Ziola
Robert Ziola, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20140140578 | PARKING ENFORCEMENT SYSTEM AND METHOD OF PARKING ENFORCEMENT - A parking enforcement system comprises a camera for capturing a license plate image and software for analyzing the license plate image to generate a read license plate number. The read license plate number is cross-referenced with a list of known license plate numbers to determine if the read license plate number is associated with a payment event. A citation against the read licence plate number if the read license plate is not associated with a payment event. | 05-22-2014 |
Ryder B. Ziola, Edmonton CA
Patent application number | Description | Published |
---|---|---|
20130232552 | Automatic Context Sharing with Privacy - The subject disclosure is directed towards a technology by which a computing device user may share context-related information (e.g., including current activity) with other recipient machines. A requestor may request to peek at a user's context, and if the requestor is valid (pre-approved by the user), a response based on context-related information is sent, which may be via a cloud service. The response may be filtered and/or adjusted based upon the identity of the requestor and other information associated with that identity, e.g., filtering criteria set by the user. Also described is notifying the user of the peek request, and logging information corresponding to the request and response. A broadcast message may also be sent by the device to share context without waiting for a peek request. | 09-05-2013 |
Stefan Ziola, Wolpertswende DE
Patent application number | Description | Published |
---|---|---|
20150083770 | LOAD CARRIER HAVING A COUPLING DEVICE - The invention relates to a foldable load carrier ( | 03-26-2015 |
Thomas Ziola, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20090083833 | AUTHENTICATION WITH PHYSICAL UNCLONABLE FUNCTIONS - Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated. | 03-26-2009 |
Thomas Ziola, Merlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20090254981 | Volatile Device Keys And Applications Thereof - A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software. | 10-08-2009 |
20100272255 | SECURELY FIELD CONFIGURABLE DEVICE - A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data. | 10-28-2010 |
Thomas J. Ziola, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20120226678 | OPTIMIZATION OF SOCIAL MEDIA ENGAGEMENT - Methods for optimizing social media are disclosed. Such methods may include identifying at least one keyword utilized for at least one webpage, identifying social media correspondence referencing the at least one keyword, analyzing content collected from the social media to determine a frequency of references to the at least one keyword and generating at least one report including information based on the analysis. The report may include recommendations for optimizing social media by, for example, increasing visibility by using high-performing keywords. Systems for performing the methods are also disclosed. | 09-06-2012 |
20120254152 | OPTIMIZATION OF SOCIAL MEDIA ENGAGEMENT - Methods for optimizing social media are disclosed. Such methods may include identifying at least one keyword utilized for at least one webpage, identifying social media correspondence referencing the at least one keyword, analyzing content collected from the social media to determine a frequency of references to the at least one keyword and generating at least one report including information based on the analysis. The report may include recommendations for optimizing social media by, for example, purchasing paid posts or links on a social media website. Systems for performing the methods are also disclosed. | 10-04-2012 |
20130091118 | AUDITING OF WEBPAGES - A method of performing an audit of auditable objects within webpages of a website includes identifying an auditable object marker and crawling a portion of a website to identify multiple webpages of the website that each include the auditable object marker. The method may further include configuring an audit rule to determine a property of an auditable object of each of the webpages where the auditable object marker is associated with the auditable object. The method may further include performing an audit of each of the webpages according to the audit rule to determine the property of the auditable object for each of the webpages and grouping the webpages based on the property of the auditable object for each of the webpages. | 04-11-2013 |
20130132437 | OPTIMIZING INTERNET CAMPAIGNS - In an example embodiment, signals are collected from one or more first channels in a communication network. The one or more first channels may include at least one of organic search, paid search, or social media. Based on the collected signals, a recommendation is made with respect to a campaign within a second channel. | 05-23-2013 |
20130191361 | OPTIMIZING LOCATION AND MOBILE SEARCH - A method of optimizing digital content for searches performed on mobile devices. The method may include receiving digital content that includes one or more pages and analyzing the digital content to determine one or more properties of the digital content that relate to placement of a reference to the digital content in mobile search results. The method may also include analyzing the properties of the digital content to determine one or more optimizations to apply to the digital content to improve the placement of the reference to the digital content in the mobile search results. In addition, the method may include generating one or more recommendations for adapting the digital content based on the optimizations. | 07-25-2013 |
20130290289 | INTEGRATION OF THIRD PARTY INFORMATION - An example embodiment may include a method of managing digital content. The method may include selecting third party digital content. The third party digital content may reside in a third party system or be controlled by the third party system. The method may further include collecting search engine optimization (SEO) data associated with the third party digital content. The method may also include defining an SEO policy to generate recommendations regarding the third party digital content based on the SEO data. The method may also include analyzing the third party digital content by applying the SEO policy to the SEO data to generate one or more recommendations regarding the third party digital content. | 10-31-2013 |
20150066590 | OPTIMIZATION OF SOCIAL MEDIA ENGAGEMENT - Methods for optimizing social media are disclosed. Such methods may include identifying at least one keyword utilized for at least one webpage, identifying social media correspondence referencing the at least one keyword, analyzing content collected from the social media to determine a frequency of references to the at least one keyword and generating at least one report including information based on the analysis. The report may include recommendations for optimizing social media by, for example, increasing visibility by using high-performing keywords. Systems for performing the methods are also disclosed. | 03-05-2015 |
Thomas John Ziola, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20120246134 | DETECTION AND ANALYSIS OF BACKLINK ACTIVITY - Systems and methods for detecting and analyzing changes in backlink activity over a period of time are disclosed. For example, the backlinks to web-based content and websites of an entity and/or a competitor of the entity may be monitored over time and changes in the backlinks over time may be determined. Comparison of backlink activity over time may be used to evaluate the backlinks of the competitor to ascertain, group, or otherwise categorize or rank the reasonableness and level of authenticity and actual content value of the backlinks themselves and to determine whether such backlinks are likely to be “black hat” backlinks subject to penalization by search engines. | 09-27-2012 |