Abstract:
Example methods and systems are directed to adapting legacy endpoints to modern application protocol interfaces (APIs). A legacy endpoint may provide a powerful and complex API. A modern application may desire access to the legacy endpoint. One or more layers may be added between the modern application and the legacy endpoint. Each layer may provide a different API. These layers of APIs may transform the interface from a powerful and complex interface to a more limited but simpler and easier to use interface. In some example embodiments, a proxy layer, an adapter layer, a facade layer, and a service layer may be used.
Abstract:
There are provided systems and methods for location detection devices for use in a courier services network. A first user may travel to a location for a particular reason, such as item purchases or appointments. While at the location, the user may be identified at the location by a server offering courier services to a seller and a second user purchasing items from the seller. Based on the first user's reason for traveling to the location and other indicia of trustworthiness or fraud, the server may determine whether the first user can be trusted as a courier. If the user is trusted as a courier, the server may update the first user and the seller to arrange delivery of the item to another location set by the second user. The first user may also be provided with additional items for the second user to deliver to further locations.
Abstract:
Example methods and systems are directed to adapting legacy endpoints to modern application protocol interfaces (APIs). A legacy endpoint may provide a powerful and complex API. A modern application may desire access to the legacy endpoint. One or more layers may be added between the modern application and the legacy endpoint. Each layer may provide a different API. These layers of APIs may transform the interface from a powerful and complex interface to a more limited but simpler and easier to use interface. In some example embodiments, a proxy layer, an adapter layer, a facade layer, and a service layer may be used.
Abstract:
Bill/item payment-for-another systems and methods include receiving a find-users request from a first user device that is associated with first user information, and that find-users request is directed to a physical merchant location that is associated with merchant information. A second user device is then determined to be located at the physical merchant location. Second user information is then retrieved using an identifier of the second user device. The second user information is provided for display on the first user device. A purchase request is then received from the first user device of at least one item for a second user that is associated with the second user information. A payment amount is then transferred for the at least one item from a first user account that is associated with the first user information to a merchant account that is associated with the merchant information.
Abstract:
Systems and methods for sharing customer traffic between merchants include a system provider device that may establish an alliance between a first merchant at a first merchant location and a second merchant at a second merchant location. The system provider device detects events associated with the first merchant that satisfy one or more merchant activity rules. The system provider may also determine an availability of the second merchant to service one or more customers. Thereafter, the system provider device refers at least one customer at the first merchant location to the second merchant at the second merchant location. In addition, the system provider device may receive bids from a plurality of allied merchants for the referral of the at least one customer, may credit a first merchant account based on a transaction with a referred customer at the second merchant location, and may recognize opportunities for merchant alliances.
Abstract:
Techniques for locating and identifying mobile devices are described. According to various embodiments, an ambient sound signal may be detected using a microphone of a mobile device. Thereafter, it may be determined that the ambient sound signal corresponds to a predefined user query for assistance in locating the mobile device. A predefined response sound corresponding to the predefined user query may then be emitted, using a speaker of the mobile device. Additionally, user identification information may be displayed on a screen in response to detecting contact with the mobile device using at least one of an accelerometer and a gyroscope.
Abstract:
Example methods and systems are directed to adapting legacy endpoints to modern application protocol interfaces (APIs). A legacy endpoint may provide a powerful and complex API. A modern application may desire access to the legacy endpoint. One or more layers may be added between the modern application and the legacy endpoint. Each layer may provide a different API. These layers of APIs may transform the interface from a powerful and complex interface to a more limited but simpler and easier to use interface. In some example embodiments, a proxy layer, an adapter layer, a facade layer, and a service layer may be used.
Abstract:
Techniques for locating and identifying mobile devices are described. According to various embodiments, an ambient sound signal may be detected using a microphone of a mobile device. Thereafter, it may be determined that the ambient sound signal corresponds to a predefined user query for assistance in locating the mobile device. A predefined response sound corresponding to the predefined user query may then be emitted, using a speaker of the mobile device. Additionally, user identification information may be displayed on a screen in response to detecting contact with the mobile device using at least one of an accelerometer and a gyroscope.
Abstract:
Methods and systems for improving seat selection at a venue are described. The methods and systems help users understand how good a view they will have of a performance or event and/or how enjoyable an experience they will have before they purchase a ticket. A user selects a seat and is able to access relevant traits of people who purchased seats proximate to the selected seat. Relevant traits include physical features such as height, weight, build, etc., and behavior information, such as how noisy or quiet the person is.
Abstract:
Example methods and systems are directed to adapting legacy endpoints to modern application protocol interfaces (APIs). A legacy endpoint may provide a powerful and complex API. A modern application may desire access to the legacy endpoint. One or more layers may be added between the modern application and the legacy endpoint. Each layer may provide a different API. These layers of APIs may transform the interface from a powerful and complex interface to a more limited but simpler and easier to use interface. In some example embodiments, a proxy layer, an adapter layer, a facade layer, and a service layer may be used.