Patent application number | Description | Published |
20130173419 | RECOMMENDING REPEATED TRANSACTIONS - A computer implemented web-based system and computer implemented web-based method is disclosed for recording, repeated transactions of objects or groups of objects by subjects, utilizing the duration between transactions to predict the next transaction time of an object by a subject, and recommending the object to the subject based on the predicted next transaction time. The system can also classify object according to their replenishment behavior and make product recommendations based on the class of objects a subject shows interest in. Objects include movies, books, songs, commercial products, news articles, advertisements or any other type of content or physical item. The system has application in personalization, behavioral targeting, Internet retailing, and interactive radio, to name but a few applications. | 07-04-2013 |
20130173524 | EXTRACTING PREDICTIVE SEGMENTS FROM SAMPLED DATA - A system and method is disclosed which predicts the relative occurrence or presence of an event or item based on sample data consisting of samples which contain and samples which do not contain the event or item. The samples also consist of any number of descriptive attributes, which may be continuous variables, binary variables, or categorical variables. Given the sampled data, the system automatically creates statistically optimal segments from which a functional input/output relationship can be derived. These segments can either be used directly in the form of a lookup table or in some cases as input data to a secondary modeling system such as a linear regression module, a neural network, or other predictive system. | 07-04-2013 |
20130173583 | KEYWORD INDEX PRUNING - A system and method is disclosed for profiling a subject's search engine keywords and results based on relevancy feedback. Because the system is based on the search behavior of the user, the profiling is language independent and balances the specificity of search terms against the profiled interests of the user. The system can also score keywords on their search effectiveness and eliminate ineffective keywords from the keyword index. The system can also synthesize new keyword combinations to assist the user in refining the search or acquiring related content. The system has application in text mining, personalization, behavioral search, search engine optimization, and content acquisition, to name but a few applications. | 07-04-2013 |
Patent application number | Description | Published |
20090200097 | ELECTRONIC STEERING SYSTEM FOR A VEHICLE - An electronic steering system for a vehicle includes a generally freely rotating steering column, a sensor for determining a rotational position of the steering column and a controller for turning tires on the vehicle based upon the rotational position of the steering column. When the vehicle is switched to one of various steer modes the controller electronically resets the rotational position of the steering column to a zero rotational position without physically turning the steering column. A steering brake limits over-rotation of the steering column to prevent the tires on the vehicle from turning beyond a safe distance. The controller electronically resets the rotational position of the steering brake when the steer mode is changed. | 08-13-2009 |
20090200116 | MULTI-FUNCTION JOYSTICK FOR FORKLIFT CONTROL - A multi-function joystick system controls forklift mast, tilt and fork functions. The system includes a single joystick pivotable about two axes and having first, second and third buttons and a trigger. Combinations of pivoting the joystick alone or in combination with pressing buttons and triggers performs eight forklift functions including negative lift/lower, free lift/lower, maximum lift/lower, tilt forward/backward, left fork left/right, right fork left/right, both forks left/right, and fork open/close. | 08-13-2009 |
20090200117 | SLIDER SCISSOR LIFT FOR A VEHICLE OPERATOR CONSOLE - An improved slider scissor lift results in forward or backward movement of a raised work platform. The forward or backward movement is achieved by positioning upper pins and sliders oppositely from lower pins and sliders. This oppositely pinned configuration results in an operation whereby the base of the scissor lift is moved toward the rear of the base platform and the work platform is drawn toward the rear of the scissor lift. | 08-13-2009 |
20090200836 | GUSSETED TORSION SYSTEM FOR AN OPEN FRAME VEHICLE - A gusseted torsion system minimizes torsional deflection in an open frame vehicle having a generally U-shaped frame with two generally parallel beams. The gusseted torsion system includes cross members extending between the parallel beams and gussets adjacent each end of the cross members. The gussets are affixed to the parallel beams to counter torsional forces created by loads exerted on the parallel beams. | 08-13-2009 |
Patent application number | Description | Published |
20080215735 | Resource invalidation in a content delivery network - A repeater server in a content delivery network (CDN) maintains a list of resources that are no longer valid. When the server gets a request for a resource, it checks whether that resource is on the list, and, if so, it replicates the resource from a content provider's content source such as an origin server. Otherwise the repeater server tries to serve a copy of the requested resource or to obtain a copy from another location in the CDN. | 09-04-2008 |
20080215750 | Controlling subscriber information rates in a content delivery network - A plurality of content providers provide multiple resources to multiple clients. At least some of said resources are to be served to clients from a shared content delivery network (CDN) formed by a plurality of repeater servers. Each content provider provides at least some resources via one or more content sources associated with that content provider. Amounts of data transmitted by the CDN on behalf of each of the plurality of content providers are monitored. Based at least in part on said monitoring, requests for resources are selectively delivered at a lower transmission rate. The lower transmission rate is achieved by generating pauses or delays in the transmission. | 09-04-2008 |
20080215755 | Delivering resources to clients in a distributed computing environment with rendezvous based on load balancing and network conditions - A plurality of repeater servers form a shared content delivery network (CDN) to serve resources to clients on behalf of a plurality of content providers. First and second resources are associated with a first content provider, the first resource referencing the second resource. The second resource is associated with a domain of the shared CDN. Responsive to a request that causes the first resource to be served to a client from a server in a domain associated with the first content provider, a CDN server is identified in the domain associated with the shared CDN to serve the second resource to the client. The CDN server is selected based, at least in part, on load conditions on at least some of the CDN servers, and on the client's location. Responsive to the CDN server being requested to serve the second resource: if a copy of the second resource is available on the CDN server, the copy is served to the client from the CDN server; otherwise, the second resource is replicated on the CDN server and then served to the client from the CDN server. | 09-04-2008 |
20110196894 | ACCESSING DATA IN A DATA PROCESSING SYSTEM - A method, in a system in which a plurality of data items are distributed across a plurality of computers, includes, at a first computer in the network, (a) receiving from a requesting computer in said network, a request, the request including a specific name of a particular data item, wherein the particular data item comprises a particular sequence of bits, and wherein the specific name of the particular data item is based at least in part on the data comprising the particular data item, the specific name of the particular data item having been determined, at least in part, using a given function of the particular sequence of bits, wherein two identical sequences of bits have the same name as determined using the given function; and (b) causing said requesting computer to obtain at least a portion of said particular data item from a second computer in said network, said second computer being distinct from said first computer. | 08-11-2011 |
20110219120 | Transparent Redirection Of Resource Requests - A plurality of repeater servers form a shared content delivery network (CDN) to serve resources to clients on behalf of a plurality of content providers. First and second resources are associated with a first content provider, the first resource referencing the second resource. The second resource is associated with a domain of the shared CDN. Responsive to a request that causes the first resource to be served to a client from a server in a domain associated with the first content provider, a CDN server is identified in the domain associated with the shared CDN to serve the second resource to the client. The CDN server is selected based, at least in part, on load conditions on at least some of the CDN servers, and on the client's location. Responsive to the CDN server being requested to serve the second resource: if a copy of the second resource is available on the CDN server, the copy is served to the client from the CDN server; otherwise, the second resource is replicated on the CDN server and then served to the client from the CDN server. | 09-08-2011 |
20110225177 | Accessing Data In A Content-Addressable Data Processing System - A method of managing information in a content-addressable computer system comprising a plurality of computers including at least a first computer and at least two second computers. The method includes creating a first identifier for a data item, at least in part, by hashing the content of the data item; sending a request including the first identifier from the first computer to the at least two second computers to access the data item, wherein at least one of the at least two second computers uses the first identifier to access the data item; and verifying that the content of the data item has not changed since the creation of the first identifier. 2. The method may include using the first identifier to locate a storage location for the data item on the computer system. The first identifier may be based on the entire content of the data item | 09-15-2011 |
20110231647 | ACCESSING DATA IN A CONTENT-ADDRESSABLE DATA PROCESSING SYSTEM - A computer-implemented method operable in a computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method includes: obtaining a first identifier from the first computer at the at least two second computers, said first identifier having been determined, at least in part, by applying a first function to the content of the data item, wherein the first function comprises a hash function; and at least one of the at least two second computers using the first identifier to ascertain a storage location for the data item on the computer system. At least one of the at least two second computers may use the first identifier to access the data item on the computer system. The method may include verifying that the content of the data item has not changed since creation of the first identifier. | 09-22-2011 |
20120117111 | Data Distribution in A Data Processing System - A first data item is split into one or more parts. A corresponding name is determined for each of the one or more parts, each part name being determined using a message digest function or hash function of all of the data in the corresponding part. A second file is created to include the part names of the one or more parts of the first data item. Each of the one or more parts is caused to be distributed to at least one location in a computer network. In response to a request for the first data item, the second file is provided. The name of the second file may be published as a name for the first data item. The network may be a peer-to-peer network. | 05-10-2012 |
20120131058 | Access Control in A Data Processing System Using Data Item Signatures - A device maintains multiple signatures, including at least one signature for each of a plurality of data items. At least corresponding signature for a data item is based at least in part on a given function of at least some of the contents of that data item. The device receives a particular sequence of bits and determines at least one signature for that particular sequence of bits, based at least in part on the given function of at least some of the particular sequence of bits. The device determines, based at least in part on the signature for the particular sequence of bits, and using the multiple signatures, whether the device may access the particular sequence of bits. | 05-24-2012 |