Abstract:
Soft sided bags having a flexible frame system are disclosed and described herein. A plurality of structure forming frame members engage guides in the bag body to provide the soft sided bag with a resilient structure, and to further provide content protection and accessibility. Soft sided bag may use structure forming frame members with varying levels of stiffness to provide a desired structure to the soft sided bag. A unique structure forming frame member is disclosed which includes an outer sheath and inner rod that gives the bag body structure, durability, flexibility, resiliency, and differing degrees of restorative force along one continuous member. Various non-limiting configurations are disclosed that provide the soft sided bag with a desired shape as well as the ability to collapse to smaller configurations.
Abstract:
A system and method of controlling access to media content are disclosed. In one embodiment, the method includes receiving a viewing request at a set-top box device at a user premises. The method also includes retrieving a permission policy stored at the set-top box device and identifying a wireless device associated with the permission policy. Further, the method includes fulfilling the viewing request when the wireless device is present at the user premises and is within a first relative proximity to the set-top box device, and not fulfilling the viewing request when the wireless device is present at the user premises and is within a second relative proximity to the set-top box device.
Abstract:
Systems and methods for model-based video fixing are disclosed. A video can be retrieved and analyzed to determine if any portion of the video can be represented by a model. If a portion that can be modeled is identified, a model that approximates the portion can be specified, the portion can be removed from the video, and instructions for modeling the video can be formatted. The video and the instructions can be transmitted to a receiving device, which can synthesize the model and the received video to generate a model-based video. Systems for providing the model-based video fixing are also disclosed.
Abstract:
Systems and methods to monitor a person in a residence are provided. A particular method includes receiving data at a monitoring service from a set-top box (STB) device. The data includes a location in a residence of a person being monitored. The location may be obtained from a location system in the residence. The data also includes an associated time stamp for the location. The method includes analyzing the data based on a profile of the person to determine whether one or more alert conditions are satisfied. The method also includes providing a notification when one or more of the alert conditions are satisfied.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a presence system having a controller to transmit to a calendar system presence information of a subscriber of the presence system for recording said presence information in a calendar event. Other embodiments are disclosed.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller to obtain network information associated with establishing a network among a group of communication devices, and provide the network information to a plurality of network set-up devices removably connected to the network element, where each of the plurality of network set-up devices is connectable with a communication device of the group of communication devices to provide at least a portion of the network information to the communication device, and where the network is established based at least in part on the at least a portion of the network information. Other embodiments are disclosed.
Abstract:
A system and method for sharing location data amongst wireless communication devices uses a token system to grant permission to share location data. The tokens may be created automatically as the result of user activation of a different function. Location data may be exchanged when two wireless communication devices, authorized to exchange location data, are within a predetermined distance from each other. Location data may also be automatically exchanged upon the occurrence of a scheduled calendar event within a wireless communication device. Location data may be exchanged a single time or can be exchanged on a continuous or periodic basis so long as the token still exists. The token may be destroyed manually by some user activity or may be terminated automatically.
Abstract:
A system and method for presenting advertising, the method including but not limited to presenting on a first end user device, a first personalized advertisement in a first avatar's view of a virtual world and presenting on a second end user device, a second personalized advertisement in a second avatar's view of the virtual world.
Abstract:
A method of gaming comprising displaying a region comprising a plurality of symbol display positions on an electronic display, each symbol display position occupiable by one symbol at a time and being adjacent to at least one other symbol display position such that any movement of the symbols within the region involves a movement to an adjacent display position; populating at least part of the region by injecting symbols into the region at respective selected entry points of a plurality of possible entry points to the region in a respective direction of entry, each entry point corresponding to one of the symbol display; and evaluating the populated region to determine whether to make an award upon an evaluation condition being met.
Abstract:
A method, computer readable media and apparatus for temporarily mapping an anonymous number to a mobile endpoint device are disclosed. For example, the method assigns a first temporary anonymous number to a mobile endpoint device having a mobile number, and receives a call request to reach the mobile endpoint device in accordance with the first temporary anonymous number. The method forwards the call request to the mobile endpoint device if the first temporary anonymous number has not expired.