摘要:
Systems and methods for data brokering, and more specifically, data brokering regarding a data provider's search-related activities are described. In particular implementations, various aspects of offering the one or more data products to a plurality of potential data consumers for bid by the plurality of potential data consumers are described.
摘要:
An accelerated video decoding system utilizes a graphics processing unit to perform motion compensation, image reconstruction, and color space conversion processes, while utilizing a central processing unit to perform other decoding processes.
摘要:
Systems and methods for data brokering, and more specifically, data brokering regarding a data provider's search-related activities are described. In particular implementations, various aspects of arranging for compensation to be received from the data consumer in exchange for at least one of installation of or access of a data tracking component related to at least one user interface associated with the data provider, are described.
摘要:
Embodiments include a system, a device, an apparatus, a method, and a computer program product. A method of reporting influence on a person includes collecting data indicative of the person accessing electronic content over a computer network using the user computing device. The method also includes generating a user influence report by transforming the collected data into information indicative of events associatable with the person accessing the electronic content over a computer network using the user computing device. The method further includes transmitting data indicative of the user influence report via a network, the user influence report being receivable by a site operable to facilitate delivery of a benefit to an owner of the electronic content.
摘要:
Embodiments include a system, a device, an apparatus, a method, and a computer program product. An embodiment provides an influencer discovery method includes receiving at least one of content site data, computing device data, search engine site data, or beneficiary site data. The method also includes determining a correlation between the communication between the content site and the computing device responsive to a human user input; and the communication between the computing device responsive to a human user input and the beneficiary site.
摘要:
A computer system models human memory by deriving associations between objects, events, and the context of the computer user or users. These associations can be dynamically generated, changing depending on the behavior of the user and context. Examples of areas in which this system can be used include time management (e.g., a calendar that presents time-based groupings of objects), people management (e.g., use analysis of user communications to rank importance of people to the user, groupings, and associations between people/groups and other objects such as documents, email), and general computer management (e.g., use analysis of user behavior to identify important objects and objects that are related to a current focus and context of the computer user).
摘要:
A method and system for storing the data of files having duplicate content, by maintaining a single instance of the data, and providing logically separate links to the single instance. Files of duplicate content have their data stored in a common store file by a single instance store (SIS) facility, which also converts the original file or files to links to that common store file and creates additional links thereto as needed. The SIS facility may reside above a file system as a filter driver. File system requests directed to the link file (e.g., open, write, read, close and delete) reach the SIS filter, which then transparently handles each request as if the link file was a normal file. To preserve logical separation, writes to a SIS link file are to the link file, and the written portion recorded as dirty. The SIS filter intercepts SIS read requests, and reads clean portions from the common store file and any dirty portions from the link file. When the link file is closed, the common store file also may be closed, and, if the link file has been written, the non-dirtied portions of the link file are filled in with clean data from the common store file, and the link file reconverted to a normal file. Security is provided to prevent unauthorized access to the common store files, as is a volume check facility that repairs any inconsistencies in SIS metadata.
摘要:
A data center for executing a data processing application includes processing units, sub-units or servers. Each of the processing units, sub-units or servers can execute a part or all of the data processing application. The processing units, sub-units or servers are electrical disjoint with respect to data communications, but can communicate with each other over free space optical links.
摘要:
A computationally-implemented method comprises retrieving at least a portion of data from a data source, determining an acceptability of an effect of the retrieved at least a portion of the data at least in part via a virtual machine representation of at least a part of an end user's real machine having one or more end-user specified preferences, and providing at least one data display option to the end user's real machine based on the determining acceptability of the effect of the retrieved at least a portion of the data.
摘要:
A data center for executing a data processing application includes processing units, sub-units or servers. Each of the processing units, sub-units or servers can execute a part or all of the data processing application. The processing units, sub-units or servers are electrical disjoint with respect to data communications, but can communicate with each other over free space optical links.