Patent application number | Description | Published |
20120166939 | Multi-view graphical user interface for editing a base document with highlighting feature - A computationally implemented method includes, but is not limited to: receiving indication of an election of a rules packet, the elected rules packet including one or more rules for selecting one or more selective parts of a base document for selective presentation; and presenting a graphical user interface (GUI) for editing the base document, the GUI including at least a first view for displaying at least a segment of the base document and a second view for displaying at least a segment of the one or more selective parts of the base document selected based on the elected rules packet, the segment of the base document to be displayed through the first view including at least a portion of the one or more selective parts of the base document, and the portion of the one or more selective parts of the base document to be displayed through the first view being highlighted in the first view. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 06-28-2012 |
20120166940 | Multi-view graphical user interface for editing a base document with highlighting feature - A computationally implemented method includes, but is not limited to: receiving indication of an election of a rules packet, the elected rules packet including one or more rules for selecting one or more selective parts of a base document for selective presentation; and presenting a graphical user interface (GUI) for editing the base document, the GUI including at least a first view for displaying at least a segment of the base document and a second view for displaying at least a segment of the one or more selective parts of the base document selected based on the elected rules packet, the segment of the base document to be displayed through the first view including at least a portion of the one or more selective parts of the base document, and the portion of the one or more selective parts of the base document to be displayed through the first view being highlighted in the first view. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 06-28-2012 |
Patent application number | Description | Published |
20130331176 | SELECTING A WAGER FOR AN EVENT - Technologies are generally described for processes and systems effective to select or determine a wager for an event. A wager processor may be configured to be in communication with a wager database and an event status processor over a network. The wager processor may be effective to receive event information and crowd information. The event information may relate to a status of the event. The crowd information may relate to demographics and/or interests of the participants at the event. The wager processor may select or determine the wager based on the event information and the crowd information. | 12-12-2013 |
20130332246 | DISPLAY OF ADVERTISEMENTS AT AN EVENT - Technologies are generally described for processes and systems effective to select an advertisement to be displayed for viewing by participants at an event. An advertisement processor may be configured to be in communication with an advertisement database and an event status processor over a network. The advertisement processor may be effective receive event information and crowd information. The event information may relate to a status of the event. The crowd information may relate to demographics and/or interests of the participants at the event. The advertisement processor may select the advertisement based on the event information and the crowd information. | 12-12-2013 |
20130332485 | INFORMATION REMOVAL FROM A NETWORK - Technologies are generally described for systems, methods and devices effective to remove information from a network such as the Internet. In some examples, a device may include a memory including instructions and a processor configured in communication with the memory. The processor may be configured effective to receive user information relating to a user and search the network using the user information. In response to the search, the processor may find additional information relating to the user stored in the network. The processor may receive a first request to remove particular information from the network. The particular information may be part of the additional information and the particular information may be removable by a second user. The processor may send a second request to remove the particular information from the network. | 12-12-2013 |
20130339123 | GROUP NATURE VERIFICATION FOR PROVIDING GROUP INCENTIVES - Technologies are provided for verifying the group nature of a consumer request to provide a group incentive. In some examples, a consumer may purchase goods and services from a merchant over a network, and may request to take advantage of a group incentive associated with an established group. The merchant may verify that the consumer is a member of the established group before allowing the consumer to receive or use the group incentive. Upon receiving the request associated with the group incentive, the merchant may identify attributes of the consumer and/or the group the consumer claims to belong to. If the attributes match a commonality criterion, the incentive may be authorized. Additionally, the merchant may require a physical appearance of the consumer along with other group members in order to utilize the group incentive. | 12-19-2013 |
20130339175 | ON DEMAND INFORMATION NETWORK - In one example, a user interface may be configured to receive input from a hosting device, a transmitter may be configured to solicit competing bids to subscribing devices for a requested service based on the input from the hosting device, a queue may be configured to store bids from third-parties in response to the transmitted request for bids for the requested service, and a receiver may be configured to receive a manifestation of the requested service from one of the third-parties whose received bid was accepted. | 12-19-2013 |
20130339241 | TRANSACTIONAL PERMISSIONS - In one example a computer-readable medium storing computer-executable components that comprise, at least, a guardian component configured to receive, from an authoritative entity, conditions upon which a potential transaction for a deferring entity may be authorized; and a transactional component configured to receive, from a transacting entity, a request for authorization for an actual transaction with the deferring entity, and to transmit, to the transacting entity, a determination as to whether the request for authorization for the actual transaction is acceptable in view of the stored conditions. | 12-19-2013 |
20140032663 | AUTOMATIC CONTENT FORWARDING TO COMMUNICATION NETWORKS - Technologies are provided for identifying context associated with received content and automatically forwarding the content to an associated communication network for posting. In some examples, a user may create content for posting to one or more communication networks and send the content over a network for posting to a first communication network. Upon receipt of the content for posting, the first communication network may identify a context of the received content and may associate the context with a second communication network based on a set of content forwarding rules. The first communication network may automatically forward the received content to the associated second communication network for posting at the second communication network. Additionally, a third party entity may be configured to monitor content received at a first communication network, identify a context of the received content, and automatically forward the received content to the associated second communication network for posting. | 01-30-2014 |
20140143410 | MONITORING A PERFORMANCE OF A COMPUTING DEVICE - Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource. | 05-22-2014 |
20140165197 | MALWARE ATTACK PREVENTION USING BLOCK CODE PERMUTATION - Technologies are generally described for systems and methods configured to produce an executable code. In some examples, a developer may send machine language code to a system manager. The machine language code may include two or more machine language blocks and linking information. The system manager may include a processor configured to permute the machine language blocks to produce permuted machine language code. The processor may modify the linking information based on the permuted machine language code to produce modified linking information. The processor may link the permuted machine language code with use of the modified linking information to produce the executable code. | 06-12-2014 |
20140289392 | INSTANCE MONITOR - Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program. | 09-25-2014 |
20140330958 | COMPUTING DEVICE PERFORMANCE MONITOR - Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value. | 11-06-2014 |
20150029217 | COMPOSITE DISPLAY WITH MULTIPLE IMAGING PROPERTIES - Technologies are generally described for systems and methods effective to output a composite image. In some examples, a processor may be configured to receive first and second display data that relate to a first and second image. The processor may identify an overlap region where the first display overlaps the second display and generate imaging instructions effective to cause the first and second image to be output on the first display and second display, respectively. The processor may further modify the first imaging instructions based on the overlap region to produce a modified first imaging instruction. The processor may send the modified first imaging instruction to the first display so that the first image is output on the first display at a first resolution. The processor may send the second imaging instruction to the second display so that the second image is output on the second display at a second resolution. | 01-29-2015 |
20150050898 | AGGREGATION OF BANDWIDTH FROM MULTIPLE WIRELESS DEVICES - Technologies are generally described for an aggregation of bandwidth from multiple wireless devices. In some examples, a source device may communicate with a destination device at a first bandwidth. The source device may divide data into a first piece and a second piece. The source device may transmit the first piece to a first wireless device and the second piece to a second wireless device over a first network. The first wireless device and second wireless device may communicate with the destination device at a second bandwidth and a third bandwidth respectively. The first bandwidth may be less than an aggregation of the second bandwidth and the third bandwidth. The first wireless device may transmit the first piece over a second network, different from the first network, to the destination device. The second wireless device may transmit the second piece over a third network, different from the first network, to the destination device. | 02-19-2015 |
20150070388 | AUGMENTED REALITY ALTERATION DETECTOR - Technologies are generally described for systems and methods effective to detect an alteration in augmented reality. A processor may receive a real image that corresponds to a real object and may receive augmented reality instructions to generate a virtual object. The processor may determine that the virtual object at least partially obscures the real object when the virtual object is rendered on a display. The processor may, upon determining that the virtual object at least partially obscures the real object when the virtual object is rendered on the display, simulate an activity on the real object to produce a first activity simulation and simulate the activity on the virtual object to produce a second activity simulation. The processor may determine a difference between the first and the second activity simulation and modify the augmented reality instructions to generate a modified virtual object in response to the determination of the difference. | 03-12-2015 |
20150181632 | LINE OF SIGHT INITIATED HANDSHAKE - Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake The first and second communication devices can thereafter share data. | 06-25-2015 |