Patent application number | Description | Published |
20140183278 | Perforated fluid dispensing hose or tube for the purpose of applying liquids and/or gases to railroad tracks including railroad switches, railroad crossings, bridge overheads and tunnel walls - This invention uses a perforated hose or tube, of various shapes, sizes and wall thicknesses, to evenly and accurately dispense fluids such as lubricants, anti-ice, anti-snow or other liquids and/or gases onto railroad tracks including railroad switches, railroad crossings, bridge overheads, tunnel walls and even roof tops. This is accomplished by fastening or affixing, by clamp or other means, the hoses or tubes along the length of the railroad tracks, railroad switches, railroad crossings, bridge overpasses, tunnel walls and even roof tops for the purpose of manually, automatically and/or remotely controlling liquid or gas application of various amounts and at various frequencies of application. The hoses or tubes are connected to an operational box wherein a communication device, a pump/s, a compressor and reservoir/s of liquid/s and/or gases, such as anti-icing agents, lubricants, and/or other liquids can be delivered. The hoses or tubes can be a single set of hoses or tubes or they can be serially connected via easy connector boxes allowing for multiple spray application points. | 07-03-2014 |
Patent application number | Description | Published |
20090266908 | WATER SPRINKLER TOY - A water sprinkler toy includes a base having a water inlet and a nozzle adapted to spray water in the shape of a funnel. Additionally, the water sprinkler toy includes an object capable of being suspended in the air by the water. | 10-29-2009 |
20120175426 | SPRINKLER - According to one aspect, embodiments of the invention provide a sprinkler comprising a base, a connector coupled to the base and configured for coupling to an external water supply, and a body rotatably mounted on the base and in fluid communication with the water supply through the connector and the base, the body including one or more orifices configured to spray, in a defined pattern, water received from the external water supply, and further including at least one hole configured to spray, in a substantially horizontal direction, water received from the external water supply, wherein the spray exiting from the at least one hole causes said body to rotate, and wherein the defined pattern of the spray exiting the one or more orifices is a spiral or helical-shaped spray. | 07-12-2012 |
20120206920 | IMAGE VIEWING DEVICE - A viewing device includes an interior assembly includes an interior frame having an exterior surface, an exterior assembly coupled to the interior assembly including an exterior lens, the exterior lens having an interior surface, wherein the interior surface of the exterior lens faces the exterior surface of the interior frame. The viewing device includes a reflective surface on the exterior lens, and an object located on the interior assembly adapted to project an image onto the reflective surface. The reflective surface is configured to reflect the projected image toward the interior assembly. | 08-16-2012 |
Patent application number | Description | Published |
20150193226 | INSTRUMENTATION AGENT FOR MANIPULATING COMPONENT RESPONSES - A first software agent is used to intercept first data sent to a first software component from a second software component, each of the first and second software components included in a plurality of software components that are included in the particular software system. The first agent is used to determine that a particular value of the intercepted first data is different from one or more preferred values for the first data. Substitute data having a preferred value is passed to the first software component in lieu of the intercepted data. | 07-09-2015 |
20150205703 | Service Modeling and Virtualization - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150286552 | Spreadsheet Data Transfer Objects - Various systems and methods are disclosed for automatically generating a spreadsheet template to store information usable to generate one or more data transfer objects for input to a system under test. One such method involves identifying one or more properties of a data transfer object to be input to a software system under test. Identifying the properties of the data transfer object involves inspecting one or more structural requirements of a module within the software system under test that consumes that data transfer object. The method then automatically generates a spreadsheet template corresponding to the data transfer object, such that the spreadsheet template includes a respective column for each of the properties of the data transfer object. The spreadsheet template is configured to store information representing one or more versions of the data transfer object. | 10-08-2015 |
Patent application number | Description | Published |
20140223418 | PERFORMANCE DATA IN VIRTUAL SERVICES - Performance data is accessed that describes a response time of a first software component to a particular request of another software component. A virtual service is instantiated to simulate operation of the first software component. In some instances, the virtual service can be instantiated based on a service model. The virtual service uses the performance data to generate responses to requests received from a second software component based on the performance data. | 08-07-2014 |
20150199212 | MAINFRAME VIRTUALIZATION - Request data is identified that describes a request of a second program by a first program intercepted by a first exit in the first program. Response data is identified that describes a response by the second program to the request as intercepted by a second exit in the first program. A virtual service configured to model operation of the second program is instantiated based on the request data and response data. In another aspect, a request by the first program to the second program is intercepted by the first exit and the request is redirected to the virtual service. A response is received as generated by the virtual service and the response is returned to the first program using the second exit. | 07-16-2015 |
20150199256 | MODELING AND TESTING OF INTERACTIONS BETWEEN COMPONENTS OF A SOFTWARE SYSTEM - A first set of information is identified, collected by a first agent during monitoring of a first software component. A second set of information is identified, that was collected by a second agent during monitoring of a second software component. It can be determined that the first and second sets of information each include characteristics of a particular transaction involving the first and second software components. A model is generated of the particular transaction based at least in part on the first and second sets of information. The model includes a representation of the involvement of the first and second software components within the particular transaction. In some aspects, characteristics included in the first and second set of information can include timing information for use, for example, in generating a model representing ordering of software components' involvement in one or more transactions. | 07-16-2015 |
20150205699 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150205700 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150205701 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150205702 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150205708 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150205712 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150205713 | SERVICE MODELING AND VIRTUALIZATION - The systems and methods described herein can be used to provide virtual service environments. In one embodiment, a virtual service model is generated by detecting one or more transactions, each of which includes a request sent from a requester to a software service and a response sent from the software service to the requester; storing information describing the detected transactions in a virtual service model, where the information describing each transaction includes information identifying a command included in the request and information identifying a response attribute included in the response; and generating information describing an unknown transaction, where the information describing the unknown transaction includes information identifying a first command and information identifying a first response attribute. The first command and the first response attribute are copies of a corresponding command and a corresponding response attribute associated with a corresponding one of the detected transactions. | 07-23-2015 |
20150212920 | SOFTWARE SYSTEM VALIDITY TESTING - Data is identified that represents a path of a transaction that includes a plurality of transaction fragments associated with a plurality of software components. The transaction returns a particular value and a particular one of the plurality of software components is identified as a source of the particular value. A test action is generated that, when executed, is to attempt to verify the particular value from the particular software component. | 07-30-2015 |
20150220423 | TRANSACTIONAL BOUNDARIES FOR VIRTUAL MODEL GENERATION - Data is identified that represents a path of a transaction that includes a plurality of transaction fragments associated with a plurality of software components. The plurality of software components includes a first software component to communicate in the transaction with a second software component over an interface. A transaction boundary is determined between the first and second software components based at least in part on the data. A virtual model is generated to simulate at least a particular one of the plurality of software components based on the identified transaction boundary. | 08-06-2015 |
Patent application number | Description | Published |
20150205704 | GRAPHICAL MODEL FOR TEST CASE VIEWING, EDITING, AND REPORTING - Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon. An assertion (e.g., against test results obtained by performing the first testing activity) is associated with the connector. | 07-23-2015 |
20150205706 | GRAPHICAL MODEL FOR TEST CASE VIEWING, EDITING, AND REPORTING - Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon. An assertion (e.g., against test results obtained by performing the first testing activity) is associated with the connector. | 07-23-2015 |
Patent application number | Description | Published |
20080278676 | EYEWEAR FOR REDUCING SYMPTOMS OF COMPUTER VISION SYNDROME - Computer eyewear for reducing the effects of Computer Vision Syndrome (CVS). In one embodiment, the eyewear comprises a frame and two lenses. In some embodiments, the frame and lenses have a wrap-around design to reduce air flow in the vicinity of the eyes. The lenses can have optical power in the range of approximately +0.5 to +2.5 diopters for reducing accommodation demands on a user's eyes when using a computer. The lenses can also include prismatic power for reducing convergence demand on a user's eyes when sitting at a computer. The lenses can also include a partially transmissive mirror coating, tinting, and anti-reflective coatings. In one embodiment, a partially transmissive mirror coating or tinting spectrally filters light to remove spectral peaks in fluorescent or incandescent lighting. | 11-13-2008 |
20100066974 | LOW-POWER EYEWEAR FOR REDUCING SYMPTOMS OF COMPUTER VISION SYNDROME - Computer eyewear for reducing the effects of Computer Vision Syndrome (CVS). In one embodiment, the eyewear comprises a frame and two lenses. In some embodiments, the frame and lenses have a wrap-around design to reduce air flow in the vicinity of the eyes. The lenses can have optical power in the range from about +0.1 to +0.25 diopters, or from about +0.125 to +0.25 diopters, for reducing accommodation demands on a user's eyes when using a computer. The lenses can also include prismatic power for reducing convergence demand on a user's eyes when sitting at a computer. The lenses can also include a partially transmissive mirror coating, tinting, and anti-reflective coatings. In one embodiment, a partially transmissive mirror coating or tinting spectrally filters light to remove spectral peaks in fluorescent or incandescent lighting. | 03-18-2010 |
20120086905 | EYEWEAR FOR REDUCING SYMPTOMS OF COMPUTER VISION SYNDROME - Computer eyewear for reducing the effects of Computer Vision Syndrome (CVS). In one embodiment, the eyewear comprises a frame and two lenses. In some embodiments, the frame and lenses have a wrap-around design to reduce air flow in the vicinity of the eyes. The lenses can have optical power in the range of approximately +0.5 to +2.5 diopters for reducing accommodation demands on a user's eyes when using a computer. The lenses can also include prismatic power for reducing convergence demand on a user's eyes when sitting at a computer. The lenses can also include a partially transmissive mirror coating, tinting, and anti-reflective coatings. In one embodiment, a partially transmissive mirror coating or tinting spectrally filters light to remove spectral peaks in fluorescent or incandescent lighting. | 04-12-2012 |
20130010251 | EYEWEAR FOR REDUCING SYMPTOMS OF COMPUTER VISION SYNDROME - Computer eyewear for reducing the effects of Computer Vision Syndrome (CVS). In one embodiment, the eyewear comprises a frame and two lenses. In some embodiments, the frame and lenses have a wrap-around design to reduce air flow in the vicinity of the eyes. The lenses can have optical power in the range of approximately +0.5 to +2.5 diopters for reducing accommodation demands on a user's eyes when using a computer. The lenses can also include prismatic power for reducing convergence demand on a user's eyes when sitting at a computer. The lenses can also include a partially transmissive mirror coating, tinting, and anti-reflective coatings. In one embodiment, a partially transmissive mirror coating or tinting spectrally filters light to remove spectral peaks in fluorescent or incandescent lighting. | 01-10-2013 |
20130132904 | CONTENT SHARING APPLICATION UTILIZING RADIALLY-DISTRIBUTED MENUS - Disclosed herein are encoded computer readable storage media and computer-implemented systems creating a content sharing application comprising: a software module for identifying content to share; a software module for displaying a radially-distributed menu of destinations for identified content in response to a first user interaction, wherein said menu of destinations allows a user to select at least one destination; a software module for displaying a radially-distributed menu of individuals associated with one or more displayed destinations in response to a second user interaction, wherein said menu of individuals allows a user to select at least one individual; and a software module for customizing said radially-distributed menus. Also disclosed are methods for rapidly sharing content utilizing the same. | 05-23-2013 |
20150153591 | LOW-POWER EYEWEAR FOR REDUCING SYMPTOMS OF COMPUTER VISION SYNDROME - Computer eyewear for reducing the effects of Computer Vision Syndrome (CVS). In one embodiment, the eyewear comprises a frame and two lenses. In some embodiments, the frame and lenses have a wrap-around design to reduce air flow in the vicinity of the eyes. The lenses can have optical power in the range from about +0.1 to +0.25 diopters, or from about +0.125 to +0.25 diopters, for reducing accommodation demands on a user's eyes when using a computer. The lenses can also include prismatic power for reducing convergence demand on a user's eyes when sitting at a computer. The lenses can also include a partially transmissive mirror coating, tinting, and anti-reflective coatings. In one embodiment, a partially transmissive mirror coating or tinting spectrally filters light to remove spectral peaks in fluorescent or incandescent lighting. | 06-04-2015 |
Patent application number | Description | Published |
20120005075 | SYSTEMS AND METHODS FOR INCREASING COLLECTION AGREEMENT FULFILLMENT AND TRACEABILITY - A system for receiving a payment for a financial obligation of a payer via a staged transaction, and for identifying an originator of the staged transaction. A collection system may be configured to, per the originator, associate the obligation with an identifier which may be unique to the obligation and indicative of the originator, to associate the transaction with the identifier, and to provide the identifier to the payer. A provider system may be configured to receive a first record related to the transaction from the collection system, to receive a second record related to the transaction which indicates a payment has been received, and to send a third record related to the transaction to the collection system which indicates a payment has been received. A provider subsystem may be configured to receive the identifier from the payer, and send the second record to the provider system. | 01-05-2012 |
20120023008 | N TO N MONEY TRANSFERS - Various methods, systems, and devices are described for performing money transfers to one or more payees from one or more payors using a money transfer system. A party, such as a payor, a payee, or a third party may create a set of payee rules. The same or a different party may also create a set of payor rules. The payee rules may comprise conditions which, when satisfied, permit a payee to receive funds from a funds pool. The payor rules may comprise conditions which, when satisfied, permit a payor to provide funds to the funds pool. The money transfer system may determine whether requests from a payor and a payee comply with the payor rules and the payee rules, respectively. Based on the determination, the payor and/or payee may be permitted to complete their requested transaction, or their transaction may be denied. | 01-26-2012 |
20120030098 | RECEIVER DRIVEN MONEY TRANSFER ALERT SYSTEM - A method for performing a money transfer initiated by a receiver of the money transfer, wherein the method includes receiving a money transfer initiation request from the receiver and the money transfer initiation request includes an amount of funds to be transferred, receiver information, and sender information. The method also includes staging a money transfer transaction after receiving the money transfer initiation request, wherein the money transfer transaction is pending an authorization by the sender to fund the money transfer. The method further includes providing the sender with a notification of the money transfer transaction, receiving the authorization to fund the money transfer transaction, and executing the money transfer to transfer the funds from the sender to the receiver. | 02-02-2012 |
20120030100 | RECURRING MONEY TRANSFER - A system and method of performing a value-advance money transfer comprising: receiving a money transfer request; determining whether an account associated with a sender of funds includes a sufficient amount of funds to cover a money transfer request; providing an amount of funds from a money transfer provider to the account associated with the sender to cover the money transfer request; making the amount of funds available to the sender for use in the money transfer; and executing a money transfer from the account to the control of the receiver. | 02-02-2012 |
20130166454 | RECEIVER DRIVEN MONEY TRANSFER ALERT SYSTEM - A method for performing a money transfer initiated by a receiver of the money transfer, wherein the method includes receiving a money transfer initiation request from the receiver and the money transfer initiation request includes an amount of funds to be transferred, receiver information, and sender information. The method also includes staging a money transfer transaction after receiving the money transfer initiation request, wherein the money transfer transaction is pending an authorization by the sender to fund the money transfer. The method further includes providing the sender with a notification of the money transfer transaction, receiving the authorization to fund the money transfer transaction, and executing the money transfer to transfer the funds from the sender to the receiver. | 06-27-2013 |
20140188661 | UNIVERSAL LEDGER - The present invention provides systems and methods for tracking obligations incurred between individuals. The method may include receiving a request from a first party, where the request includes an expense incurred by the first party for the benefit of a second party. The method may also include providing a notice of the request to the second party and receiving an acceptance from the second party to assume an obligation associated with the expense. The method may further include associating the obligation with the second party and associating a benefit with the first party. The obligation and/or benefit may be substantially equal in value to the expense. The method may additionally include interfacing with a social network service to provide the social network service with information about the obligation and/or the benefit. | 07-03-2014 |
20140316977 | RECURRING MONEY TRANSFER - A system and method of performing a value-advance money transfer comprising: receiving a money transfer request; determining whether an account associated with a sender of funds includes a sufficient amount of funds to cover a money transfer request; providing an amount of funds from a money transfer provider to the account associated with the sender to cover the money transfer request; making the amount of funds available to the sender for use in the money transfer; and executing a money transfer from the account to the control of the receiver. | 10-23-2014 |
20150073979 | MULTIPLE-ENTITY TRANSACTION SYSTEMS AND METHODS - Methods and systems are provided for performing a funds transfer. The method may include determining which of a plurality of different funds-transfer companies is able to complete the funds transfer in accordance with defined parameters. The method may also include determining a default service fee charged for the funds transfer by a funds-transfer company of a subset of the plurality of different funds-transfer companies. The method may additionally include transmitting to at least one funds-transfer company of the subset of the plurality of different funds-transfer companies details of the funds transfer, where the details of the funds-transfer comprises the default service fee. The method may furthermore include transmitting an identification of the subset of the plurality of different funds-transfer companies, each of which is capable of completing the funds transfer in accordance with the defined parameters, the subset including at least two of the plurality of different funds-transfer companies. | 03-12-2015 |
Patent application number | Description | Published |
20110225088 | RECEIVER-BASED FUNDS TRANSFER - Methods, systems, and devices are described for a receiver-initiated funds transfer. A prospective receiver of a funds transfer may identify a funds transfer amount and provide a sender identifier, to thereby initiate and request the funds transfer. Authorization for the funds transfer may be received from a sender corresponding to the sender identifier. Funds associated with the funds transfer and sourced from the sender may be received. The funds transfer may be made in response the receiver-initiated request. | 09-15-2011 |
20120330762 | EQUIPMENT TO FACILITATE MONEY TRANSFERS INTO BANK ACCOUNTS - Arrangements for transferring money to a bank account, typically when paid in cash or a cash equivalent at a point of sale device, are provided. Transactional information may be transmitted to a host computer system from a point of sale device. The transactional information may include information on a bank account that is to receive the money. At least some of the transaction information may be sent to an intermediary computer system that is configured to interact with a plurality of banking networks and may determine Which one of the banking networks is associated with the bank account that is to receive the money. A request may be transmitted from the intermediary computer network to a local banking network and may include information on the bank account that is to receive the money and an amount of money to deposit. | 12-27-2012 |
20130138567 | SYSTEMS AND METHODS FOR VERIFYING IDENTITIES IN TRANSACTIONS - A computerized method of verifying the identity of an attendant operating a money transfer transaction device includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant. The additional information relates to a security feature that limits access to the transaction device. The method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction. | 05-30-2013 |
20140324693 | EQUIPMENT TO FACILITATE MONEY TRANSFERS INTO BANK ACCOUNTS - Systems and methods for transferring money to a bank account are provided. Transactional information, which includes information on a bank account that is to receive the money, may be transmitted to a host computer system from a point of sale device. The transaction information may be stored at the host computer system. At least some of the transaction information may be sent to an intermediary computer system that is configured to interact with a plurality of banking networks in different countries. The intermediary computer system may also determine which one of the banking networks is associated with the bank account that is to receive the money. A request may be transmitted from the intermediary computer network to a local banking network and includes information on the bank account that is to receive the money and an amount of money to deposit. The bank account may then be credited. | 10-30-2014 |
Patent application number | Description | Published |
20090265272 | MONEY TRANSFERS UTILIZING A UNIQUE RECEIVER IDENTIFIER - Methods, systems, and machine-readable media are disclosed for financial transfers utilizing a unique identifier to facilitate flexible payment options for the transaction. According to one embodiment, a pull transaction model can be implemented. According to such embodiments, a money transfer can be initiated in a conventional manner via an agent of a money transfer facilitator. The sender of the transfer can provide an identifier for the transaction to the recipient. The recipient can in turn use the identifier, in combination with functionality of a mobile wallet application of a mobile device to request or “pull” the money transfer to an account associated with the mobile wallet application. In this way, the recipient can receive the transfer to the mobile wallet account even if the sender does not know that such a delivery is available. | 10-22-2009 |
20090283585 | MONEY TRANSFER SYSTEMS AND METHODS FOR TRAVELERS - One method involves payment of money to a recipient traveling to one or more foreign countries by entering into a remote computer money transfer information from a sender. The money transfer information comprises recipient identification information, at least one country where the money is to be received, and a payment amount in an originating currency. The money transfer information is transmitted to a host computer system. When ready to receive payment in the designated country, recipient identification information along with a request to withdraw a portion of a possible payment amount is entered into a payout computer. The recipient identification information and the request to withdraw is transmitted to a host computer system, and the requested withdrawal is provided to the recipient in the local currency. | 11-19-2009 |
20120185383 | UNIVERSAL LEDGER - The present invention provides systems and methods for tracking obligations incurred between individuals. The method may include receiving a request from a first party, where the request includes an expense incurred by the first party for the benefit of a second party. The method may also include providing a notice of the request to the second party and receiving an acceptance from the second party to assume an obligation associated with the expense. The method may further include associating the obligation with the second party and associating a benefit with the first party. The obligation and/or benefit may be substantially equal in value to the expense. The method may additionally include interfacing with a social network service to provide the social network service with information about the obligation and/or the benefit. | 07-19-2012 |
Patent application number | Description | Published |
20140361671 | COMPUTER INTERNAL ARCHITECTURE - An internal component and external interface arrangement for a cylindrical compact computing system is described that includes at least a structural heat sink having triangular shape disposed within a cylindrical volume defined by a cylindrical housing. A computing engine having a generally triangular shape is described having internal components that include a graphics processing unit (GPU) board, a central processing unit (CPU) board, an input/output (I/O) interface board, an interconnect board, and a power supply unit (PSU). | 12-11-2014 |
20140361893 | COMPUTER INPUT/OUTPUT INTERFACE - An internal component and external interface arrangement for a cylindrical compact computing system is described that includes at least a structural heat sink having triangular shape disposed within a cylindrical volume defined by a cylindrical housing. A computing engine having a generally triangular shape is described having internal components that include a graphics processing unit (GPU) board, a central processing unit (CPU) board, an input/output (I/O) interface board, an interconnect board, and a power supply unit (PSU). | 12-11-2014 |
20140362576 | COMPUTER ARCHITECTURE - An internal component and external interface arrangement for a cylindrical compact computing system is described that includes at least a structural heat sink having triangular shape disposed within a cylindrical volume defined by a cylindrical housing. A computing engine having a generally triangular shape is described having internal components that include a graphics processing unit (GPU) board, a central processing unit (CPU) board, an input/output (I/O) interface board, an interconnect board, and a power supply unit (PSU). | 12-11-2014 |
20150106638 | REDUCED ENERGY CONSUMPTION IN A COMPUTER SYSTEM THROUGH SOFTWARE AND HARDWARE COORDINATED CONTROL OF MULTIPLE POWER SUPPLIES - The embodiments discussed herein relate to systems, methods, and apparatus for controlling power consumption of a computing device in a standby or sleep mode. During the standby or sleep mode an external device can be plugged into the computing device. The external device can be provided power from a standby power supply until a determination is made as to whether a main power supply is operating. The determination can be based on comparing the output of the main power supply to an output of the standby power supply. If the main power supply is operating, a switch in the computing device can close to allow the main power supply to provide power to the external device. Moreover, in some embodiments, the switch can close based exclusively on a current demand of the external device from the standby power supply. | 04-16-2015 |