Howell, WA
Ben Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20160132301 | PROGRAMMATIC USER INTERFACE GENERATION BASED ON DISPLAY SIZE - Non-limiting examples of the present disclosure describe programmatic generation of a user interface for display on a processing device. A display class is determined from a plurality of display classes based on a detected display size of a processing device on which the user interface is to display. Prior to instantiating a user interface window, a stored user interface definition is identified and interpreted. The stored user interface definition comprises at least one programmed command object. A displayed user interface is instantiated on the processing device, where the displayed user interface comprises at least one user interface element. The user interface element is programmatically generated by translating the programmed command object of the user interface definition into the user interface element based on operations set in accordance with the determined display class. Other examples are also described. | 05-12-2016 |
Benjamin Rea Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150277708 | COMMAND USER INTERFACE FOR DISPLAYING AND SCALING SELECTABLE CONTROLS AND COMMANDS - Methods and systems are provided for an improved user interface for displaying and scaling selectable software commands and controls in at least one of a first ribbon and a second ribbon. Underneath a first ribbon of top-level command tabs, selectable controls associated with a selected command tab are presented in logical subgroups or chunks. The selectable controls within the chunks are granularly scaled to accommodate different screen sizes or changes in window size. The scaling includes moving a subset of the selectable controls within at least one of the chunks between an overflow pane and the second ribbon. | 10-01-2015 |
Brett Howell, Spokane Valley, WA US
Patent application number | Description | Published |
---|---|---|
20130153682 | ROTATING NOZZLE WITH SPEED REDUCTION FEATURES - A rotational nozzle for distributing fluid is provided. The rotational nozzle is provided to fit within confined volumes, such as storage tanks and provide a broad spray pattern or area of coverage. Braking means for selectively adjusting rotational characteristics of a nozzle head are provided. | 06-20-2013 |
20130216417 | ROTARY LOBE PUMP WITH WIPER BLADES - A positive displacement rotary pump with an improved impeller design integrating replaceable wiper inserts. The impeller generally has or more lobes and an equal number of conjugate surfaces. Each lobe has an arcuate peripheral end comprising a plurality of wiper blades. The wiper blades improve efficiency by making a seal with a pump chamber or the conjugate surface on the other impeller as it rotates. The wiper blades are arranged such that constant and successive contact between wiper blades and impellers is achieved. | 08-22-2013 |
20150285248 | ROTARY LOBE PUMP WITH WIPER BLADES - A positive displacement rotary pump with an improved impeller design integrating replaceable wiper inserts. The impeller generally has one or more lobes and an equal number of conjugate surfaces. Each lobe has an arcuate peripheral end comprising a plurality of wiper blades. Each lobe further has a facial wiper blade on each face of the lobe. The wiper blades improve efficiency by making a seal with a pump chamber or the conjugate surface on the other impeller as it rotates. The wiper blades are arranged such that constant and successive contact between wiper blades and impellers is achieved. | 10-08-2015 |
Curtis John Howell, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20130081010 | TEMPLATE AND SERVER CONTENT DOWNLOAD USING PROTOCOL HANDLERS - A protocol handler that is registered to handle URLs that follow a protocol that is associated with a client application initiates content downloads from a network location. When a Uniform Resource Locator (URL) is selected from a browser, the protocol handler passes the URL to the client application registered to handle the protocol. The client application parses the URL and determines the actions to perform based on the content identified in the URL. A client application may perform many different actions, such as: downloading the identified content; downloading any additional content (e.g. related files) associated with the identified content; place the downloaded content on a clipboard; automatically display downloaded content within a display; and the like. When the application is not installed on the client machine, information may be provided to the user to assist in interacting with the content identified by the URL. | 03-28-2013 |
David Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140265125 | Game Piece and Methods of Making and Using Same - A game piece that has a central layer and domed clear top and bottom layers is disclosed. The domed clear layers are affixed to and cover respective top and bottom faces of the central layer. The game piece also has at least one printed label that is affixed between the top layer and the central layer. The dome shape of the top and bottom layers assure that, when the game piece is resting on a gaming surface, the edge of the central layer of the piece is not in contact with the gaming surface. Methods of making and using the game piece are also disclosed. | 09-18-2014 |
David A. Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090290692 | Unified Messaging Architecture - A system and/or methodology that unifies a telephonic communication component and/or system with a data (e.g., messaging) server component and/or system. The system can facilitate telephonically accessing rich information in the server (e.g., messaging server). This rich information can include email content, calendar content, contacts information, or the like. Moreover, with access to an application programming interface, the invention can add functionality to initiate email communications as well as to accept or cancel meetings. Furthermore, the invention can synchronize messages of disparate formats. By way of example a user can set an “Out of Office” (OOF) status on both an email systems and telephone voicemail system from one location in one action. In another aspect, it will be appreciated that any message or data component can be analyzed, transformed, matched and/or communicated from one system to another (e.g., server to telephone) in accordance with the subject invention. | 11-26-2009 |
20110216889 | Selectable State Machine User Interface System - A system that concurrently provides multiple user interface (UI) mechanisms that facilitate control of an application state machine (e.g., unified message system). More particularly, the invention can create two relatively distinct user experiences, one via dual tone multi-frequency (DTMF) navigation and another through speech recognition navigation of a unified message system. In accordance therewith, one single underlying state machine can be used. Navigation and flow control (e.g., state transitions) in the state machine can be leveraged by multiple UI mechanisms that actively co-exist. The invention introduces speech recognition features together with other input mechanisms to drive the UI of an application state machine (e.g., unified messaging system). The speech recognition UI can be designed to provide a natural navigation through the application independent of a DTMF UI. | 09-08-2011 |
20130003948 | PROVIDING CONTEXTUAL INFORMATION WITH A VOICEMAIL MESSAGE - Aspects of the present invention are directed at obtaining contextual information with a voicemail message. In accordance with one embodiment, a method is provided that obtains additional contextual information that is not obtained automatically when a voicemail message is received. More specifically, the method includes automatically obtaining a first set of contextual information from a client associated with the caller when the caller is transferred to a voicemail system. Then a determination is made regarding whether the callee requests that additional contextual information be obtained. If the callee requests that additional contextual information be obtained, the requested information is obtained from a third-party service or by prompting the caller. | 01-03-2013 |
Gareth Howell, Bethell, WA US
Patent application number | Description | Published |
---|---|---|
20120203826 | TECHNIQUES TO AUTOMATICALLY SYNDICATE CONTENT OVER A NETWORK - Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a processor and computer-readable medium. The computer readable medium may store program instructions for a syndication manager component communicatively coupled to a content producing component arranged to be executed by the processor. The syndication manager component may be operative to receive syndication content from the content producing component, and provide a syndication dialog through the content producing component to syndicate the syndication content using a content delivery platform. The syndication manager component may also syndicate the syndication content to form a syndication resource accessible from the content delivery platform over a network using a syndication referent. Other embodiments are described and claimed. | 08-09-2012 |
20150074185 | TECHNIQUES TO AUTOMATICALLY SYNDICATE CONTENT OVER A NETWORK - Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a processor and computer-readable medium. The computer readable medium may store program instructions for a syndication manager component communicatively coupled to a content producing component arranged to be executed by the processor. The syndication manager component may be operative to receive syndication content from the content producing component, and provide a syndication dialog through the content producing component to syndicate the syndication content using a content delivery platform. The syndication manager component may also syndicate the syndication content to form a syndication resource accessible from the content delivery platform over a network using a syndication referent. Other embodiments are described and claimed. | 03-12-2015 |
Gareth Howell, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20100153486 | TECHNIQUES TO AUTOMATICALLY SYNDICATE CONTENT OVER A NETWORK - Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a processor and computer-readable medium. The computer readable medium may store program instructions for a syndication manager component communicatively coupled to a content producing component arranged to be executed by the processor. The syndication manager component may be operative to receive syndication content from the content producing component, and provide a syndication dialog through the content producing component to syndicate the syndication content using a content delivery platform. The syndication manager component may also syndicate the syndication content to form a syndication resource accessible from the content delivery platform over a network using a syndication referent. Other embodiments are described and claimed. | 06-17-2010 |
Gareth Howell, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20110128290 | Strategies for Processing Media Information Using a Plug-In Processing Module in a Path-Agnostic Manner - A media processing framework includes multiple media processing paths. At least one of the media processing paths includes a media processing pipeline which is in-process with respect to an application which interacts with the media processing pipeline. At least one other of the media processing paths includes a media processing pipeline which is out-of-process with respect to the application. The application can specify a custom plug-in presenter module to be set in either the in-process media processing pipeline or the out-of-process media processing pipeline. The application need not be “aware” of the pipeline that is being used, whether the pipeline is in-process or out-of-process, or the security level that is applied to the media processing pipeline. Both the in-process and the out-of-process media processing pipelines can supply media information to a presentation processor, such as a compositing engine. | 06-02-2011 |
Gareth A. Howell, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20110276897 | STREAMLINED COLLABORATION ON DOCUMENT - Collaborating on documents by e-mail may be streamlined into a unified process. In one example, a user creates a document in an online document service, and sends the document to collaborators by mailing a link to the document. The document may have permissions set so that the creator of the document, and any user on the e-mail distribution list, can read and edit the document. When a user receives the e-mail, that user may open and edit the document. Upon closing the editing application, the user may be presented with an appropriate interface to create a reply e-mail. | 11-10-2011 |
Gareth A. Howell, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20090205034 | System for Running Potentially Malicious Code - Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process. | 08-13-2009 |
Gareth Alan Howell, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20100218086 | FONT HANDLING FOR VIEWING DOCUMENTS ON THE WEB - A request is received for a rendered document corresponding to a document. The document is retrieved from a storage device. The document is transformed into the rendered document. One or more server font files associated with the rendered document are generated. The rendered document and the server font files are stored. | 08-26-2010 |
20100229086 | CONTENT RENDERING ON A COMPUTER - Portions of content are transformed into portions of rendered content. While the portions of the content are being transformed into portions of the rendered content, each discrete portion of the rendered content can be provided to the application program after that portion is completed. | 09-09-2010 |
20120331377 | Content Rendering on a Computer - Portions of content are transformed into portions of rendered content. While the portions of the content are being transformed into portions of the rendered content, each discrete portion of the rendered content can be provided to the application program after that portion is completed. | 12-27-2012 |
Gary L. Howell, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20100042451 | Risk management decision facilitator - Methods and systems for facilitating risk management decisions are provided. Example embodiments provide a Risk Management Decision Facilitator System “RMDFS”, which enables users to normalize all risk management decisions so that they are made consistently, in-line with entity policy, regardless of who is making them and their point in a product lifecycle. An example RMDFS accomplish these goals by providing components and processes that are linked together using a normalized risk matrix, so that all decisions are viewed against a standardized set of severity terms, likelihood terms, and risk classifications regardless of the particulars of the product or process being manipulated. All problem assessments, risk assessments, and risk controls are automatically evaluated quantitatively and qualitatively. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 02-18-2010 |
Jason W. Howell, Maple Valley, WA US
Patent application number | Description | Published |
---|---|---|
20090123340 | WATER QUALITY MONITORING DEVICE AND METHOD - A monitor device is attached to the water supply line of a consumer where it repeatedly measures a characteristic that correlates to quality of water in the water line. Each of a succession of a water quality values is derived from one or more of the measurements. The process continues at selected intervals to continuously monitor the condition of water in the line. Each new value can be compared to a reference value representing a maximum acceptable level of contaminants. If the water quality value exceeds the reference value, an overvalue signal is produced, indicating an unacceptable level of contaminants in the water. Additionally, the values can be transmitted to a central collection facility where they are correlated with values transmitted by similar devices on the supply lines of other consumers to track the quality of water of a supply system over time. | 05-14-2009 |
Jon Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110264787 | CAPTURING WEB-BASED SCENARIOS - This patent application pertains to capturing web-based scenarios. One example detects execution of a web application. This example also automatically captures non-deterministic events of the execution in a manner that is transparent to a user of the web application. | 10-27-2011 |
Jon Howell, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130218731 | EMBEDDED WIRELESS CLOUD CONNECTOR - The current invention is directed to embedded, wireless cloud-connector devices and systems that allow the embedded, wireless cloud-connector devices to be deployed in a variety of embedding devices, applications, and uses. The embedded, wireless, cloud-connector devices to which the current application is directed are implemented using a single integrated circuit, or set of integrated-circuit chips, and each interfaces to a device, product, or system in which the cloud-connector devices are embedded as subcomponents as well as to a communications-services provider. The cloud-connector devices provide data exchange between devices, products, and systems in which they are embedded and cloud providers that provide cloud-computing services, data-message routing, and wireless services through wireless carriers. Embedded, wireless cloud-connector devices, and the systems that interconnect and manage them, allow cloud-providers to extend the cloud-computing domain into many different types of low-cost and geographically dispersed markets and areas of use. | 08-22-2013 |
Jonathan Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110302449 | COLLECTION ORDERING FOR REPLICATED STATE MACHINES - A replicated state machine with N replica servers may be configured to tolerate a count of F faults. A first operation (of a first ordering type) executes when a first quorum of correctly functioning replicas is available. A second operation (also of the first operation type) executes when a second quorum of correctly functioning replicas is available. A third operation (of a second ordering type) executes when a third quorum of correctly functioning replicas are available. The operations are executed by the replicated state machine such that: (1) the replicated state machine does not guarantee operational ordering between the first operation and the second operation; (2) the replicated state machine guarantees ordering between the first operation and the third operation; and (3) the replicated state machine guarantees ordering between the second operation and the third operation. | 12-08-2011 |
Jonathan R. Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080238941 | Adding custom content to mapping applications - Digital maps can be composed of a series of image tiles that are selected based on the context of the map to be presented. Independently hosted tiles can comprise additional details that can be added to the map. A manifest can be created that describes the layers of map details composed of such independently hosted tiles. Externally referable mechanisms can, based on the manifest and map context, select tiles, from among the independently hosted tiles, that correspond to map tiles being displayed to a user. Subsequently, the mechanisms can instruct a browser, as specified in the manifest, to combine the map tiles and the independently hosted tiles to generate a more detailed map. Alternatively, customized mechanisms can generate map detail tiles in real-time, based on an exported map context. Also, controls instantiated by the browser can render three-dimensional images based on the combined map tiles. | 10-02-2008 |
20090037441 | TILED PACKAGING OF VECTOR IMAGE DATA - Architecture for encoding (or packaging) vector-object data using fixed boundary tiles. Tiling a large vector database provides the same advantages that tiling provides for a large raster image. Tiling the dataset means that the set of all possible browser requests is finite and predetermined. The tiles can be rasterized on a client once the tiles have been received from a server. Alternatively, the server can do the tiling and rasterizing, and then send the raster data to the client for presentation and user interaction. Tiles can be precomputed on the server, with selected tiles then transmitted to the client for rasterization. Moreover, tiles can be cached for improved performance, and prefetched based on user interactivity on the client. Summarization of the vector-object data can be accomplished at the server using a configurable plug-in interface. | 02-05-2009 |
20090210388 | EFFICIENTLY DISCOVERING AND SYNTHESIZING MAPS FROM A LARGE CORPUS OF MAPS - Intent of a user is determined with respect to mapping information. A search is performed for relevant maps from a plurality of disparate sources. A subset of maps from a superset of available maps are identified that correlate to the determined intent, and the subset of maps are fused or synthesized to create a single map view that aggregates and combines relevant content from respective maps of the subset. | 08-20-2009 |
20090324134 | SPLITTING FILE TYPES WITHIN PARTITIONED IMAGES - The claimed subject matter provides a system and/or a method that facilitates optimally and efficiently utilizing an image file format. A server can host an image that is partitioned into two or more tiles, wherein the two or more tiles collectively represent the image in entirety and are defined in at least one image file format. A tile generator can evaluate at least one tile to identify a suitable image file format based upon at least one of a characteristic of such file format or a context of a use for the tile. A browser can utilize the tile in the identified file format in order to render a portion of the image. | 12-31-2009 |
20100287618 | Executing Native-Code Applications in a Browser - Techniques for leveraging legacy code to deploy native-code desktop applications over a network (e.g., the Web) are described herein. These techniques include executing an application written in native code within a memory region that hardware of a computing device enforces. For instance, page-protection hardware (e.g., a memory management unit) or segmentation hardware may protect this region of memory in which the application executes. The techniques may also provide a narrow system call interface out of this memory region by dynamically enforcing system calls made by the application. Furthermore, these techniques may enable a browser of the computing device to function as an operating system for the native-code application. These techniques thus allow for execution of native-code applications on a browser of a computing device and, hence, over the Web in a resource-efficient manner and without sacrificing security of the computing device. | 11-11-2010 |
20100312858 | NETWORK APPLICATION PERFORMANCE ENHANCEMENT USING SPECULATIVE EXECUTION - A speculative web browser engine may enable providing transmission of content between a server and a client prior to a user-initiated request for the content hidden in imperative code (event handlers), which may reduce user-perceived latency when the user initiates the imperative code. In some aspects, a speculative browser state may be created from an actual browser state and used to run the event handlers. The event handlers may be modified to direct actions of the event handler to update the speculative browser state. Speculative content may be transmitted between the server and the client in response to an execution of the modified code. The speculative content may be stored in a cache and made readily available for use when the user initiates the event handler and finds that the desired content has already been fetched. | 12-09-2010 |
20100318630 | Leveraging Remote Server Pools for Client Applications - Techniques for enabling client computing devices to leverage remote server pools for increasing the effectiveness of applications stored on the client computing device are described herein. In some instances, the server pools comprise a “cloud”, “cluster” or “data center” that comprises hundreds or thousands of servers connected together by a network that has an extremely low latency and high bandwidth relative to the network through which the client computing device connects to the server pool. The client computing device may request that the server pool perform a certain task for an application whose canonical state resides on the client. After computation of a result of the task, a server of the server pool then provides the result to the client. By doing so, the techniques dramatically increase the amount of resources working on the request of the client and, hence, dramatically increase the speed and effectiveness of the client-side application. | 12-16-2010 |
20110154244 | Creating Awareness of Accesses to Privacy-Sensitive Devices - Techniques for providing intuitive feedback to a user regarding which applications have access to a data stream captured by a privacy-sensitive device, such as a camera, a microphone, a location sensor, an accelerometer or the like. These techniques apprise the user of when an application is receiving potentially privacy-sensitive data and the identity of the application receiving the data. In some instances, this feedback comprises a graphical icon that visually represents the data stream being received and that dynamically alters with the received data stream. For instance, if an application receives a data stream from a camera of a computing device of the user, the described techniques may display an image of the video feed captured by the camera and being received by the application. This graphical icon intuitively alerts the user of the data stream that the application receives. | 06-23-2011 |
20110258290 | Bandwidth-Proportioned Datacenters - A system including at least one storage node and at least one computation node connected by a switch is described herein. Each storage node has one or more storage units and one or more network interface components, the collective bandwidths of the storage units and the network interface components being proportioned to one another to enable communication to and from other nodes at the collective bandwidth of the storage units. Each computation node has logic configured to make requests of storage nodes, an input/output bus, and one or more network interface components, the bandwidth of the bus and the collective bandwidths of the network interface components being proportioned to one another to enable communication to and from other nodes at the bandwidth of the input/output bus. | 10-20-2011 |
20110258297 | Locator Table and Client Library for Datacenters - A system including a plurality of servers, a client, and a metadata server is described herein. The servers each store tracts of data, a plurality of the tracts comprising a byte sequence and being distributed among the plurality of servers. To locate the tracts, the metadata server generates a table that is used by the client to identify servers associated with the tracts, enabling the client to provide requests to the servers. The metadata server also enables recovery in the event of a server failure. Further, the servers construct tables of tract identifiers and locations to use in responding to the client requests. | 10-20-2011 |
20110258482 | Memory Management and Recovery for Datacenters - A system including a plurality of servers, a client, and a metadata server is described herein. The servers each store tracts of data, a plurality of the tracts comprising a byte sequence and being distributed among the plurality of servers. To locate the tracts, the metadata server generates a table that is used by the client to identify servers associated with the tracts, enabling the client to provide requests to the servers. The metadata server also enables recovery in the event of a server failure. Further, the servers construct tables of tract identifiers and locations to use in responding to the client requests. | 10-20-2011 |
20110307817 | Secure Application Interoperation via User Interface Gestures - Techniques for facilitating secure application interoperation via user interface (UI) gestures in computing devices that strictly isolate applications operating thereon are described herein. For instance, applications may define one or more specific UI gestures that, when executed by the user, express that the user desires for the computing device to allow for an instance of directed, ephemeral, by-value communication between two isolated applications. In some implementations, the gesture is an atomic gesture, such as a drag-and-drop operation. That is, the gesture is one that the user completes continuously and without interruption. | 12-15-2011 |
20120158396 | Application Compatibility Shims for Minimal Client Computers - This document describes techniques for allowing a computing device that provides a minimal execution environment to execute legacy applications that rely on rich functionality that the computing device does not natively provide. For instance, a device may initially receive a request to execute an application and may determine whether the application is directly executable. In response to determining that the application is not directly executable, the computing device may determine whether the application specifies another application to provide the functionality. If the application specifies another application to provide this functionality, then the computing device retrieves the specified application and executes the specified application on the client computing device. If the application does not specify such an application, then the computing device may execute a default application for providing the functionality. The specified or default application then executes the application that is not directly executable on the minimal-execution-environment computing device. | 06-21-2012 |
20120166590 | Reading and Writing During Cluster Growth Phase - A client device configured to write to both a growth server and a live server replica that the growth server is replacing during a growth phase is described herein. The client device first determines the growth server designated to replace a corresponding live server replica of a set of server replicas associated with a storage index. The client device then transmits a write request associated with the storage index to the set of server replicas and to the growth server. The client device may perform the determining based on storage assignment mappings. The storage assignment mappings are provided to the client device by a metadata server while the growth server retrieves data associated with the storage index from the live server replica. | 06-28-2012 |
20130036431 | Constraining Execution of Specified Device Drivers - Techniques for allowing peripheral-device manufacturers to specify drivers for use with these devices and then loading these manufacturer-specified drivers in a manner that constrains operation of the drivers are described herein. In some instances, the techniques constrain operation of the drivers by loading these drivers into isolated containers. By loading such a driver into an isolated container, the techniques protect the host computer from harm caused by a buggy or malicious device driver. Furthermore, by loading a device driver that a manufacturer of the corresponding device specifies, the techniques allow this manufacturer to select a driver that is unlikely to harm the peripheral device itself In tandem, the techniques provide a framework that protects both the peripheral device and the host computer to which the peripheral device couples. | 02-07-2013 |
20150237033 | Creating Awareness of Accesses to Privacy-Sensitive Devices - Techniques for providing intuitive feedback to a user regarding which applications have access to a data stream captured by a privacy-sensitive device, such as a camera, a microphone, a location sensor, an accelerometer or the like. These techniques apprise the user of when an application is receiving potentially privacy-sensitive data and the identity of the application receiving the data. In some instances, this feedback comprises a graphical icon that visually represents the data stream being received and that dynamically alters with the received data stream. For instance, if an application receives a data stream from a camera of a computing device of the user, the described techniques may display an image of the video feed captured by the camera and being received by the application. This graphical icon intuitively alerts the user of the data stream that the application receives. | 08-20-2015 |
20150371439 | Addiing Custom Content To Mapping Applications - Digital maps can be composed of a series of image tiles that are selected based on the context of the map to be presented. Independently hosted tiles can comprise additional details that can be added to the map. A manifest can be created that describes the layers of map details composed of such independently hosted tiles. Externally referable mechanisms can, based on the manifest and map context, select tiles, from among the independently hosted tiles, that correspond to map tiles being displayed to a user. Subsequently, the mechanisms can instruct a browser, as specified in the manifest, to combine the map tiles and the independently hosted tiles to generate a more detailed map. Alternatively, customized mechanisms can generate map detail tiles in real-time, based on an exported map context. Also, controls instantiated by the browser can render three-dimensional images based on the combined map tiles. | 12-24-2015 |
20160098562 | Automated Verification of a Software System - Software code of a software system (e.g., a software stack) may be verified as conforming to a specification. A high-level language implementation of the software system may be compiled using a compiler to create an assembly language implementation. A high-level specification corresponding to the software system may be translated to a low-level specification. A verifier may verify that the assembly language implementation functionally conforms to properties described in the low-level specification. In this way, the software system (e.g., a complete software system that includes an operating system, device driver(s), a software library, and one or more applications) may be verified at a low level (e.g., assembly language level). | 04-07-2016 |
20160099811 | End-to-End Security For Hardware Running Verified Software - A verified software system may be executable on secure hardware. Prior to being executed, the software system may be verified as conforming to a software specification. First credentials attesting to an identity of the software system may be sent to an external application. Second credentials signed by a provider of the secure hardware may be sent to the external application. The second credentials may attest to an identity of the secure hardware. The external application may securely exchange one or more messages with a software application of the software system. For example, the one or more messages may be decryptable only by the external application and the software application to provide confidentiality for each message. As another example, an attestation may vouch for an identity of a sender of each of the one or more messages to attest to an integrity of each message. | 04-07-2016 |
Jonathan Ryan Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080313648 | PROTECTION AND COMMUNICATION ABSTRACTIONS FOR WEB BROWSERS - Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween. | 12-18-2008 |
20090076965 | COUNTERACTING RANDOM GUESS ATTACKS AGAINST HUMAN INTERACTIVE PROOFS WITH TOKEN BUCKETS - A system and method that facilitates and effectuates distinguishing a human from a non-human user. A human interactive proof (HIP) employs a token bucket algorithm in order to reduce the success rate for a non-human user employing a guessing or artificial intelligence to solve a substantial number of HIP challenges. The algorithm can employ token buckets associated with IP address and user session from which the user is attempting to solve the HIP challenge. If a token bucket is empty the algorithm can treat a correct response as incorrect and refill a portion of the buckets for a further attempt. This forces two correct responses to be received by a user within the refill quantity for the users bucket(s) before the user is identified as human. | 03-19-2009 |
20090077628 | HUMAN PERFORMANCE IN HUMAN INTERACTIVE PROOFS USING PARTIAL CREDIT - A system and method that facilitates and effectuates distinguishing a human from a non-human user. A human interactive proof (HIP) employs a partial credit algorithm in order to allow a user to make one or more mistakes during consecutive HIP challenges and still be identified as a human. The algorithm assigns a user partial credit based upon getting part of the challenge incorrect. The partial credit is tracked and if during one or more consecutive subsequent challenges the same user gets a portion of the challenge incorrect again, they can still be identified as human. | 03-19-2009 |
20090077629 | INTEREST ALIGNED MANUAL IMAGE CATEGORIZATION FOR HUMAN INTERACTIVE PROOFS - A system and method that facilitates and effectuates distinguishing a human from a non-human user. A human interactive proof (HIP) employs images from a large private database of manually categorized images to display as part of a Turing test challenge. The private database contains a sufficient quantity of images, such that the more economical manner to pass the HIP is to employ a human to take the challenge. The owner of the private database makes the database available to the presenter of the HIP due to an alignment of interests between both parties. The HIP is displayed with ads on behalf of the owner of the private database and the presenter of the HIP gains access to a large quantity of private manually categorized images. | 03-19-2009 |
20090210526 | DOMAIN NAME CACHE CONTROL - Domain name caching is controlled by adding a nonce to a domain name to force propagation of lookup to an authoritative server or service. Desired caching behavior is dictated by controlling when a new and unique nonce-bearing name is created. For example, caching can be completely eliminated by generating a new nonce-bearing name for every request. While a nonce can simply correspond to a random or pseudo random value, it can also be time based. Furthermore, nonces can be phase or time shifted to limit authoritative server load as well as improve response time. | 08-20-2009 |
20090216903 | DEFEATING CACHE RESISTANT DOMAIN NAME SYSTEMS - Domain name caching mechanisms are provided to address cache-defeating approaches. Domain name lookup requests are processed and cached information associated with a non-identical domain name returned in response. Cache-defeating behavior including nonce injection can be detected or inferred and employed to map domain name requests to previously cached information thereby exposing the benefits of caching. | 08-27-2009 |
20090232415 | PLATFORM FOR THE PRODUCTION OF SEAMLESS ORTHOGRAPHIC IMAGERY - Systems and methods are provided for the production of seamless, geo-referenced orthographic images that can comprise a composite of two or more underlying images. Illustratively, an exemplary image processing environment comprises an image processing engine and an instruction set comprising at least one instruction to instruct the image processing engine to process data representative of two or more images. Illustratively, the two or more images can comprise data representative of correspondence points between the two or more images and the underlying area (e.g., ground control points). Illustratively, the exemplary image processing engine can identify features that the overlapping photos have in common (e.g., feature match points) and place and re-project (e.g., distort) each of the two or more images to achieve a selected balance of correct position (e.g., based on ground control points) and seamless overlap (e.g., based on feature match points) which can be composited into a single image. | 09-17-2009 |
Joseph Howell, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20150309978 | METHOD AND SYSTEM FOR GENERATING AND UTILIZING PERSISTENT ELECTRONIC TICK MARKS AND USE OF ELECTRONIC SUPPORT BINDERS - An apparatus and computer-implemented method comprise providing an algorithm to a client device comprising a processor, a memory, and a user interface comprising a display and an input mechanism, displaying on the display a supported document comprising a supported data item data item, receiving an instruction for the supported data item to associate supporting document information to the supported data item, providing a data entry mechanism at which the supporting document information can be specified, receiving the supporting document information; and attaching the supporting document information in a persistent manner to the supporting data item. | 10-29-2015 |
Joshua Howell, Puyallup, WA US
Patent application number | Description | Published |
---|---|---|
20120324612 | Removable Jacket Sleeves For Body Armor - A separating garment system has two sleeves and a chest piece and collar that can be opened. The chest piece having a front and a back and having a length in the front and the back such that the chest piece extends downward on a wearer so as to cover no more than a chest of a wearer. The chest piece also may not extend under the arms of the wearer. | 12-27-2012 |
Kimberly J. Howell, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20090198746 | GENERATING ANONYMOUS LOG ENTRIES - Assigning session identifications to log entries and generating anonymous log entries are provided. In order to balance users' privacy concerns with the need for analysis of the log entries to provide high quality search results, non-user-specific data fields, such as a user's location (e.g., city, state, and latitude/longitude) and connection speed, are inserted into the log entries, and user-specific data fields, such as the IP address and cookie identifications, are deleted from the log entries. In addition or alternatively, prior to anonymization of the log entries, session identifications are assigned to identified groups of log entries. The groups are identified based on factors such as the user's identification, the IP address, the time of search, and differences between the search terms used in the search queries. | 08-06-2009 |
Kimberly J. Howell, Windinville, WA US
Patent application number | Description | Published |
---|---|---|
20110167043 | GENERATING ANONYMOUS LOG ENTRIES - Assigning session identifications to log entries and generating anonymous log entries are provided. In order to balance users' privacy concerns with the need for analysis of the log entries to provide high quality search results, non-user-specific data fields, such as a user's location (e.g., city, state, and latitude/longitude) and connection speed, are inserted into the log entries, and user-specific data fields, such as the IP address and cookie identifications, are deleted from the log entries. In addition or alternatively, prior to anonymization of the log entries, session identifications are assigned to identified groups of log entries. The groups are identified based on factors such as the user's identification, the IP address, the time of search, and differences between the search terms used in the search queries. | 07-07-2011 |
Matthew J. Howell, Pullman, WA US
Patent application number | Description | Published |
---|---|---|
20140222233 | Entry of Electric Power Delivery System data in a Web-Based Interface - Disclosed herein are a variety of systems and methods for entry of data relating to an electrical power delivery system using a web-based interface. One embodiment may include a computer program product having a client-side module to communicate with a server-side module. The client-side module may further include a web browser interface module to retrieve data entered by an operator into a data entry field in a web browser, a user interface module to display variable length data to a user via the web browser, and a communication module to manage communication with the server-side module. The communication module may further be configured to generate an object comprising data entered by the user into the web browser, transmit the object to the server, and receive a response from the server. | 08-07-2014 |
Nathan Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090231998 | SELECTIVE FILTERING OF NETWORK TRAFFIC REQUESTS - Several approaches to selectively filtering network traffic are described. One approach involves a system for selectively filtering network traffic. The system includes a helper application, which is coupled to a networking program, and is used to identify a user-initiated request. A network filter driver is coupled to the networking program, for intercepting the user-initiated request. A filtering service is coupled to both the helper application and the network filter driver, and is used to determine if the user-initiated request is allowable. If the request is allowable, the filtering service is configured to generate a special identifier, which the helper application is configured to include in a subsequent request. The filtering service is configured to allow a subsequent request which includes the special identifier, and the network filter driver's configured to strip a special identifier from subsequent requests. | 09-17-2009 |
Nathan D. Howell, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130318116 | Advanced Spam Detection Techniques - The subject invention provides for an advanced and robust system and method that facilitates detecting spam. The system and method include components as well as other operations which enhance or promote finding characteristics that are difficult for the spammer to avoid and finding characteristics in non-spam that are difficult for spammers to duplicate. Exemplary characteristics include examining origination features in pairs, analyzing character and/or number sequences, strings, and sub-strings, detecting various entropy levels of one or more character sequences, strings and/or sub-strings as well as analyzing message and/or feature sizes. | 11-28-2013 |
William Edward Howell, Prosser, WA US
Patent application number | Description | Published |
---|---|---|
20150195968 | Apple Tree Named Howell TC3 - A new and distinct apple tree is disclosed. ‘Howell TC3’ is notable for its distinctive fruit, which has yellow skin and red flesh with a sweet/tart flavor. | 07-09-2015 |
20150195969 | Apple Tree Named 'Howell TC2' - A new and distinct apple tree is disclosed. ‘Howell TC2’ is notable for its distinctive fruit, which has red skin and dark pink/red flesh with a sweet/tart flavor. | 07-09-2015 |