Abstract:
Embodiments of the present invention are directed to a device usage controller and methods of limiting device usage in a motor vehicle using audio environment and physical vibration information. The controller incorporates a real time audio feed from a microphone and runs through a pattern matching algorithm to determine the likelihood of the device being in a motor vehicle, such as an automobile, through the detection of environmental noise. The controller also incorporates a second data stream sampled from a motion sensor to determine vibration patterns felt by the device. The second data stream can also be used to determine the likelihood of the device being in a motor vehicle. Either one of the two data streams or the two data streams are combined to control or limit access to the device, automatically trigger assistance or both.
Abstract:
Embodiments of the present invention relate to extraction of a social graph from contact information across a confined user base. Users are typically subscribed to a service that backs up data from end-user devices to a cloud. The data includes contacts from mobile address books. The service is able to determine relationships of contacts in the cloud to build a social graph or map of these contacts. The social graph can be used to drive individual and group analytics to, for example, increase membership and provide value-added features to its service members.
Abstract:
Embodiments of the present invention are directed to an apparatus, system and method of content transferring. Self-contained local servers, typically with built in WiFi access point capabilities, are locally deployed. Each local server acts as a local cache to a remote system Internet cloud infrastructure, which can include one or more remote servers. Each end device participating in the content transfer operation interacts with a local server rather than directly with the cloud infrastructure when a local server is available.
Abstract:
Embodiments of the present invention relate to event notifications on an end-user device of events that are important to a user of the device. The user is typically subscribed to a service that pulls events from a plurality of sources indicated by the user. The sources include a native address book on the device, a social network(s), a professional network(s), and/or another remote location(s) on the Internet. Around the occurrence of an event, the service allows for automatically generating an electronic wish and for purchasing a gift to be presented to one or more recipients associated with the event. The service can transmit the content in various forms and can include a monetizing scheme. The service is able to intelligently determine which events are important to the user such to alert the user of only those relevant events, and to intelligently select an appropriate channel for transmitting the content.
Abstract:
Embodiments of the present invention are directed to a device usage controller and methods of limiting device usage in a motor vehicle using audio environment and physical vibration information. The controller incorporates a real time audio feed from a microphone and runs through a pattern matching algorithm to determine the likelihood of the device being in a motor vehicle, such as an automobile, through the detection of environmental noise. The controller also incorporates a second data stream sampled from a motion sensor to determine vibration patterns felt by the device. The second data stream can also be used to determine the likelihood of the device being in a motor vehicle. Either one of the two data streams or the two data streams are combined to control or limit access to the device, automatically trigger assistance or both.
Abstract:
Embodiments of the present invention relates to a protocol agnostic dynamic messaging platform. Typically, the platform dynamically creates a message based on a transactional state associated with a first external entity. The platform automatically generates content, determines content format, and chooses a transmission protocol for the message to be sent to a second external entity. The platform is advantageously flexible to allow a message of any content type to be transmitted via any transmission protocol.
Abstract:
Systems, methods, devices, and non-transitory computer-readable media for automatic web flow execution are described. The disclosed technology may access flow model data comprising information associated with steps of a web flow. Based on the flow model data, the steps of the web flow may be mapped to application programming interface (API) interactions with a client computing device. Requests may be received from a first client computing device during a session associated with the of the web flow. The requests may be based at least in part on the API interactions. Resources associated with the requests may be accessed. State data associated with the resources requested by the first client computing device during the web flow may be updated. Furthermore, responses comprising links associated with execution of at least one of the one or more steps of the web flow may be sent to the first client computing device.
Abstract:
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed. The method comprises determining whether a connection slot is available for a received call request; executing the call when a connection slot is available; processing the call request when a connection slot is not available, where processing comprises: determining a priority level for the request; when the determined priority level is a low priority, putting the request in a queue for later processing; and when the determined priority level is a high priority, when a low priority call is in progress, performing the steps of: canceling the in-progress low priority call; placing the cancelled low priority call in a queue for later processing; and executing the high priority call; and when no low priority call is in progress, placing the high priority call request in the queue.
Abstract:
A computer implemented method and system for secure initial secret delivery for collocated containers with shared resources techniques is disclosed. The method comprises providing an application type identifier and a token for accessing a secrets management service; creating asynchronously, a plurality of collocated containers with shared resources; initiating a request for a creation for an initial secret; validating the request, requesting an identity for the collocated containers; validating the identity; starting an application instance; and using the initial secret to retrieve other secrets for the application instance.
Abstract:
A computer implemented method and system for a recommendation engine utilizing progressive labeling and user context enrichment. The method comprises receive a request from a current user of a user device, for a recommendation of an item, wherein the request comprises an image of the item; analyzing the item in the image using a plurality of objective machine learning models, wherein analyzing the item in the image comprises assigning an objective label and a percentage of confidence in the assigned label for each of the objective machine learning models; analyzing the item in the image using a plurality of subjective machine learning models wherein analyzing the item in the image comprises assigning an subjective label and a percentage of confidence in the assigned label for each of the subjective machine learning models; retrieving user context information for the current user; generating a plurality of new labels based on the objecting labels, subjective labels, and user context information, wherein each of the plurality of new labels includes a weight signifying the importance of each new label; retrieve one or more recommendations, wherein the one or more recommendations comprise universal resource locations to clothing that matches the labels assigned to the image; and transmit the one or more recommendations to the user device when a confidence level in the recommendations exceeds a predefined threshold.