Abstract:
Various embodiments are directed to systems and methods for utilizing Light Detection and Ranging (LIDAR) sensors to facilitate loading and unloading of assets into receptacles. The LIDAR sensors may be configured to detect the location of various surfaces (e.g., asset surfaces) within a receptacle such that mapping data indicative of the location of the detected surfaces may be generated. This mapping data may facilitate a determination of a total volume of unoccupied space within the receptacle and/or the identification of an unoccupied volume sufficient to accommodate an item having defined dimensions. The mapping data may additionally be indicative of the location of asset identifiers disposed on one or more detected surfaces to facilitate locating a particular asset associated with a provided asset identifier.
Abstract:
Various embodiments of the invention provided a garment box comprising a bottom panel and a container portion that includes a first side wall, a second side wall, a third side wall, and a fourth side wall. In particular embodiments, the garment box further includes a walled enclosure portion contiguous to the first side wall and comprising a first fold over panel, a second fold over panel, and a third fold over panel. In particular embodiments, the first and third fold over panels include holes located proximate a mid-point of the panels and the second fold over panel includes a slot. The holes are configured to support a rod that is inserted into the walled enclosure portion. The rod is configured to support one or more heads of clothes hangers inserted through the slot and hung on the rod to secure clothes placed in the container portion for shipping.
Abstract:
Computer program products, methods, systems, apparatus, and computing entities are provided for determining the accuracy of map data. In one embodiment, map data and collected telematics data can be compared. The difference between the map data and the telematics data can be used to determine the accuracy of the map data.
Abstract:
Various embodiments of the present invention provide systems and methods for managing fault codes triggered by one or more vehicles during operation. In general, various embodiments of the invention involve recording and analyzing fault codes triggered during a particular time period while a vehicle is in operation. As a result of the analysis, various embodiments of the invention may set a state for each of the identified fault codes, the state indicating a level of action to address the identified fault code. In particular embodiments, the states may be one of a caution state indicating one or more components or sub-systems of the vehicle should be monitored, a critical state indicating one or more components or sub-systems of the vehicle should be repaired, or an environmental state indicating failure or potential failure of one or more components or sub-systems of the vehicle may affect one or more environmental conditions.
Abstract:
According to various embodiments, a fleet management system is provided for capturing, storing, and analyzing telematics data to improve fleet management operations. The fleet management system may be used, for example, by a shipping entity (e.g., a common carrier) to capture telematics data from a plurality of vehicle sensors located on various delivery vehicles and to analyze the captured telematics data. In particular, various embodiments of the fleet management system are configured to analyze engine idle data in relation to other telematics data in order to identify inefficiencies, safety hazards, and theft hazards in a driver's delivery process. The fleet management system may also be configured to assess various aspects of vehicle performance, such as vehicle travel delays and vehicle speeds. These analytical capabilities allow the fleet management system to assist fleet managing entities, or other entities, in analyzing driver performance, reducing fuel and maintenance costs, and improving route planning.
Abstract:
Computer program products, methods, systems, apparatus, and computing entities are provided for determining the accuracy of map data. In one embodiment, map data and collected telematics data can be compared. The difference between the map data and the telematics data can be used to determine the accuracy of the map data.
Abstract:
Various embodiments of the present invention are directed to methods, systems and computer program products for conducting an online transaction on a website involving sensitive information. Such embodiments provide methods, systems and computer program products to: (a) register at least one entity with a gate keeper module, the registering comprising associating the entity with a subscription level; (b) associate a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string; and (c) during processing of the online transaction: (i) using the unique token for intermediate steps during the processing of the online transaction; and (ii) only accessing the character string in storage memory to complete the online transaction after receiving a request from at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information.
Abstract:
Various embodiments of the present invention are directed to methods, systems and computer program products for conducting an online transaction on a website involving sensitive information. Such embodiments provide methods, systems and computer program products to: (a) register at least one entity with a gate keeper module, the registering comprising associating the entity with a subscription level; (b) associate a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string; and (c) during processing of the online transaction: (i) using the unique token for intermediate steps during the processing of the online transaction; and (ii) only accessing the character string in storage memory to complete the online transaction after receiving a request from at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information.
Abstract:
Various embodiments of the present invention are directed to methods, systems and computer program products for conducting an online transaction on a website involving sensitive information. Such embodiments provide methods, systems and computer program products to: (a) register at least one entity with a gate keeper module, the registering comprising associating the entity with a subscription level; (b) associate a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string; and (c) during processing of the online transaction: (i) using the unique token for intermediate steps during the processing of the online transaction; and (ii) only accessing the character string in storage memory to complete the online transaction after receiving a request from at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information.
Abstract:
Embodiments of the present invention includes system and methods for the continued operation of a carrier management system having one or more user terminals that normally communicate with at least one data center over a network (online), when the one or more user terminals are unable to communicate with the data center (offline). Once communication is re-established between the one or more user terminal and the data center, local files and data on the user terminals that were used to rate and ship packages while offline are synchronized between the one or more user terminals and the data center.