摘要:
Oftentimes users can be exposed to media content such as advertisements while in a non-connective state. Advertisement providers can desire to obtain information related to the exposure and users can be rewarded for the exposure. Therefore, a record can be retained related to advertisement exposure and the record can be transmitted when it is determined that the user is in a connective state. Since personal information can be held upon the record and there can be motivation to alter the record, the record can be stored in hardware, such as a microcontroller of a flash memory device, prior to transmission.
摘要:
Oftentimes, computer files, information packets, and the like share identical data portions that cause duplicate storing. The files and/or packets can be logically divided and checks can be performed to determine if there are shared portions. If shared portions exist, then as opposed to making a duplicate copy of information, a pointer can be produced that identifies where the portion is saved. In addition, pointers can be used in compression of information such that a compressed file can identify an original copy—the original copy can be used to decompress the information.
摘要:
Systems and methods of sharing files and data in memory between the two operating systems running on a computing device. A main operating system (OS) may execute on the computing device an provide numerous system features and functionality. To conserver power, the main OS may unload, or the computer may be reset, suspended or be shutdown. Prior to doing so, the main OS writes data to a known memory location that allows access by a secondary OS when the main OS is not present. The secondary OS provides a limited set of functionalities, while being able to use and interact with the data stored in the known memory location. Information about the data and permissions are stored in mailbox that is accessible to both operating system such that changes made when the secondary operating system is active are synchronized with the main operating system.
摘要:
Various devices may include a short-range wireless transmitter and/or one or more short-range wireless readers. When a first device including the transmitter is placed near a second device including the one or more readers, a relative location of the first device may be determined. Information regarding the relative location of the first device, may be used to facilitate use of the first device with a processing device. In one embodiment, the processing device may automatically configure itself, such that the first device may be used with the processing device. In another embodiment, the processing device may provide feedback, such as, for example, step-by-step instructions to facilitate setup and use of the first device with the processing device. In some embodiments, an application program interface may provide information about the device to an application executing on the processing device.
摘要:
A system for policy-based applications may be developed by using non-device specific policies that are executed on a policy engine. During installation, available sensor devices are identified by metadata that describes the devices within a taxonomy of sensor devices, and a separate device policy may be installed and executed by each sensor device. The policy engine, in conjunction with the sensor devices operating a device policy, may be execute a wide range of applications. In many applications, a sensor device may detect that a first policy engine is not available and send communications to a second policy engine that may be accessed through the Internet.
摘要:
A user can be compensated for taking detours from a projected route. Commonly, the reason for the compensation is that the user will be subjected to advertising, the user will pass by an establishment she is likely to visit, or to ease traffic congestion. Analysis of an area takes place and monetization opportunities are determined based upon the results of the analysis. A route between at least about two locations can be altered such that the user is provided a reward, commonly in an optimized manner.
摘要:
Described is a technology by which a computer display may quickly resume outputting video data following its awakening from a deep sleep state. Displayed settings are maintained in a memory, such as a memory of the display, while the display is in a sleep state. The settings are associated with a token maintained by a host computer system and display. Upon a need to awaken the display to output video data, the host computer system and the display communicate the token, whereby the display may confirm whether maintained settings are still valid for actual use with the host's video signals. If still valid, the display restores the maintained display settings as actual display settings. The restoring of previously maintained display settings is ordinarily significantly faster than conventional mechanisms that are presently used to configure a display upon wakeup, resulting in the user perceiving a near-instantaneous wakeup of a display.
摘要:
A method for providing enhanced programming to an entertainment module where the display of the enhanced programming is prepared remotely from the entertainment module. The method includes a step for analyzing a programming transmission stream deliverable to an entertainment module, remotely from the entertainment module, to identify whether the transmission stream includes at least one enhanced programming control signal. In the event that the transmission stream includes at least one enhanced programming control signal, a step for preparing, remotely from the entertainment module, a visual representation of the enhanced programming based upon the at least one enhanced programming control signal. Following preparing the enhanced programming by the preparing step, a step for delivering the visual representation of the enhanced programming to the entertainment module.
摘要:
Systems and methods of sharing files and data in memory between the two operating systems running on a computing device. A main operating system (OS) may execute on the computing device an provide numerous system features and functionality. To conserver power, the main OS may unload, or the computer may be reset, suspended or be shutdown. Prior to doing so, the main OS writes data to a known memory location that allows access by a secondary OS when the main OS is not present. The secondary OS provides a limited set of functionalities, while being able to use and interact with the data stored in the known memory location. Information about the data and permissions are stored in mailbox that is accessible to both operating system such that changes made when the secondary operating system is active are synchronized with the main operating system.
摘要:
A cellular telephone having an optical mouse component built into the telephone. The telephone is adapted to track when it was turned ON and placed on a suitable surface. The top of the telephone includes two buttons which are used as “left click” and “right click” buttons while the mouse optics are in use. These buttons could be used for other functions when the mouse optics were not in use. The telephone communicates with a user's laptop in any number of ways including being paired to it through Bluetooth or by being physically connected using USB. The same optics used for the mouse component are capable of scanning coded symbols and barcodes. Users can scan nearly any item and retrieve information from a locally stored database or from a network. Users can also scan unique IDs from phonecards or other references which cause action such as loading more minutes onto the phone, downloading other information or sending of information from the phone to take part in a transaction.