Abstract:
Embodiments of the present invention are directed to generating and delivering data elements out of the context of an application installation. Each data element generated by an application is transmitted to a collection server after a networked computing device has connected back to a network, and even after the application has been removed from the networked computing device. Each data element is associated with a globally unique transaction identifier. Each data element and its corresponding transaction identifier are packaged together for transmission to the collection server via one or more of a plurality of transmission pathways, including a messaging pathway. The collection server uses the transaction identifier to check whether a corresponding data element is already stored by the collection server. The data element is stored by the collection server, if not already stored.
Abstract:
Embodiments of the present invention relate to a replicator that reproduces acuity deficiencies for use during an accessibility verification procedure. The replicator applies in real time at least one filter to an original video feed. Each filter includes a programmable definition to mimic a type of visual acuity limitation, such as color blindness, myopia, hyperopia, astigmatism or reduced contrast. Prior to and/or during the accessibility verification procedure, a tester is able to select one or more filters to be applied to the original video feed to thereby produce a filtered video feed. The filtered video feed is shown on a display and portrays what an individual with corresponding visual disorder(s) sees. The replicator can be updated to add, delete or modify one or more definitions.
Abstract:
Embodiments of the present invention relate to an enterprise address management system. In the enterprise address management system, addresses are imported and consolidated from external sources and stored in a database. The addresses are continuously updated from the same or different external sources while a history for each address is maintained to allow for retrieval and use of previous information. The history of each address is updated as a corresponding address transitions through an address life cycle as defined by a subscriber. The address life cycle typically is represented by a state model. In some embodiments, the enterprise address management system allows each subscriber to define and configure its own address life cycle state model and to control the flow of addresses through that life cycle.
Abstract:
Embodiments of the invention relate to classification of documents. A user is able to take a snapshot of a document using a smart device. The photo of the document is matched to one or more existing templates. The one or more existing templates are locally stored on the smart device. If the document in the photo is recognized stored on pattern matching, then the photo is tagged with an existing classification. The tagged photo can be locally stored on the smart device, able to and backed up in a cloud, or both. The user is able to perform a search for a particular document stored on key words rather two visually review all photos.
Abstract:
Embodiments of the present invention relate to extraction of a social graph from contact information across a confined user base. Users are typically subscribed to a service that backs up data from end-user devices to a cloud. The data includes contacts from mobile address books. The service is able to determine relationships of contacts in the cloud to build a social graph or map of these contacts. The social graph can be used to drive individual and group analytics to, for example, increase membership and provide value-added features to its service members.
Abstract:
Embodiments of the present invention are directed to an apparatus, system and method of content transferring. Self-contained local servers, typically with built in WiFi access point capabilities, are locally deployed. Each local server acts as a local cache to a remote system Internet cloud infrastructure, which can include one or more remote servers. Each end device participating in the content transfer operation interacts with a local server rather than directly with the cloud infrastructure when a local server is available.
Abstract:
A control file is created which ordinary views that are to be converted to materialized views. A conversion program controlled by the control file can then create all of the materialized views at one time, and only that single conversion program needs to be written. By running the conversion program periodically, it becomes possible to create automatic updates of the materialized views.
Abstract:
A computer implemented method for providing a proof-of-work challenge based on hash mining for reducing spam attacks comprising: receiving an email message from a client device; determining a level of trustworthiness of the client device; generating a challenge message based on the determined trustworthiness of the client device; transmitting the challenge message to the client device; receiving a response to the challenge message from the client device; and forwarding the email to one or more recipients when the response to the challenge message is correct.
Abstract:
Embodiments of the present invention are directed to delivering application data associated with end-user devices to a remote location via an agent running on a networked device, such as an access point. The end-user devices include a first device and a second device that communicate with each other via the access point. Exemplary first and second devices are a source device and a target device, respectively, wherein these devices communicate with each other during a content transfer session. In some embodiments, the source device transfers content to the target device using a Wi-Fi network that is not operatively connected to the Internet. Each end-user device generates application data throughout the session. The agent independently receives the application data from the end-user devices and, thereafter, uploads the application data to the remote location using mobile data or Wi-Fi by switching to a different network that is operatively connected to the Internet.