Abstract:
In some embodiments, a subwoofer enclosure includes a substantially triangular first face, second face, third face, and fourth face, a first corner at an intersection of the first, second and third faces, a second corner at an intersection of the first, second and fourth faces, a third corner at an intersection of the first, third and fourth faces, a fourth corner at an intersection of the second, third and fourth faces, wherein an angle between the first corner and a midpoint between the third corner and the fourth corner, having the second corner as its vertex, is substantially ninety degrees, wherein an angle between the third corner and the fourth corner, having the second corner as its vertex, is substantially ninety degrees, and a subwoofer driver attached to the third face, having a free air resonant frequency less than one hundred Hertz.
Abstract:
In some embodiments, techniques for modifying a profile may include receiving a first profile data associated with a first user, associating the first profile data with a profile associated with the first user, receiving a second profile data associated with a second user different from the first user, and associating the second profile data with the profile.
Abstract:
In some embodiments, techniques for document integrity may include detecting an initiator associated with a key, detecting the end of a document, determining that no terminator matching the key has been detected, and rejecting all or part of the document.In some embodiments, techniques for document integrity may include generating a key and associating the key with an initiator insertion point and a terminator insertion point.
Abstract:
In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant.
Abstract:
In some embodiments, techniques for pricing may include detecting a visitor at an e-commerce site, determining that an item offered for sale at the e-commerce site is of potential interest to the visitor, detecting another e-commerce site at which the user has viewed the item, determining a historical price, wherein the historical price is associated with a web page, wherein the web page offered the item at the other e-commerce site, calculating an offering price, wherein the offering price is based on the historical price, offering the item to the visitor at the offering price, and selling the item to the visitor at the offering price.
Abstract:
In some embodiments, techniques for computer security comprise receiving an email message; determining a sender of the email message; determining whether the sender of the email message is trusted, wherein determining whether the sender of the email message is trusted includes determining whether the sender of the email message is associated with a whitelist; retrieving domain-related information by performing a DNS query on a domain associated with the sender; based at least in part on the domain-related information, determining whether the sender of the email message is verified; determining whether the sender is both trusted and verified; and when it is determined that the sender is both trusted and verified, treating the email message as trustworthy, wherein treating the email message as trustworthy includes bypassing a classifier.