Abstract:
A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. The system can then automatically determine an instruction in a first time limit based on the calculated scored and command the executing system to execute the instruction.
Abstract:
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. In addition, a key may be represented by a pattern of unreadable errors in a computer-readable medium.
Abstract:
A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. The messages may include user status messages, which are messages posted to the hub by the user, and the user status messages and subscription messages may be displayed on separate ones of the two screens. An apparatus for performing the method may include a processor coupled to a memory holding encoded instructions for performing operations of the method.
Abstract:
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content.
Abstract:
A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device. Video and control streams from multiple live avatars may be aggregated through a host server and allocated via an online interface to multiple prospective remote operators.
Abstract:
Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. The configured new data file is stored in accordance with the assigned data storage scheme in one or more of the available locations and the locations of the new data file are recorded.
Abstract:
A client-side pseudo-browsing application may control interactions with the search engine, collecting true browsing input from the client and providing pseudo-browsing information to the search engine or other information provider.
Abstract:
A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. The system and method may also provide for determining whether an e-mail originates from a forged source. A server receives data relating to an e-mail, including a purported sender and a verification host. The server queries the verification host with information pertaining to the e-mail and requests confirmation that the e-mail originates from the purported sender. The e-mail is determined to originate from a forged source unless the verification host responds that the e-mail originates from the purported sender.
Abstract:
A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive from at least one environmental data gathering device, data about at least one target participant at a gathering of a plurality of participants, analyze such data to determine at least one observed behavior of said target participant, compare said at least one observed behavior against a dataset of at least one behavior; determine when said at least one behavior exceeds a threshold similarity to at least behavior in said dataset; and communicate, to at least one notification device, said at least one observed behavior.
Abstract:
A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request.