会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • Migrating data between networked computing environments
    • 在联网计算环境之间迁移数据
    • US08909734B2
    • 2014-12-09
    • US13367412
    • 2012-02-07
    • Gregory J. BossChristopher J. DawsonRick A. Hamilton, IIBrian M. O'Connell
    • Gregory J. BossChristopher J. DawsonRick A. Hamilton, IIBrian M. O'Connell
    • G06F15/16
    • G06F3/0604G06F3/061G06F3/0649G06F3/067
    • Embodiments of the present invention provide an approach for predictively migrating data between network computing environments (e.g., cloud computing environments). Specifically, in a typical embodiment, data access patterns for sets of data utilized by a set of services running in a first networked computing environment may be analyzed. Based on the analysis one or more of the sets of data may be identified as candidates to be migrated from the first networked computing environment to a second networked computing environment. Then, a data migration protocol for the one or more sets of data to be migrated to the second networked computing environment may be generated based on the data access patterns and a predicted data migration time. Based on the data migration protocol, the one or more sets of data may then be migrated to the second networked computing environment.
    • 本发明的实施例提供了一种用于在网络计算环境(例如,云计算环境)之间预测性迁移数据的方法。 具体地,在典型的实施例中,可以分析由在第一联网计算环境中运行的一组服务使用的数据集的数据访问模式。 基于分析,一组或多组数据可以被识别为要从第一联网计算环境迁移到第二联网计算环境的候选。 然后,可以基于数据访问模式和预测的数据迁移时间来生成要迁移到第二联网计算环境的一组或多组数据的数据迁移协议。 基于数据迁移协议,可以将一组或多组数据迁移到第二联网计算环境。
    • 56. 发明授权
    • Security enhancements for immersive environments
    • 沉浸式环境的安全性增强
    • US08645847B2
    • 2014-02-04
    • US13172947
    • 2011-06-30
    • Gregory J. BossRick A. Hamilton, IINeil A. KatzBrian M. O'Connell
    • Gregory J. BossRick A. Hamilton, IINeil A. KatzBrian M. O'Connell
    • G06F3/048G06F3/00
    • G06F3/011
    • In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment.
    • 在一些示例性实施例中,一种方法包括为在线沉浸式环境中的第一化身定义跟踪区域,其中所述跟踪区域包含所述第一头像和超出所述第一化身的某些限定区域。 第一个头像代表第一个人,他是现实世界中第二个人的守护者,在网络沉浸环境之外。 第二个头像代表在线沉浸式环境中的第二个人物。 该方法包括跟踪通过第一化身的跟踪区域的在线沉浸环境的路径。 该方法包括在第一化身的跟踪区域的路径经过该区域之后,将在线沉浸环境中的区域标记为第二化身的安全区域。 该方法包括授权访问被标记为在线沉浸式环境中的第二化身的安全区域的区域。
    • 57. 发明授权
    • Methods, systems, and media to improve employee productivity using radio frequency identification
    • 方法,系统和媒体,通过射频识别提高员工的工作效率
    • US08639543B2
    • 2014-01-28
    • US11264599
    • 2005-11-01
    • Gregory J. BossRick A. Hamilton, IIRichard H. Le SesneTimothy M. Waters
    • Gregory J. BossRick A. Hamilton, IIRichard H. Le SesneTimothy M. Waters
    • G06Q10/00
    • G06Q10/06G06Q10/06311G06Q10/06398
    • Methods, systems, and media to improve employee productivity using radio frequency identification (RFID) are disclosed. Embodiments comprise a method of transmitting information from RFID tags, receiving the information in an RFID tag reader, analyzing the information to select a number of employees to work in a work area, and dispatching one or more employees to or from the work area according to the selected number of employees. Some embodiments select employees with certain skills, based on the RFID tag information. In other embodiments, an RFID tag reader monitors the movement of employees to ensure that they are moving according to the dispatch and potentially dispatching alternate employees. Some embodiments involve reading information from RFID tags attached to goods, whereas other embodiments involve reading information from RFID tags in cards carried by employees and customers, and RFID tags fastened to shopping carts and shopping baskets.
    • 公开了使用射频识别(RFID)来提高员工生产力的方法,系统和媒体。 实施例包括从RFID标签发送信息的方法,在RFID标签读取器中接收信息,分析信息以选择在工作区域中工作的员工数量,以及根据工作区域从工作区域发送一个或多个员工 所选员工人数。 一些实施例基于RFID标签信息选择具有某些技能的员工。 在其他实施例中,RFID标签读取器监视员工的运动,以确保他们根据派遣和可能派遣替代雇员移动。 一些实施例涉及从连接到商品的RFID标签读取信息,而其他实施例涉及从雇员和顾客携带的卡中的RFID标签读取信息,以及紧固到购物车和购物篮的RFID标签。
    • 58. 发明授权
    • Telephony services optimization through calling plan analysis
    • 电话服务优化通过电话计划分析
    • US08625764B2
    • 2014-01-07
    • US13035794
    • 2011-02-25
    • Kulvir S. BhogalGregory J. BossRick A. Hamilton, IIBrian M. O'ConnellAlexandre Polozoff
    • Kulvir S. BhogalGregory J. BossRick A. Hamilton, IIBrian M. O'ConnellAlexandre Polozoff
    • H04M3/42H04M15/00H04M11/00H04W4/00H04W40/00G01R31/08
    • H04M15/805H04M15/8044H04M2215/42
    • Embodiments of the present invention provide optimization of telephone services through telephone calling plan/card analysis. The least expensive rate is found for telephone calls at any given time and/or date, either through static pre-entry of data, or through dynamic querying of rates via a web-based look-up table, and places calls according to an optimized calling plan. Specifically, in a typical embodiment, an outgoing/target telephone number for an intended telephone call is captured, and a corresponding destination geographic region is identified. Based on the geographic region, a calling plan resulting in a lowest price for the telephone call is identified. This is typically accomplished by consulting at least one table (e.g., call information table) that associates (among other things) calling plans and/or calling cards with geographic regions. Once a calling plan and/or calling card is identified/selected, a corresponding set of dialing instructions will be obtained from the table and used to make/place the telephone call.
    • 本发明的实施例通过电话呼叫计划/卡分析提供电话服务的优化。 在任何给定的时间和/或日期,通过静态预先输入数据,或通过基于网络的查找表动态查询费率,找到最便宜的费率,并根据优化的地点进行呼叫 通话计划 具体地,在典型的实施例中,捕获用于预期电话呼叫的输出/目标电话号码,并且识别对应的目的地地理区域。 基于地理区域,确定了导致电话最低价格的呼叫计划。 这通常通过咨询与呼叫计划和/或呼叫卡与地理区域(其中包括)相关联的至少一个表(例如,呼叫信息表)来实现。 一旦识别/选择呼叫计划和/或呼叫卡,将从表中获得相应的一组拨号指令,并用于进行/拨打电话。
    • 60. 发明授权
    • Prioritizing data packets associated with applications running in a networked computing environment
    • 确定与联网计算环境中运行的应用程序相关联的数据包的优先级
    • US08539074B2
    • 2013-09-17
    • US13185587
    • 2011-07-19
    • Katalin K. Bartfai-WalcottGregory J. BossChristopher J. DawsonRick A. Hamilton, II
    • Katalin K. Bartfai-WalcottGregory J. BossChristopher J. DawsonRick A. Hamilton, II
    • G06F13/00
    • H04L41/5012H04L47/2425H04L47/2475
    • Embodiments of the present invention provide an approach for prioritizing a set of data packets associated with an application running in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, an SLA associated with a particular application and at least one other SLA associated with at least one other application are accessed (e.g., in a database or the like). A proposed modification to a priority of a set of data packets associated with the particular application (e.g., corresponding to a workload being processed via the particular application) is then determined based on a comparison of a current performance (e.g., transmission rate) of the set of data packets versus a specified performance of the set of data packets as set forth in the SLA. Then, an effect of the proposed modification on a capability of the particular application to meet a set of terms of the SLA, and of the at least one other application to meet a set of terms of the at least one other SLA will be evaluated. Based on this evaluation, it will be determined whether to implement the proposed modification. For example, the proposed modification can be implemented if it will not cause any of the SLAs to be unmet.
    • 本发明的实施例提供了一种用于对与在网络计算环境(例如,云计算环境)中运行的应用相关联的一组数据分组进行优先级排序的方法。 在典型的实施例中,与特定应用相关联的SLA和与至少一个其他应用相关联的至少一个其他SLA被访问(例如,在数据库等中)。 然后基于对特定应用的当前性能(例如,传输速率)的比较来确定与特定应用相关联的一组数据分组的优先级的修改(例如,对应于正在通过特定应用处理的工作负载) 一组数据包相对于SLA中规定的数据包集合的指定性能。 然后,将评估所提出的修改对特定应用的能力满足SLA的一组术语的影响以及满足至少一个其他SLA的一组术语的至少一个其他应用的效果。 根据这一评估,将确定是否实施拟议的修改。 例如,如果不会导致任何SLA未被满足,则可以实现所提出的修改。