Abstract:
Computationally implemented methods and systems include receiving a generic food request from a user for one or more food items; obtaining, in response to the reception of the generic food request, user preference information of the user that indicates one or more food customization preferences of the user including at least one or more ingredient integrity preferences of the user related to integrity of one or more ingredients, the user preference information to be obtained from one or more sources other than the user; and directing automated generation of one or more customized food items in response to the received generic food request and in accordance, at least in part, with the obtained user preference information. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Described embodiments include a portable electronic device. The device includes a shell housing components of the portable electronic device having a heat-generating component. The device includes a heat-rejection element located at an exterior surface of the shell. The heat-rejection element is configured to reject heat received from the heat-generating component into an environment in thermal contact with the heat-rejection element. The device includes a controllable thermal coupler configured to regulate heat transfer to the heat-rejection element. The device includes an activity monitor configured to infer a user touch to the shell in response to a detected activity of the portable electronic device. The device includes a thermal manager configured to regulate heat transfer by the controllable thermal coupler to the heat-rejection element in response to the inferred user touch.
Abstract:
Disclosed herein are example embodiments for exchange authorization analysis infused with network-acquired data stream information. For certain example embodiments, at least one device, such as a server device of a combined financier and guarantor: (i) may discover at least one authorization request corresponding to at least one product transaction; or (ii) may communicate at least one authorization answer based at least partially on at least one corroborating indicium obtained via at least one data stream corresponding to at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Disclosed herein are example embodiments for guaranty provisioning via social networking. For certain example embodiments, at least one device, such as a server device of a social network: (i) may detect at least one proffered guaranty transaction that is associated with at least one product transaction; or (ii) may proffer at least one guaranty based at least partially on at least one social network data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Disclosed herein are example embodiments for supporting guaranty provisioning via user attribute proffering. For certain example embodiments, at least one device, such as a server device of a data provider: (i) may detect one or more opportunities to proffer at least one user attribute to at least one potential guarantor; or (ii) may proffer at least one user attribute based at least partially on at least one data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Disclosed herein are example embodiments for financier-facilitated guaranty provisioning. For certain example embodiments, at least one device, such as a server device of a financier: (i) may discover at least one authorization request corresponding to at least one product transaction; or (ii) may provide at least one proffered guaranty transaction to at least one guarantor. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Computationally implemented methods and systems include acquiring image data that includes an image that contains a representation of a feature of an entity and that has been encrypted through use of a unique device code, wherein said image data further includes a privacy metadata regarding a presence of a privacy beacon associated with the entity, obtaining term data at least partly based on the acquired privacy metadata, wherein said term data corresponds to one or more terms of service that are associated with use of the image that contains the representation of the feature of the entity, and generating a valuation of the image, said valuation at least partly based on one or more of the privacy metadata and the representation of the feature of the entity in the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a captured image, wherein the captured image depicts at least one entity, performing a comparison between an estimated potential revenue generated from a distribution of the captured image and an estimated potential liability incurred for the distribution of the captured image, and modifying the captured image by placing at least one advertisement image at a particular location of the captured image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a captured image, wherein the captured image depicts at least one entity, performing a comparison between an estimated potential revenue generated from a distribution of the captured image and an estimated potential liability incurred for the distribution of the captured image, and modifying the captured image by placing at least one advertisement image at a particular location of the captured image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a client-based encrypted image that is a captured image that has previously been encrypted through use of a particular client code, wherein said captured image was captured by an image capture device, obtaining an indication that the client-based encrypted image was approved for decryption, said decryption configured to be carried out through use of a client-based decryption key, and procuring the client-based decryption key that is at least partly based on the particular client code, wherein the particular client code is related to a client that is associated with the image capture device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.