Abstract:
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber identification determinations. Utilizing cyber resources and predetermined criteria for providing cyber identification determinations for at least one unidentified subject of an observation, the process: provides identification determinations for any possible subject of an observation; provides for the utilization of any selected attainable level of accuracy, up to, and including 100% accuracy; provides for single, intermittent, and constant identification determinations; utilizes any available cyber resources; interacts with utilized cyber resources to provide any possible function and/or observation; recognizes characteristics from observations and then utilizes recognized characteristics for comparing and/or determining; provides and utilizes a standard set of designations for representing all aspects of the process; utilizes useful information and/or outcomes from comparing for making identification determinations; and, reports on any aspect of the process at any time.
Abstract:
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber identification determinations. Utilizing cyber resources and predetermined criteria for providing cyber identification determinations for at least one unidentified subject of an observation, the process: provides identification determinations for any possible subject of an observation; provides for the utilization of any selected attainable level of accuracy, up to, and including 100% accuracy; provides for single, intermittent, and constant identification determinations; utilizes any available cyber resources; interacts with utilized cyber resources to provide any possible function and/or observation; recognizes characteristics from observations and then utilizes recognized characteristics for comparing and/or determining; provides and utilizes a standard set of designations for representing all aspects of the process; utilizes useful information and/or outcomes from comparing for making identification determinations; and, reports on any aspect of the process at any time.
Abstract:
A pocket t-shirt with a pocket formed from a first material such as that of a necktie, affixed to the upper left portion of a shirt formed from a second material, different from the first, is provided. The shirt may be one of a variety of colors, and the pocket material may define a multitude of patterns and colors as well. The V-shaped pocket will be sewn onto the shirt to introduce an element of class to the casual look of the t-shirt. A method of forming a pocket t-shirt is also provided.
Abstract:
The system and system components of the present invention provide individuals with both a safe and a secure cyber environment. Within this safe and secure cyber environment each individual and each cyber device is properly identified for all cyber interactions with others and for all cyber interactions with the cyber devices of others. The system also provides individuals with privacy for the individual's cyber activities and cyber assets. Further, the system provides for environment-wide interoperable use of any cyber device, cyber programming, and cyber content.
Abstract:
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber identification determinations.Utilizing cyber resources and predetermined criteria for providing cyber identification determinations for at least one unidentified subject of an observation, the process:provides identification determinations for any possible subject of an observation;provides for the utilization of any selected attainable level of accuracy, up to, and including 100% accuracy;provides for single, intermittent, and constant identification determinations;utilizes any available cyber resources;interacts with utilized cyber resources to provide any possible function and/or observation;recognizes characteristics from observations and then utilizes recognized characteristics for comparing and/or determining;provides and utilizes a standard set of designations for representing all aspects of the process;utilizes useful information and/or outcomes from comparing for making identification determinations; and,reports on any aspect of the process at any time.
Abstract:
An application renders a visual simulation to a display as a series of visual frames according to a plurality of calls. Each frame contains objects. A particular frame n of the simulation is captured for re-rendering. An identification of the frame n to be captured is received, a run file for the identified frame n is created, and for the frame n each call issued in connection with such frame n by the application is captured. For each issued call in order, all establishing calls necessary to establish state for the issued call are firstly written to the run file, and the issued call is then secondly written to the run file. Thus, the run file as produced represents an ordered list of calls that may be executed by an executable on any of a plurality of computing devices to re-render the frame independent from the application.
Abstract:
A method for analyzing the performance of a video game uses a diagnostic tool that is associated with application code of the video game. The diagnostic tool is activated when the video game is in operation, and real-time performance data is captured and displayed. A warning is generated when a performance metric violates a pre-set condition. The warning may be displayed on a display screen that is used to provide information for rectifying the violation.
Abstract:
The performance of a video game is analyzed using non-intrusive capture and storage of game data. A non-linear capture format is used for capturing run-time game data. The run-time game data includes run-time parameters associated with execution of an application code as well as run-time parameters associated with hardware of a game platform upon which the application code is being executed. The captured data is stored in a storage medium using a non-contiguous storage format.
Abstract:
A shader program capable of execution on a GPU is analyzed for constant expressions. These constant expressions are replaced with references to registers or memory addresses on the GPU. A preshader is created that comprises two executable files. The first executable file contains the shader program with the each constant expression removed and replaced with a unique reference accessible by the GPU. The first file is executable at the GPU. A second file contains the removed constant expressions along with instructions to place the values generated at the associated reference. The second executable file is executable at a CPU. When the preshader is executed, an instance of the first file is executed at the GPU for each vertex or pixel that is displayed. One instance of the second file is executed at the CPU. As the preshader is executed, the constant expressions in the second file are evaluated and the resulting intermediate values are passed to each instance of the first file on the GPU.
Abstract:
A scalable configurable universal complete spectrum identity authentication process that utilizes all or part of at least one computer, and necessary resources for making identity authentication determinations as to whether or not one specific sensor-observed tested person is the same person as the one specific known person he or she claims to be. The identity authentication process makes one-time, intermittently performed, or constantly performed identity authentication determinations regarding any one specific tested person, and it is configurable for doing so at any attainable level of accuracy including 100% accuracy. The identity authentication process is configurable for interacting with itself or utilized cyber resources to perform possible variable functions, it utilizes data representing recognized aspects, characteristics or features for comparing or determining, and it utilizes observation data, derived data, useful information, or outcomes from comparing for making identity authentication determinations, and it may report on any of its operations.