Abstract:
This invention relates to various methods for a poker player to limit his losses or protect his potential winnings on a given hand prior to completion of the dealing of cards on such hand, based upon his calculated pot equity, or percentage chance of winning the hand.
Abstract:
Methods and systems that facilitate data delivery to electronic devices are disclosed. One aspect pertains to data delivery to electronic devices that are portable, such as, mobile devices. In one embodiment, one mobile device discovers another mobile device within its vicinity. The mobile devices can then wirelessly transmit data from one mobile device to the other. The mobile devices, or their users, can control, request or influence the particular data content being delivered.
Abstract:
A method for information technology (IT) and information asset risk assessment of a business relationship between a client and a third party. The method includes establishing a database. The database includes a plurality of IT information risk factors. The database is configured to receive IT risk information. The IT risk information is associated with the plurality of IT information risk factors. The plurality of IT information risk factors includes a subset of relationship risk factors. The subset of relationship risk factors are utilized for evaluating the business relationship risk between the client and the third party. The method also includes receiving IT risk information corresponding to the subset of relationship risk factors. The method continues with generating a relationship risk score. The relationship risk score is determined in response to evaluating the subset of relationship risk factors using the IT risk information corresponding to the subset of relationship risk factors.
Abstract:
An accessory communicates with a PMD to store tags associated with broadcasts in a file maintained in a storage medium of the accessory, where the tags contain information descriptive of a subset of the broadcast content. In one embodiment, the accessory sends commands to the PMD to create or open a tag file that resides on the PMD, write one or more tags to the file, and close the file. Stored tags can be used to access (e.g., purchase) tagged content by communicating with a media asset delivery service either via a host computer or directly from the PMD.
Abstract:
An accessory communicates with a PMD to store tags associated with broadcasts in a file maintained in a storage medium of the accessory, where the tags contain information descriptive of a subset of the broadcast content. In one embodiment, the accessory sends commands to the PMD to create or open a tag file that resides on the PMD, write one or more tags to the file, and close the file. Stored tags can be used to access (e.g., purchase) tagged content by communicating with a media asset delivery service either via a host computer or directly from the PMD.
Abstract:
An accessory communicates with a PMD to store tags associated with broadcasts in a file maintained in a storage medium of the accessory. In one embodiment, the accessory sends a command to the PMD to create or open a tag file that resides on the PMD. Once opened, the tag file is held open by the PMD until the accessory closes it (or disconnects), allowing multiple tags to be written to one file. Each time the user requests a new tag, the accessory generates a tag containing information descriptive of the broadcast material (e.g., song title, artist, radio station identifier, time of tagging, etc.) and writes the tag to the tag file using a write command to the PMD.
Abstract:
Methods and systems that facilitate data delivery to electronic devices are disclosed. One aspect pertains to data delivery to mobile devices. In one embodiment, a local server is provided at a particular location, such as at an establishment, venue, etc. The local server can operate to locally wirelessly transmit data to mobile devices within its vicinity. Typically, the mobile devices are associated with persons (users) at the particular location. The mobile devices, or their users, can control, request or influence the particular data content being delivered. The local server can also provide customized data to the mobile devices, individually or as a group. The customization can be based on location, characteristics, interests, preferences and/or requests of the users of the mobile devices.
Abstract:
This invention relates to various methods for a poker player to limit his losses or protect his potential winnings on a given hand prior to completion of the dealing of cards on such hand, based upon his calculated pot equity, or percentage chance of winning the hand.
Abstract:
Methods and systems that facilitate data delivery to electronic devices are disclosed. One aspect pertains to data delivery to electronic devices that are portable, such as, mobile devices. In one embodiment, one mobile device discovers another mobile device within its vicinity. The mobile devices can then wirelessly transmit data from one mobile device to the other. The mobile devices, or their users, can control, request or influence the particular data content being delivered.
Abstract:
A method for information technology and information asset risk assessment of a business relationship between a client and a third party The method includes establishing a database The database includes a plurality of IT information risk factors stored in the database are associated with certain risks the client may be exposed to based on an action the client follows or based upon who the client uses as their third party provider The database is configured to receive IT risk information The IT risk information is associate with the plurality of IT information risk factors The database is also configured to receive updated risk information for storage thereon The method includes receiving risk information corresponding to the subset of relationship risk factors The method continues with generating a relationship risk score The relationship risk score is determined in response to evaluating the subset of relationship risk factors using the IT risk