MYSPACE, INC. Patent applications |
Patent application number | Title | Published |
20120114199 | IMAGE AUTO TAGGING METHOD AND APPLICATION - A method, apparatus, system, article of manufacture, and computer readable storage medium provides the ability to automatically tag a photograph. First photographs are obtained. Each of the first photographs is associated with a tag that uniquely identifies a user. Based on the tag and the first photographs, a single facial identification record (FIR) is generated for the user. A second photograph is uploaded. Profile based FIRs for the user that uploaded the second photograph is obtained. A matching FIR from the profile based FIRs that match a second face in the second photograph is obtained. | 05-10-2012 |
20120066699 | DYNAMIC NATIVE BINDING FOR MANAGED ASSEMBLIES - A method, apparatus, system, article of manufacture, and computer readable storage medium provides the ability to dynamically bind a native assembly from a managed assembly. A managed assembly (e.g., a dynamically linked library (DLL)) is obtained. In the managed assembly, native application program interface entry points are identified. For each of the entry points, intended platform(s) and associated correct native assembly(ies) are specified in the managed assembly. The managed assembly is deployed onto a computer. For example, the single collection of managed and native assemblies can be deployed to all targeted computers, which consist of varying platform environments. During runtime execution, the executing platform of the application is determined. Based on the executing platform, an intended platform is selected and the entry points are bound to the correct native assembly. | 03-15-2012 |
20120041972 | METADATA INGESTION TO STREAM CUSTOMIZATION - A method, apparatus, system, article of manufacture, and computer-readable storage medium provide for the ingestion of personalized information to provide customization. A request to customize a user's interactive experience on a website or application is received from a user. Personalized information based on a user's activities is ingested. The user activities are independent from activities on the website or application. A database is searched based on the personalized information and search results are produced. The user's interactive experience is customized based on the search results. | 02-16-2012 |
20110066894 | DEBUGGING A MAP REDUCE APPLICATION ON A CLUSTER - A method, apparatus, system, article of manufacture, and data structure provide the ability to debug a map-reduce application on a cluster. A cluster of two or more computers is defined by installing a map-reduce framework (that includes an integrated development environment [IDE]) onto each computer. The cluster is formatted by identifying and establishing communication between each computer so that the cluster functions as a unit. Data is placed into the cluster. A function to be executed by the framework on the cluster is obtained, debugged, and executed directly on the cluster using the IDE and the data in the cluster. | 03-17-2011 |
20110066649 | DOUBLE MAP REDUCE DISTRIBUTED COMPUTING FRAMEWORK - A method, apparatus, system, article of manufacture, and data structure provide the ability to perform a sorted map-reduce job on a cluster. A cluster of two or more computers is defined by installing a map-reduce framework onto each computer and formatting the cluster by identifying the cluster computers, establishing communication between them, and enabling the cluster to function as a unit. Data is placed into the cluster where it is distributed so that each computer contains a portion of the data. A first map function is performed where each computer sorts their respective data and creates an abstraction that is a representation of the data. The abstractions are exchanged and merged to create complete abstraction. A second map function searches the complete abstraction to redistribute and exchange the data across the computers in the cluster. A reduce function is performed in parallel to produce a result. | 03-17-2011 |
20110052012 | Security and Monetization Through Facial Recognition in Social Networking Websites - A method of facial feature recognition at an image hosting website includes receiving an image, processing the received image at a recognition server to identify features and/or people, determining at least one of, a targeted ad based on the identified features, and a comparison the identified features in the image to images in an image database, and driving a security measure or targeted ad in response to the determining. | 03-03-2011 |
20110044512 | Automatic Image Tagging - A method of automatic tagging of images on an image hosting website includes receiving at least one image, locating faces and/or people in the received image, recognizing features of the located faces and/or people, and automatically tagging the located faces and/or people in response to the recognizing. | 02-24-2011 |
20100325615 | METHOD AND SYSTEM FOR CAPTURING WEB-PAGE INFORMATION THROUGH WEB-BROWSER PLUGIN - Capturing web-page information through a web-browser plug-in includes accessing a target test website, receiving webpage data from the target test website, injecting test code into the webpage data to create a modified webpage, executing the injected test code from the modified webpage, and outputting results of the executing. | 12-23-2010 |
20100263046 | SECURITY WRAPPER METHODS AND SYSTEMS - In one example, a web content security system embedded in a computer-usable storage medium that identifies potential threats when executed by one or more processors is provided. The web content security system includes a communications monitor module that monitors at least one of data communications between web objects on a web page and data communications between web objects on a web page and a server, and that identifies a potential threat based on the data communications. A logger module generates report data based on the identified potential threat. | 10-14-2010 |