Abstract:
In some embodiments, techniques comprise receiving route data that includes information relating to a stop, at a portable device that is personal to a passenger on a public conveyance; determining a destination, wherein the destination is related to the stop; determining a current location of the portable device; determining, based at least in part on the current location, that the portable device has nearly reached the destination, wherein determining that the portable device has nearly reached the destination includes determining that the stop is the next stop relative to the current location; and responsive to determining that the portable device has nearly reached the destination, providing an alert at the portable device.
Abstract:
In some embodiments, techniques for protecting a network may include detecting an insecure condition on a first host that has connected or is attempting to connect to a protected network, including contacting a trusted computing base and determining whether a response includes a valid digitally signed attestation of cleanliness (an attestation that the first host is not infested and/or that the presence of a patch or patch level of a software component on the first host); if not, quarantining the first host, including by re-routing a service request sent by the first host by responding with a redirect that causes a browser on the first host to be directed to a quarantine server configured to serve a quarantine notification page that provides remediation information; and permitting the first host to communicate with a remediation host configured to provide data usable to remedy the insecure condition.
Abstract:
In some embodiments, techniques for trip routing include determining a set of refueling stations, each of which is less than a threshold distance of deviation from a route; determining a fuel price and a deviation cost for each of the set of refueling stations, wherein the deviation cost is based on a unit distance of deviation from the route for each respective refueling station; calculating an imputed cost for each of the set of refueling stations, wherein the imputed cost is based on a combination of the fuel price and the corresponding deviation cost at each respective refueling station; selecting a first refueling station from among the set of refueling stations, wherein the first refueling station has a minimum imputed cost; updating the route to include the first refueling station; and presenting information relating to the updated route.
Abstract:
In some embodiments, techniques for processing a playlist may include associating a first tag with the playlist, a first digital media element, and a second digital media element; creating a playlist expansion for the playlist, including determining a plurality of tags associated with the playlist including the first tag and a second tag, adding digital media elements associated with the second tag to the playlist expansion, determining digital media elements associated with the first tag, including the first digital media element and the second digital media element, determining that the first digital media element, but not the second digital media element, is already in the playlist expansion, and adding the second digital media element, but not the first digital media element, to the playlist expansion; selecting either the first digital media element or the second digital media element; and processing the selected digital media element.
Abstract:
In some embodiments, techniques for electronic messaging may include receiving an email message; receiving an interaction with a user interface relating to the email message; extracting an email address associated with the email message; determining that the email address matches an entry in a whitelist; and responsive to receiving the interaction with the user interface relating to the email message and to determining that the email address matches the entry in the whitelist, removing the entry from the whitelist.
Abstract:
In some embodiments, techniques for rationalizing a recommendation include determining a recommended item for a user using a first recommendation engine, wherein the first recommendation engine receives as an input first behavioral data associated with a user, and generates an identifier corresponding to a recommended item; creating a rationalization for the recommended item using a first rationalization engine, wherein the first rationalization engine receives as inputs the recommended item and second behavioral data associated with the user, and generates a rationalization, wherein the rationalization includes a constructed rationalization of why the recommended item is recommended for the user, and wherein the creation of the rationalization is not based solely on an actual reason the first recommendation engine determined the recommended item; associating the rationalization for the recommended item with the recommended item; and providing the recommended item and associated rationalization.
Abstract:
In some embodiments, techniques for electronic messaging may include receiving an email message; receiving an interaction with a user interface relating to the email message; extracting an email address associated with the email message; determining that the email address matches an entry in a whitelist; and responsive to receiving the interaction with the user interface relating to the email message and to determining that the email address matches the entry in the whitelist, removing the entry from the whitelist.
Abstract:
In some embodiments, techniques for computer security comprise receiving a first email, detecting a first link in the email, wherein the first link is associated with a first link destination, creating a second link associated with a second link destination, wherein the second link destination is associated with a predetermined address, providing a second email, wherein the second email differs from the first email at least by having the first link rewritten with the second link, receiving an HTTP request for the second link destination, determining the first link destination from the second link destination, verifying that the first link destination is not suspicious, and enabling navigation to the first link destination.
Abstract:
In some embodiments, techniques for a intelligent personal fitness device include determining an exercise equipment; determining an exercise associated with the exercise equipment; determining a parameter associated with the exercise equipment; detecting a number of repetitions of the exercise associated with the exercise equipment performed using the exercise equipment, wherein detecting the number of repetitions of the exercise associated with the exercise includes analyzing data from an accelerometer; calculating an activity score based at least in part on the exercise associated with the exercise equipment, the parameter associated with the exercise equipment, and the number of repetitions of the exercise; and providing the activity score.
Abstract:
In some embodiments, techniques for rationalizing a recommendation include determining a recommended item for a user using a first recommendation engine, wherein the first recommendation engine receives as an input first behavioral data associated with a user, and generates an identifier corresponding to a recommended item; creating a rationalization for the recommended item using a first rationalization engine, separate from the recommendation engine, wherein the first rationalization engine receives as inputs the recommended item and second behavioral data associated with the user, and generates a rationalization, wherein the rationalization includes a constructed rationalization of why the recommended item is recommended for the user, and wherein the creation of the rationalization is not based on an actual reason the first recommendation engine determined the recommended item; associating the rationalization for the recommended item with the recommended item; and providing the recommended item and associated rationalization.