280 | AUTOMATIC ENGAGEMENT OF IMAGE STABILIZATION - An image stabilized digital image capture device, comprising an image sensor for capturing a digital image; an optical system for imaging a scene onto the image sensor; an image stabilization system; an exposure control system; a memory system; and a processor. The processor is used to perform the steps of determining exposure settings using the exposure control system; selectively engaging the image stabilization system responsive to whether the determined exposure settings satisfy a predefined condition; capturing a digital image of a scene using the image sensor and the selectively engaged image stabilization system; and storing the captured digital image in the memory system. | 05-10-2012 |
20120113515 | IMAGING SYSTEM WITH AUTOMATICALLY ENGAGING IMAGE STABILIZATION - An image stabilized imaging system, comprising a variable magnification optical system for imaging a scene; an image stabilization system; a user control for controlling the magnification of the variable magnification optical system; and a processor. The processor is used to perform the steps of determining a user-controlled magnification setting of the variable magnification optical system; and selectively engaging the image stabilization system responsive to the determined magnification setting. | 05-10-2012 |
Patent application number | Description | Published |
20090141442 | Removable Cooling Duct With Interlocking Dovetail Connections For An Air Tight Thermal Seal - A method and incorporated assembly is provided for cooling of an electronic device or component. The assembly comprises a thermal duct having a fixed portion and a removable portion. The portions each have complementary interlocking components to secure them to one another. Also a first attachment block is provided. The first attachment block has complementary interlocking portions with the first and second thermal duct portions such that the block can be secured at least partially to either/or thermal duct portion. A second attachment block is also provided that has a complementary interlocking portion with the removable duct portion. This second attachment block can be secured to one or more electronic devices requiring cooling. | 06-04-2009 |
20130027885 | HEAT SPREADER FOR MULTI-CHIP MODULES - A multi-chip electronic module includes a circuit board having a first end portion, a second end portion, a first surface portion and an opposing second surface portion. A plurality of electronic components is mounted to the first surface portion of the circuit board. A heat spreader member is supported at the first surface portion of the circuit board. The heat spreader includes a body having a first end, a second end, a first surface and a second surface. The first end portion and first end define a fluid inlet, and the second end portion and second end define a fluid outlet. The second surface is in thermal contact with the plurality of electronic components. The heat spreader member and circuit board define an enclosed fluid duct having a plurality of substantially parallel flow paths. | 01-31-2013 |
20130033820 | COOLING A MULTI-CHIP ELECTRONIC MODULE - A method of cooling a multi-chip electronic module includes receiving in an inlet of the multi-chip module an amount of fluid, and passing the amount of fluid along a plurality of substantially parallel flow paths that extends between a heat spreader member and a printed circuit board supporting a plurality of electronic components. The plurality of electronic components is in thermal contact with an internal surface of the heat spreader member. A heat exchange is facilitated between the plurality of electronic components and the amount of fluid passing along the flow path. | 02-07-2013 |
20130265695 | POSITIVE PRESSURE-APPLYING COMPLIANT LATCH MECHANISM - A latch mechanism is provided for latching a field-replaceable unit within an enclosure. The latch mechanism includes a rotatable latch coupled to the field-replaceable unit, via a pivot, at a first side of the field-replaceable unit, and a compliant spring member disposed to act on the pivot. The compliant spring member acts on the pivot and compresses with rotating of the latch from an open position to a latched position during latching of the field-replaceable unit within the enclosure. The compressing facilitates provision of a positive pressure on or across the field-replaceable unit directed towards a second side of the field-replaceable unit opposite to the first side. This positive pressure facilitates, for example, fixed coupling of a first connector at the second side of the field-replaceable unit to a second connector associated with the enclosure when the field-replaceable unit is latched within the enclosure. | 10-10-2013 |
Patent application number | Description | Published |
20110011255 | COLLAPSIBLE BALLISTIC RESISTANT DEFENSE UNIT - A collapsible ballistic resistant unit generally comprising an armored front panel, a ballistic resistant window slidably mounted to the front panel for selective movement between fully extended and fully retracted positions, first and second side panels hingedly mounted to opposing sides of the front panel, each movable between extended and retracted positions, and first and second casters mounted to the unit to provide rolling mobility thereto. | 01-20-2011 |
20110167996 | BARRIER MOUNTING APPARATUS - An assembly for use in a shield includes a protective panel, protective panel securing hardware and an adjustable mount. The protective panel is ballistic-resistant and/or blast resistant. The protective panel securing hardware secures the protective panel to the adjustable mount and to extend in an upwards direction from the adjustable mount. The adjustable mount is structured and sized to be securable on top of shield bases having a plurality of alternative geometries. | 07-14-2011 |
20120180626 | DEFENSIVE PANEL ACCESS PORT - A threat resistant access port is disclosed, including a resistant panel having an access aperture formed therein. A resistant cover is movably coupled to the panel, the cover being pivotally slideable relative to the panel so as to cover the aperture in a closed position and to uncover the aperture in an open position. The resistant cover comprises an outer member, the outer member being threat resistant and located proximate an outer side of the panel. The resistant cover further comprises an inner member, the inner member coupled to the outer member and located proximate an inner side of the panel opposite the outer side of the panel. | 07-19-2012 |
Patent application number | Description | Published |
20080222023 | Internet-Based System for Auctioning Securities - A method of auctioning exchange traded assets is described. Before commencing the auction bidding, the seller establishes a maximum asset amount representing a greatest amount of the exchange traded assets to be auctioned, and a minimum asset price representing a minimum acceptable bid amount for a given amount of the exchange traded assets. During the bidding, bids are received for the assets, with each bid including a bid price and a corresponding bid amount of assets. After the bidding, a market demand is determined that represents the total of all the bid amounts for the bids. If the market demand is greater than or equal to the maximum asset amount, a clearing price is established that allocates the maximum asset amount of the assets according to the bids at a final price between and including the clearing price and the minimum asset price. Otherwise, if the market demand is less than the maximum asset amount, the market demand amount of the assets according to the bids at a final price equal to the minimum asset price. | 09-11-2008 |
20080306854 | Event Timing Mechanisms for Dutch Auction of Securities - A method for auctioning securities defines an auction start time and an auction end time. The time therebetween is defined by time bucket intervals and transparency intervals. At the auction start time, a real-time auction of securities over a communications network begins. During each time bucket interval bids are received from prospective purchasers, and assigned a time bucket stamp such that bids with the same time stamp are treated as having occurred at the same time. At the end of each transparency interval public bid information related to the auction is updated and made available to the prospective purchasers. After the auction end time, a final auction price for the securities is established based upon the bids made during the auction, and the securities are allocated to the prospective purchasers at the final auction price. | 12-11-2008 |
20080306855 | Allocation Mechanisms for Dutch Auction of Securities - A method is described for auctioning securities by an auction offeror. Bids are received for an offered number of securities. Each bid includes a bid price, a desired number of securities, and a timestamp indicting a time that the bid was received by the system. After a final bid time, a final price for the securities is established based upon the received bids. Then the desired number of securities is allocated to each bid having a bid price more favorable for the auction offeror than the final price. The desired number of securities is also allocated to each bid having a bid price at the final price, in bid timestamp order favoring earlier timestamps, until the offered number of securities has been allocated. | 12-11-2008 |
Patent application number | Description | Published |
20080271652 | Barrier - A barrier that includes attack resistant pane(s) (see DEFINITIONS section). In this way, a person behind the barrier can be protected when they are outside. More specifically, the person behind the barrier is protected, at least to some extent, from both: (i) vehicular attacks; and (ii) blast (for example, bombs) and/or ballistic (for example, bullet) attacks. Also, the protected person can see what is happening across the barrier because of the attack-resistant pane(s). Also, if the barrier is unanchored then it can be moved from place to place, for example, by heavy equipment, so that the same barrier can be re-deployed at different outdoor locations (or indoor locations) on an as-needed basis. Preferably, the barrier also includes framing pieces that secure the attack-resistant pane(s) to the body of the barrier, with the framing pieces being covered on one side by an attack-resistant material (preferably, hardened steel). | 11-06-2008 |
20090025546 | Hand-Held Ballistic Resistant Personal Protection Device - A personal protection device comprising a shield having two planar sides, oppositely disposed to one another, wherein the shield is fabricated of a ballistic resistant material, a window interconnected in the shield, an access port disposed on the shield, two handles, each disposed on a planar side, wherein the two handles allow a user to hold the shield in either the right or left hand without extension across the user's body while maintaining the position of the shield in front of the user's body. | 01-29-2009 |
20110274486 | Barrier - A barrier that includes attack resistant pane(s) (see DEFINITIONS section). In this way, a person behind the barrier can be protected when they are outside. More specifically, the person behind the barrier is protected, at least to some extent, from both: (i) vehicular attacks; and (ii) blast (for example, bombs) and/or ballistic (for example, bullet) attacks. Also, the protected person can see what is happening across the barrier because of the attack-resistant pane(s). Also, if the barrier is unanchored then it can be moved from place to place, for example, by heavy equipment, so that the same barrier can be re-deployed at different outdoor locations (or indoor locations) on an as-needed basis. Preferably, the barrier also includes framing pieces that secure the attack-resistant pane(s) to the body of the barrier, with the framing pieces being covered on one side by an attack-resistant material (preferably, hardened steel). | 11-10-2011 |
20120159881 | BALLISTIC/BLAST RESISTANT WINDOW ASSEMBLY - An attack-resistant window assembly that can be easily maintained without requiring the use of tools. The attack-resistant window assembly includes a slidable plate for securing the attack-resistant pane into the window assembly. The window assembly also has ballistic-resistant armor around the peripheral sides of the ballistic-resistant pane to prevent bullets from exiting the peripheral sides of the ballistic-resistant pane and coming into the space on the protected side of the window assembly. | 06-28-2012 |
20120291619 | BARRIER - A barrier formed from a plurality of identical modular units that have an essentially planar front panel and triangular shaped top and bottom plates extending rearward from the front panel. Adjacent units are interconnected to one another at their terminal vertices by a square tubular member. A square shaped opening is formed approximately centrally through each of the triangular shaped plates. In addition, elongated linkages may be provided at about the midpoint of each side edge for purposes of interconnecting units that are positioned adjacent to another unit so as to assist in the formation of the overall barrier. The linkages provide pivotal movement between adjacent barriers through a range of angles from about 90 degrees (to provide a corner arrangement) to 180 degrees (to provide a straight wall arrangement). | 11-22-2012 |
20130284002 | BARRIER - A barrier that includes attack resistant pane(s) (see DEFINITIONS section). In this way, a person behind the barrier can be protected when they are outside. More specifically, the person behind the barrier is protected, at least to some extent, from both: (i) vehicular attacks; and (ii) blast (for example, bombs) and/or ballistic (for example, bullet) attacks. Also, the protected person can see what is happening across the barrier because of the attack-resistant pane(s). Also, if the barrier is unanchored then it can be moved from place to place, for example, by heavy equipment, so that the same barrier can be re-deployed at different outdoor locations (or indoor locations) on an as-needed basis. Preferably, the barrier also includes framing pieces that secure the attack-resistant pane(s) to the body of the barrier, with the framing pieces being covered on one side by an attack-resistant material (preferably, hardened steel). | 10-31-2013 |
20140013935 | DEFENSIVE PANEL ACCESS PORT - A threat resistant access port is disclosed, including a resistant panel having an access aperture formed therein. A resistant cover is movably coupled to the panel, the cover being pivotally slideable relative to the panel so as to cover the aperture in a closed position and to uncover the aperture in an open position. The resistant cover comprises an outer member, the outer member being threat resistant and located proximate an outer side of the panel. The resistant cover further comprises an inner member, the inner member coupled to the outer member and located proximate an inner side of the panel opposite the outer side of the panel. | 01-16-2014 |
20140216239 | Barrier - A barrier formed from a plurality of identical modular units that have an essentially planar front panel and triangular shaped top and bottom plates extending rearward from the front panel. Adjacent units are interconnected to one another at their terminal vertices by a square tubular member. A square shaped opening is formed approximately centrally through each of the triangular shaped plates. In addition, elongated linkages may be provided at about the midpoint of each side edge for purposes of interconnecting units that are positioned adjacent to another unit so as to assist in the formation of the overall barrier. The linkages provide pivotal movement between adjacent barriers through a range of angles from about 90 degrees (to provide a corner arrangement) to 180 degrees (to provide a straight wall arrangement). | 08-07-2014 |