Abstract: To identify the sweet spot for criteria attributes (i.e., variables) within a complex system, a data source having objectively acceptable values or ranges of values for the criteria attributes for each variant of the system is generated. The identification system used to analyze the complex system to identify the sweet spot receives measurement values from a testing system that measures values of the criteria attributes from variants of the complex system and provides the measurement values to the identification system. The criteria attributes may be prioritized for determination of the sweet spot, including a selection of a value or range of values that are to be used for the most highly prioritized criteria attribute. The prioritized criteria attributes and objectively acceptable values can be used to filter the measurement values to identify the sweet spot for the variants of the complex system.
Type:
Grant
Filed:
February 4, 2020
Date of Patent:
December 27, 2022
Assignee:
Ford Global Technologies, LLC
Inventors:
Hossein Jacob Sadri, Steven Torey, Stephen Juszczyk, Lance David Marsac, Sueha Elmir Salame
Abstract: Described herein is a mechanism for preventing exercise devices from storing user exercise data and enabling the user to securely record that data. When a user selects an exercise device for performing an exercise, a user's device may establish a connection with the exercise device. When an exercise program is started on the exercise device, the user's device interfaces with the sensors directly while bypassing the computing device. When a direct sensor link with the sensors is created, the sensor link replaces a link between the sensors and the computing device on the exercise equipment. The user's device then receives exercise data through the sensor link directly from the sensors bypassing the computing device on the exercise equipment.
Abstract: A method includes selecting, by one or more servers, a digital component to be presented in an application executed at a client device; obtaining, by the one or more servers, attributes of the digital component, including at least one or more of a destination network location to which the digital component redirects users in response to interaction with the digital component and a reporting network location to which the interaction with the digital component is reported; after selecting the digital component and obtaining the attributes of the digital component, selecting, by the one or more servers and based on the obtained attributes, a config file that specifies a set of operations to be performed by the client device that presents the digital component; and transmitting, to the client device, a payload that includes information specifying the digital component to be presented in the application and the config file that, upon execution by the client device, causes the client device to perform the set of op
Type:
Grant
Filed:
August 27, 2021
Date of Patent:
December 27, 2022
Assignee:
Google LLC
Inventors:
Xiao Wu, Edward Wu, Moshe Albert Klebanov
Abstract: Beverage compositions and methods of preparing the same are provided herein. The beverage compositions can include calcium supplied from a calcium carbonate source including aragonite and a liquid component, such as water, a juice, a milk, and a combination thereof. Calcium components including aragonite particles and at least one additive agent as well as sweetener components including aragonite particles and at least one sweetener are also provided herein.
Abstract: A method for manufacturing a part includes fabricating an object in an additive fabrication stage, the object including a solid mold forming a cavity in the shape of a part with uncured or incompletely cured build material disposed therein. The build material in the cavity is cured in a curing stage that occurs at least partially after the additive fabrication stage. The build material undergoes a phase change mechanism occurring during the additive fabrication stage and a distinct polymerization mechanism occurring during the curing stage and at least partly after the additive fabrication stage of the object and cures the build material by a polymerization process.
Abstract: Media, method, and system for providing encryption key management for international data residency. Organizations using a group-based communication system can designate a particular geopolitical area where that organization's data can be stored and another geopolitical area (which may be the same or different) where encryption keys used to encrypt and decrypt that data should be stored. Users of that organization can post message or access messages previously posted on the group-based communication system from any geopolitical area, causing the system to automatically store and retrieve messages and encryption keys from the appropriate regions to allow the users to transparently access the group-based communication system while maintaining security and data residency requirements.
Type:
Grant
Filed:
July 1, 2020
Date of Patent:
December 27, 2022
Assignee:
Slack Technologies, LLC
Inventors:
Audrei Drummond, Ratnadeep Bhattacharjee, James Scheinblum, Eden Ghirmai, Stephen Hamrick, Richard Crowley, Lydia Gorham, Pooja Mehta, Raissa Largman, Karen Nguyen
Abstract: An intelligent target object detection and alerting platform may be provided. The platform may receive a content stream from a content source. A target object may be designated for detection within the content stream. A target object profile associated with the designated target object may be retrieved from a database of learned target object profiles. The learned target object profiles may be associated with target objects that have been trained for detection. At least one frame associated with the content stream may be analyzed to detect the designated target object. The analysis may comprise employing a neural net, for example, to detect each target object within each frame. A parameter for communicating target object detection data may be specified. In turn, when the parameter is met, the detection data may be communicated.
Abstract: In non-limiting examples of the present disclosure, systems, methods and devices for providing a unified cross-platform experience are provided. A connection between a first device and a second device may be established, wherein the first device operates on a first platform and the second device operates on a second platform. A plurality of executable actions that are specific to the second device may be identified by the first device. Execution of at least one of the plurality of executable actions by the second device may be requested by the an application executed on the first device. Information obtained via execution of the at least one executable action may be received by the first device and the first device may present and/or display that information.
Abstract: A tissue processing system for processing a laboratory slide includes a slide holder for holding the slide, an outlet port positioned to direct a fluid stream onto the slide, and a device for moving the slide holder relative to the outlet port, or vice versa, to adjust a point on the slide at which the fluid stream is delivered onto the laboratory slide. The slide holder includes an absorbent pad configured to be positioned between one wall of the plurality of walls and a free edge of the slide for absorbing fluid travelling along the slide. A manifold of the system includes a first outlet port that directs a first fluid stream from a first fluid passageway onto the slide, and a second outlet port that directs a second fluid stream from a second fluid passageway onto a location of the slide that differs from the first fluid stream.
Abstract: An electric aircraft charging connector, including a set of pins, a sensor, a controller, and a locking mechanism. The set of pins may include an AC pin, the AC pin configured to supply AC power to a charging port and/or a DC pin, the DC pin configured to supply DC power to the charging port. The sensor can detect power flow from the pins to the charging port. The controller is communicatively connected to the sensor and configured to receive a signal from the sensor and send a locking signal to a locking mechanism. The locking mechanism is communicatively connected to the controller, having an engaged state wherein the charging connector is mechanically coupled to the charging port and a disengaged state wherein the charging connector is mechanically uncoupled form the charging port, the locking mechanism configured to receive a locking signal from the controller and enter the engaged state.
Abstract: Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.
Abstract: A combination stand assembly is provided. The assembly includes a dual-use stand adapted to provide a floor stand and/or a bed top stand. The combination stand includes a floor base configured with a telescoping upright support structure and a top tray. The top tray may be used to support various items such as, but not limited to, a laptop computer. The top tray is removable from the upright support structure and includes extendable legs so that the tray, when separated from the upright support, may be used as a self-contained secondary stand (e.g., for use as a bed top stand). In this way, the combination stand may be configured for use as a floor stand and/or for use as a bed top stand. The angle of the tray is adjustable in either configuration for ergonomic positioning.
Abstract: The current document is directed to methods and systems that effectively and efficiently employ incomplete training data to train machine-learning-based systems. Incomplete training data, as one example, may include training data with erroneous or inaccurate input-vector/label pairs. In currently disclosed methods and systems, Incomplete training data is mapped to loss classes based on addition training-data information and specific, different additional-information-dependent loss-generation methods are employed for training data of different loss classes during machine-learning-based-system training so that incomplete training data can be effectively and efficiently used.
Abstract: An energy offloading system is in direct electric communication with an energy generating system and dynamically receives energy from the energy generating system. The energy offloading system uses energy for high-load computations. The energy offloading system includes computers performing the high-load computations as well as servers, cooling units, and communication devices. When the energy from the energy generating system is terminated, the energy offloading system may power down these and other devices, or may switch these devices to an alternative power source. The energy offloading system may be portable.
Type:
Grant
Filed:
November 29, 2021
Date of Patent:
December 27, 2022
Assignee:
Drone Energy IP Holdings, LLC
Inventors:
Ralph W. Lewis, Jacob Gadikian, Christopher Abramo
Abstract: Facilitating antivirus scan filing locking based on cluster lock mechanism in distributed file systems is provided herein. A system comprises a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations comprise determining an antivirus scan status of an object, based on an open object request received from a node device of a cluster of node devices, which is determined through the use of Lock Value Blocks. The antivirus scanning of the object is a precondition for opening the object. The antivirus scan status of the object is one of an unscanned status, a queued status, or a scanned status. Further, the operations can comprise, based on the antivirus scan status being the queued status or the scanned status, selectively facilitating the opening of the object at the node device while circumventing the precondition.