Andersen, WA
Brian Andersen, Kent, WA US
Patent application number | Description | Published |
---|---|---|
20160004263 | GAS DISTRIBUTION SYSTEM WITHIN TEMPERATURE DIFFERENTIATED ENVIRONMENTS - Electrical power is provided to power consuming, heat-exhausting devices by multiple gas-fueled electrical power sources located near such devices. Exhaust heat from such devices is utilized as intake cooling air for the gas-fueled power sources, thereby excluding them from cooling capacity requirements. The gas piping delivering gas to gas-fueled power sources is positioned so as to be within hot aisles comprising exhaust heat. The gas piping is located up high for lighter than air gasses and near the floor for heavier than air gasses, with leak detection located nearby. Additionally, gas piping is externally coated with material that visually indicates a leak. By locating gas piping in the hot aisle, exhausted heat increases temperature and, thereby, pressure of the gas, resulting in more efficient gas distribution through the piping and preventing valve freezing. Furthermore, the gas piping is located after potential ignition sources in the airstream. | 01-07-2016 |
Brian Clark Andersen, Kent, WA US
Patent application number | Description | Published |
---|---|---|
20100188810 | SELF-CONTAINED AND MODULAR AIR-COOLED CONTAINERIZED SERVER COOLING - A modular server cooling unit user standard dimension modules to build a variety of components for use in cooling a server or server farm. One module may be the module in which the server(s) are mounted. Another module may be an exhaust plenum, drawing air through the server module and exhausting the air to the outside. A third module may be a cooling module through which outside air is drawn, filtered and optionally cooled, for example, using an adiabatic, or water-wash, cooler. Exhaust air may be selectively mixed with air from the cooling module to provide finer control of server temperature and humidity. | 07-29-2010 |
20100223085 | MODULARIZATION OF DATA CENTER FUNCTIONS - In one example, a data center may be built in modular components that may be pre-manufactured and separately deployable. Each modular component may provide functionality such as server capacity, cooling capacity, fire protection, resistance to electrical failure. Some components may be added to the data center by connecting them to the center's utility spine, and others may be added by connecting them to other components. The spine itself may be a modular component, so that spine capacity can be expanded or contracted by adding or removing spine modules. The various components may implement functions that are part of standards for various levels of reliability for data centers. Thus, the reliability level that a data center meets may be increased or decreased to fit the circumstances by adding or removing components. | 09-02-2010 |
20120055012 | MODULARIZATION OF DATA CENTER FUNCTIONS - In one example, a data center may be built in modular components that may be pre-manufactured and separately deployable. Each modular component may provide functionality such as server capacity, cooling capacity, fire protection, resistance to electrical failure. Some components may be added to the data center by connecting them to the center's utility spine, and others may be added by connecting them to other components. The spine itself may be a modular component, so that spine capacity can be expanded or contracted by adding or removing spine modules. The various components may implement functions that are part of standards for various levels of reliability for data centers. Thus, the reliability level that a data center meets may be increased or decreased to fit the circumstances by adding or removing components. | 03-08-2012 |
Hans Andersen, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080235384 | Web service for coordinating actions of clients - Architecture for providing communications resources of a network for client intercommunications. A client that desires to communicate makes a request to an arbitrary communications server node by the announcing of identifying information. The web service “parks” the request until the identifying information is ready. A second client can ultimately interact with the first client by sending identifying information and following the same lookup path to find the location at which the first client request is “parked”. A continuous hash is employed that enables a client to negotiate services of a resource and via which resource multiple clients can rendezvous for communications. The continuous hash minimizes the disruption to clients already accessing network resources. A resource is brought online or taken offline without dramatically impacting ongoing use of currently operational resources. In the event a hosting resource fails, the clients repeat the lookup process and re-converge on a new server. | 09-25-2008 |
Hans Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110185436 | URL FILTERING BASED ON USER BROWSER HISTORY - A URL monitoring system may use a user's browsing history to generate a score for the user. The score may be used to permit or deny access to a URL. The score may be used to represent the user's intent when browsing, and based on that intent, the user may be allowed access to a URL with conflicting classifications. The score may be also be used as a trustworthiness score so that a user who browses responsibly may have their score increased over time, and a user who browses irresponsibly or inappropriately may have their score decreased. The scores may be calculated and maintained on a user's client device, edge device, or other device within a network. | 07-28-2011 |
Hans C. Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090144368 | CLIPBOARD FOR APPLICATION SHARING - A software application can be shared by multiple users. A system clipboard of a first computing system is synchronized with a system clipboard of a second computing system when the user of the second computing system is in control of the shared software application. Information contained in the system clipboard of the first computing system is copied to a state buffer and associated with the user who copied the information. The information is returned to the system clipboard when the associated user regains control of the software application. | 06-04-2009 |
Hans Christian Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100241903 | AUTOMATED HEALTH MODEL GENERATION AND REFINEMENT - The present invention extends to methods, systems, and computer program products for automatically generating and refining health models. Embodiments of the invention use machine learning tools to analyze historical telemetry data from a server deployment. The tools output fingerprints, for example, small groupings of specific metrics-plus-behavioral parameters, that uniquely identify and describe past problem events mined from the historical data. Embodiments automatically translate the fingerprints into health models that can be directly applied to monitoring the running system. Fully-automated feedback loops for identifying past problems and giving advance notice as those problems emerge in the future is facilitated without any operator intervention. In some embodiments, a single portion of expert knowledge, for example, Key Performance Indicator (KPI) data, initiates health model generation. Once initiated, the feedback loop can be fully automated to access further telemetry and refine health models based on the further telemetry. | 09-23-2010 |
20120079036 | Message Gateway with Hybrid Proxy / Store-and-Forward Logic - Described is a technology by which an email filtering service or other gateway includes hybrid proxy and store-and-forward logic. A message is initially processed with proxy logic. If the proxy logic is unable to complete filtering/scanning of a message within a timeout period, the store-and-forward logic is invoked to complete filtering/scanning of the message. The store-and-forward logic also may be invoked if a delivery attempt made by the proxy logic fails or does not complete prior to a delivery timeout period. When such a condition is met, the store-and-forward logic accepts the message, including storing the message, sending a response that indicates the message was accepted, and closing the connection over which the message was received. The store-and-forward logic may complete any scanning if not completed by the proxy logic, and takes over delivery responsibilities. | 03-29-2012 |
20150163185 | Message Gateway with Hybrid Proxy / Store-and-Forward Logic - Described is a technology by which an email filtering service or other gateway includes hybrid proxy and store-and-forward logic. A message is initially processed with proxy logic. If the proxy logic is unable to complete filtering/scanning of a message within a timeout period, the store-and-forward logic is invoked to complete filtering/scanning of the message. The store-and-forward logic also may be invoked if a delivery attempt made by the proxy logic fails or does not complete prior to a delivery timeout period. When such a condition is met, the store-and-forward logic accepts the message, including storing the message, sending a response that indicates the message was accepted, and closing the connection over which the message was received. The store-and-forward logic may complete any scanning if not completed by the proxy logic, and takes over delivery responsibilities. | 06-11-2015 |
Henrik Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110243888 | IL-29 MUTANTS AND USES THEREOF - The present invention relates to truncated IL-29 mutant molecules and methods of using same. The truncated IL-29 molecules can be used to treat viral infections, such as hepatitis C, autoimmune disorders and various types of cancer. | 10-06-2011 |
20110263484 | SINGLE CHAIN FC TYPE III INTERFERONS AND METHODS OF USING SAME - The present invention relates to single chain Fc Type III Interferon fusion proteins and methods of using same. The single chain Fc Type III Interferon fusion proteins comprise at least one Type III Interferon, two Fc regions and at least one linker, can be produced in a variety of single chain configurations, and are effector function minus or have a substantially reduced effector function. | 10-27-2011 |
Jacob Andersen, Liberty Lake, WA US
Patent application number | Description | Published |
---|---|---|
20120175005 | CONDUIT AND SYSTEMS - Disclosed herein are conduits and systems. According to an implementation, a conduit may have a conduit layer and one or more detection components within the conduit layer. The one or more detection components are configured to detect when the conduit is damaged. The conduit may be provided upon or within a pre-existing conduit component such that the conduit provides notification when the conduit has been damaged or severed prior to the conduit component being damaged or severed. | 07-12-2012 |
20120176243 | CABLE, SHEATH, AND SYSTEMS - Disclosed herein are cables, cable systems, security systems, and detection components. According to an implementation, a cable may have a first portion and a second portion. The second portion may be further distant from a central axis of the cable than the first portion. The second portion is configured to provide notification when the second portion has been damaged or severed. The second portion may be a sheath and the first portion a pre-existing or conventional cable or wire such that the sheath provides notification when the sheath has been damaged or severed prior to the underlying cable or wire being damaged or severed. | 07-12-2012 |
20130000168 | MOTION ENHANCED SIGN AND METHOD OF PROVIDING INFORMATION - The present disclosure relates to motion enhanced sign apparatuses and methods for providing information such as advertising using a motion enhanced sign apparatus. | 01-03-2013 |
Jacob Silas Lee Andersen, Liberty Lake, WA US
Patent application number | Description | Published |
---|---|---|
20110209508 | Public Facility Bicycle Lock - A bicycle lock device for public use is disclosed. The device is comprised of an enclosure, a retractable reel with a retractable cable, a lock/unlock device having a first member attached to the cable free end, and a second member secured in the enclosure, and a lock control device. The user accesses the device by inserting a payment such as a coin or credit card in a user interface of the device. If the payment is accepted, the user then enters a user-specified key code in a keypad on the lock control device. The lock control device unlocks the lock/unlock device. The retractable cable may then be extended. The user weaves the cable through the bicycle components and then enters the cable free end into the lock/unlock device, thereby locking the lock/unlock device and securing the bicycle. When the user later enters the key-code, the device unlocks the cable. | 09-01-2011 |
James Blades Andersen, Eatonville, WA US
Patent application number | Description | Published |
---|---|---|
20140096898 | Method of Composite Tape Lamination Over Convex Radii - A tape laminating machine having a compaction roller lays up composite tape over a substrate having a convex radius. The compaction roller folds the tape as it moves over the convex radius, while simultaneously pivoting about a trailing edge of the tape to prevent the compaction roller from lifting off the tape laid just before the convex radius. | 04-10-2014 |
20140283981 | METHODS FOR COMPOSITE TAPE LAMINATION OVER VARIOUS ANGLES BETWEEN FIBERS AND LINES TANGENT TO CONVEX RADII - A tape laminating machine having a compaction roller lays up composite tape over a substrate having a convex radius. The compaction roller folds the tape as it moves over the convex radius, while simultaneously pivoting about a trailing edge of the tape to prevent the compaction roller from lifting off the tape laid just before the convex radius. | 09-25-2014 |
Jordan Andersen, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20110289456 | Gestures And Gesture Modifiers For Manipulating A User-Interface - Gesture modifiers are provided for modifying and enhancing the control of a user-interface such as that provided by an operating system or application of a general computing system or multimedia console. Symbolic gesture movements are performed by a user in mid-air. A capture device generates depth images and a three-dimensional representation of a capture area including a human target. The human target is tracked using skeletal mapping to capture the mid-air motion of the user. Skeletal mapping data is used to identify movements corresponding to pre-defined gestures using gesture filters. Detection of a viable gesture can trigger one or more user-interface actions or controls. Gesture modifiers are provided to modify the user-interface action triggered by detection of a gesture and/or to aid in the identification of gestures. | 11-24-2011 |
20120157208 | PERSISTENT HANDLES FOR INTERFACE GUIDES - A computing system translates a world space position of a hand of a human target to a screen space position of a user interface and locks the hand to a handle of the user interface if world space parameters of the hand overcome a grab threshold of the handle. When the hand is locked to the handle, the computing system translates a world space position of the hand to a screen space handle position that is constrained along one or more interface guides. The hand is unlocked from the handle at a release position of the handle if world space parameters of the hand overcome a release threshold of the handle. The handle is retained at the release position after the hand is unlocked from the handle. | 06-21-2012 |
20120218395 | USER INTERFACE PRESENTATION AND INTERACTIONS - Embodiments are disclosed that relate to push and/or pull user interface elements in a user interface with which a user interacts via a depth camera. One embodiment provides a computing device configured to display an image of a user interface comprising one or more interactive user interface elements, receive from a depth camera one or more depth images of a scene including a human target, and display a rendering of a portion of the human target as a cursor positioned within the user interface and also provide to the display a rendering of a shadow of the cursor cast on one or more of the interactive user interface elements. The computing device is further configured to translate movement of the human target hand to the cursor such that movement of the human target hand causes corresponding actuation of a selected interactive user interface element via the cursor. | 08-30-2012 |
20150035750 | ERGONOMIC PHYSICAL INTERACTION ZONE CURSOR MAPPING - Users move their hands in a three dimensional (“3D”) physical interaction zone (“PHIZ”) to control a cursor in a user interface (“UI”) shown on a computer-coupled 2D display such as a television or monitor. The PHIZ is shaped, sized, and positioned relative to the user to ergonomically match the user's natural range of motions so that cursor control is intuitive and comfortable over the entire region on the UI that supports cursor interaction. A motion capture system tracks the user's hand so that the user's 3D motions within the PHIZ can be mapped to the 2D UI. Accordingly, when the user moves his or her hands in the PHIZ, the cursor correspondingly moves on the display. Movement in the z direction (i.e., back and forth) in the PHIZ allows for additional interactions to be performed such as pressing, zooming, 3D manipulations, or other forms of input to the UI. | 02-05-2015 |
20150370349 | ERGONOMIC PHYSICAL INTERACTION ZONE CURSOR MAPPING - Users move their hands in a three dimensional (“3D”) physical interaction zone (“PHIZ”) to control a cursor in a user interface (“UI”) shown on a computer-coupled 2D display such as a television or monitor. The PHIZ is shaped, sized, and positioned relative to the user to ergonomically match the user's natural range of motions so that cursor control is intuitive and comfortable over the entire region on the UI that supports cursor interaction. A motion capture system tracks the user's hand so that the user's 3D motions within the PHIZ can be mapped to the 2D UI. Accordingly, when the user moves his or her hands in the PHIZ, the cursor correspondingly moves on the display. Movement in the z direction (i.e., back and forth) in the PHIZ allows for additional interactions to be performed such as pressing, zooming, 3D manipulations, or other forms of input to the UI. | 12-24-2015 |
Jordan D. Andersen, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20130257748 | TOUCH SENSITIVE USER INTERFACE - A system and method are disclosed for providing a touch interface for electronic devices. The touch interface can be any surface. As one example, a table top can be used as a touch sensitive interface. In one embodiment, the system determines a touch region of the surface, and correlates that touch region to a display of an electronic device for which input is provided. The system may have a 3D camera that identifies the relative position of a user's hands to the touch region to allow for user input. Note that the user's hands do not occlude the display. The system may render a representation of the user's hand on the display in order for the user to interact with elements on the display screen. | 10-03-2013 |
Jordan Dale Andersen, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20150261408 | Multi-stage Cursor Control - Multi-stage cursor control techniques are described herein in which a control algorithm having multiple stages is applied to facilitate fine grained control over cursor movement and positioning. In one or more implementations, monitoring is performed to detect input provided via a controller for a computing device to manipulate a cursor within a user interface for an application. When input is detected, a multi-stage damping algorithm is applied to the detected input. The multi-stage damping algorithm may include both spatial and temporal dampening factors. Movement of the cursor is rendered in accordance with the damped input determined via application of the algorithm. Then, when input to manipulate the cursor is concluded, an attraction sequence is initiated to move the cursor to a target element contained in the user interface. | 09-17-2015 |
Melitta L.g. Andersen, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20120304026 | SEPARATION OF ERROR INFORMATION FROM ERROR PROPAGATION INFORMATION - A system and method for handling exceptions in a multi-threaded computing environment. Information, such as that relating to an error state or pertaining to the propagation history of an exception, is stored in a separate object from the exception object itself. The separate propagation information object is accessible to the plurality of threads that are used to execute a user task. The separate object allows rich diagnostic information pertaining to the exception and its propagation through multiple threads to be presented to the developer of the software. | 11-29-2012 |
Melitta L. G. Andersen, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100218169 | CONTRACT FAILURE BEHAVIOR WITH ESCALATION POLICY - An error handling system is described herein that provides a facility for controlling the behavior of software when the software violates a contract condition. The system provides configurable runtime behavior that takes place when a contract fails. The error handling system provides an event that a hosting application or other software code can register to handle and that the system invokes upon detecting a contract failure. The application's response to the event determines how the system handles the failure. If the event is unhandled, the system triggers an escalation policy that allows an administrator or application to specify how the system handles contract failures. Thus, the error handling system provides increased control over the handling of contract failures within software code. | 08-26-2010 |
Niels H. Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080269221 | ANTIBACTERIAL AGENTS - Antibacterial compounds of formula I are provided: | 10-30-2008 |
20090163496 | ANTIBACTERIAL AGENTS - Antibacterial compounds of formula I are provided: | 06-25-2009 |
20090247506 | Antibacterial agents - Antibacterial compounds of formula I are provided: | 10-01-2009 |
20100324025 | Antibacterial Agents - Antibacterial compounds of formula I are provided: | 12-23-2010 |
20110172174 | Antibacterial agents - Antibacterial compounds of formula I are provided: | 07-14-2011 |
Peter James Andersen, Everett, WA US
Patent application number | Description | Published |
---|---|---|
20120025033 | Method and Apparatus for Optimizing a Load in a Flight Control System While an Aircraft is on the Ground - A method, apparatus, and computer program product for managing movement of a flight control surface on an aircraft. A control signal is received to move the flight control surface to a position. Travel in a number of actuators in a plurality of actuators coupled to the flight control surface is limited to an amount that reduces a load on the number of actuators in the plurality of actuators in response to receiving the control signal while the aircraft is on the ground and the speed of the aircraft is less than a threshold. | 02-02-2012 |
20150148991 | Method and Apparatus for Optimizing a Load in a Flight Control System While an Aircraft is on the Ground - A method, apparatus, and computer program product for managing movement of a flight control surface on an aircraft. A control signal is received to move the flight control surface to a position. Travel in a number of actuators in a plurality of actuators coupled to the flight control surface is limited to an amount that reduces a load on the number of actuators in the plurality of actuators in response to receiving the control signal while the aircraft is on the ground and the speed of the aircraft is less than a threshold. | 05-28-2015 |
Reid Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100306158 | SPEEDING UP ANALYSIS OF COMPRESSED WEB GRAPHS - Classes of web graph algorithms are extended to run directly on virtual node-type compressed web graphs where a reduction in runtime of the extended algorithms is realized which is approximately proportional to the compression ratio applied to the original (i.e., uncompressed) graph. In the virtual node compression technique, a succinct representation of a web graph is constructed by replacing dense subgraphs by sparse ones so that the resulting compressed graph has significantly fewer edges and a relatively small number of additional nodes. | 12-02-2010 |
20100306216 | SHORT PATHS IN WEB GRAPHS WITH SMALL QUERY TIME - Short paths are found with a small query time in scale-free directed graphs using a two-phase process by which data structures comprising shortest path trees are first pre-computed for a group of central vertices called “hubs” that have short paths to most other vertices in the graph. In a query time phase, a short path between two vertices of interest in the graph is found by looking up the path to the root in each of the shortest path trees. | 12-02-2010 |
20110161308 | EVALUATING PREFERENCES OF CONTENT ON A WEBPAGE - Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate evaluation of digital content preferences are provided. A user is presented with items of digital content and permitted to manipulate the arrangement of the digital content items in the context of a layout area. Based on the user's manipulation of the digital content items, a user preference regarding an arrangement of digital content, such as a location preference, a position preference, and/or a usage preference, is identified. In embodiments, such a user preference can be utilized to later display digital content to a user in accordance therewith. | 06-30-2011 |
Reid M. Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100262693 | BOTTOM-UP ANALYSIS OF NETWORK SITES - An approach for identifying suspect network sites in a network environment entails using one or more malware analysis modules to identify distribution sites that host malicious content and/or benign content. The approach then uses a linking analysis module to identify landing sites that are linked to the distribution sites. These linked sites are identified as suspect sites for further analysis. This analysis can be characterized as “bottom up” because it is initiated by the detection of potentially problematic distribution sites. The approach can also perform linking analysis to identify a suspect network site based on a number of alternating paths between that network site and a set of distribution sites that are known to host malicious content. The approach can also train a classifier module to predict whether an unknown landing site is a malicious landing site or a benign landing site. | 10-14-2010 |
20110234594 | GRAPH CLUSTERING - Various embodiments provide techniques for graph clustering. In one or more embodiments, a participation graph is obtained that represents relationships between entities. An auxiliary graph is constructed based on the participation graph. The auxiliary graph may be constructed such that the auxiliary graph is less dense than the participation graph and is therefore computationally less complex to analyze. Clusters in the auxiliary graph are determined by solving an objective function defined for the auxiliary graph. Clusters determined for the auxiliary graph may then be utilized to ascertain clusters in the participation graph that solve a related objective function defined for the participation graph. | 09-29-2011 |
Reid Marlow Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090030916 | LOCAL COMPUTATION OF RANK CONTRIBUTIONS - The claimed subject matter relates to an architecture that can identify, store, and/or output local contributions to a rank of a vertex in a directed graph. The architecture can receive a directed graph and a parameter, and examine a local subset of vertices (e.g., local to a given vertex) in order to determine a local supporting set. The local supporting set can include a local set of vertices that each contributes a minimum fraction of the parameter to a rank of the vertex. The local supporting set can be the basis for an estimate of the supporting set and/or rank of the vertex for the entire graph and can be employed as a means for detecting link or web spam as well as other influence-based social network applications. | 01-29-2009 |
20090222322 | MONETIZING A SOCIAL NETWORK PLATFORM - A system and/or methodology that exploits user interaction within a social network in order to derive profits. The invention provides for increased flow of money through a social network, and simultaneously allows advertisers and merchants to focus their advertising spending within the social network. Additionally, the invention provides for quantitative measurement of the effects of relational proximity marketing /advertising (RPM), and creates incentives for users to purchase goods through the social network. | 09-03-2009 |
20090222435 | LOCALLY COMPUTABLE SPAM DETECTION FEATURES AND ROBUST PAGERANK - The claimed subject matter provides a system and/or a method that facilitates reducing spam in search results. An interface can obtain web graph information that represents a web of pages. A spam detection component can determines one or more features based at least in part on the web graph information. The one or more features can provide indications that a particular page of the web graph is spam. In addition, a robust rank component is provided that limits amount of contribution a single page can provide to the target page. | 09-03-2009 |
20100205126 | LOCAL GRAPH PARTITIONING USING EVOLVING SETS - Providing for local graph partitioning using an evolving set process is disclosed herein. By way of example, a computer processor can be configured to execute local partitioning based on evolving set instructions. The instructions can be employed to transition a set of analyzed vertices of a graph until a segment of the graph with small conductance is identified. A transitioning algorithm can expand or contract the analyzed set of vertices based on characteristics of vertices at a boundary of the analyzed set. Accordingly, as the set of analyzed vertices becomes large, significant processing efficiency is gained by employing the characteristics of boundary vertices to transition the set or determine conductance, rather than all vertices of the analyzed set. | 08-12-2010 |
Stanley Andersen, Stevenson, WA US
Patent application number | Description | Published |
---|---|---|
20110095563 | VEHICLE UNDERBODY AIRFLOW MODULATOR - Methods and apparatuses for decreasing automotive drag in vehicles are provided herein. In embodiments, a vehicle underbody airflow modulator may comprise one or more flexible panels and fasteners. A flexible panel may be retained below the underbody of a vehicle, covering one or more features of the underbody and preventing disruption of airflow by the features. In some embodiments, a tensioning device may be provided to tension the panel. Various embodiments may permit access to the vehicle underbody, dampen road noise, and/or decrease high speed vehicle lift, and may be made available at a lower initial cost than current alternatives. | 04-28-2011 |
Timothy Janelle Andersen, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130304654 | AUTOMATICALLY DETERMINING A CURRENT VALUE FOR A REAL ESTATE PROPERTY, SUCH AS A HOME, THAT IS TAILORED TO INPUT FROM A HUMAN USER, SUCH AS ITS OWNER - A facility procuring information about a distinguished property from a user knowledgeable about the distinguished property that is usable to refine an automatic valuation of the distinguished property is described. The facility displays information about the distinguished property used in the automatic valuation of the distinguished property. The facility obtains user input from of the user adjusting at least one aspect of information about the distinguished property used in the automatic valuation of the distinguished property. On a later the day, facility displays to the user a refined valuation of the distinguished property that is based on the adjustment of the obtained user input. | 11-14-2013 |