Abstract:
A method comprising: performing eye exam to a subject having a first and second eye; determining a prescription for the first and second eyes, the prescription describing focal power for each of the first eye and the second eye for at least three distances; and providing the prescription to a machine that produces progressive glasses that comprise a first and second lenses, wherein the first and second lenses each having at least three focal portions associated with the at least three distances that are located in a same height in the glasses thereby enabling clear vision for the subject in the first eye and the second eye with respect to the at least three distances.
Abstract:
In one example of masking phone numbers, a roster of changeable phone numbers may be assigned to a target phone, a presence of the target phone may be registered to a local cell site, a request for one of the changeable phone numbers that is assigned to the target phone for a current time frame may be received, and a phone call that is intended for the target phone may be facilitated using an assigned one of the changeable phone numbers that is assigned to the target phone for the current time frame.
Abstract:
Technology is disclosed for preventing classification of objects, e.g., in an augmented reality system. The technology can identify a set of objects to be classified, determine whether context information for one or more objects in the identified set of objects to be classified is identified as not to be employed during classification, and during classification of two different objects, include context information for one object but not the other.
Abstract:
Technology is disclosed for starting a simulation from a real situation. In various embodiments, the technology receives a parameter corresponding to simulation of a physical entity in a virtual context, receives an attribute corresponding to the physical entity in a physical context, and simulates the physical entity in the virtual context using the attribute as a stimulus. The attribute may identify an actual occurrence during the physical context.
Abstract:
A system and a method of transferring a transaction between a source node and a destination node of a computer network, by at least one processor of an intermediary node may include: receiving a request to transfer the transaction from the source node to the destination node; extracting from the transaction request at least one data element; obtaining from a first database at least one condition element; anonymizing the transaction; and transferring the anonymized transaction from the intermediary node to the destination node, based on at least one of: the at least one condition element and the at least one extracted data element.
Abstract:
In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data fields on the primary browser may be copied to respectively corresponding data fields on the reference browser, and security on the primary browser may be evaluated based on, at least, the data copied to the reference browser.
Abstract:
A remote control may be configured to guide a user's physical movements by transmitting movement signals that are to be translated into haptic instructions, and cooperative actuators may be configured to be worn by the user to translate the movement signals received from the remote control into the haptic instructions. The movement signals may be translated into the haptic instructions for physical movements of any limb or extremity of the user in either of a vertical direction or a horizontal direction; after the first movement signal, the movement signals may be transmitted prior to completion of an immediately previous physical movement; and the movement signals may include horizontal and vertical directional signal components that indicate the horizontal and vertical direction for the user's next physical movement. The haptic instructions that are translated from the horizontal and vertical directional signal components may differ in either duration or magnitude.
Abstract:
Each copy of software (9) is assigned a unique identifying code pattern (27) which is printed on all documents (19) produced with that software (9) by a high resolution printer (17). The unique identifying code pattern (27) is a plurality of spaced apart marks having a size no greater than about 300 dpi, and is therefore, at best, barely noticeable to the human observer. The "invisible signature" is also reproduced on documents (19) made by unauthorized copies of software (9) which can therefore be traced. Preferably, the unique identifying code (27) is replicated multiple times (27>1 5 1 5 1 5
Abstract:
A system and a method of optimizing an organizational structure (OS) of an organization may include: receiving one or more data elements pertaining to the OS; receiving a value of one or more transaction parameters pertaining to one or more transactions conducted over one or more nodes of a computer network; perturbating a value of one or more OS elements; creating a simulated computer network based on the one or more perturbated values; for each network of the computer network and the simulated computer network, calculating a value of at least one OS performance parameter; and generating, based on the calculation, a suggestion for optimizing the OS, wherein the suggestion may include at least one perturbated OS element value.
Abstract:
Technologies related to active lock information maintenance and retrieval are generally described. In some examples, a computing device may be configured to maintain active lock information including lock identifiers for active locks, lock access identifiers corresponding to a number of times a lock has been placed and/or released, and/or lock owner identifiers corresponding to threads placing locks. The computing device may provide an active lock information system configured to return active lock information including some or all of the lock identifiers for active locks, lock access identifiers, and/or lock owner identifiers in response to active lock information requests.