Abstract:
Structures and protocols are presented for facilitating a search partly based on a movement status of a search-capable device or on a position of a person's limb or on an association with another search-capable device.
Abstract:
A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
Abstract:
Systems, devices, methods, and compositions are described for providing an actively controllable shunt configured to, for example, monitor, treat, or prevent an infection.
Abstract:
An embodiment of an information handling apparatus can comprise an entitlement vector operable to specify resources used by at least one object of a plurality of a plurality of objects, and logic operable to issue a hint instruction based on the entitlement vector for usage in scheduling the resources.
Abstract:
Exemplary methods, systems and components enable selective control of an operational mode for a vehicle that is subject to an administrative standard. In some instances a qualified person or entity may attain a possible consequential result related to a user-selected vehicle operation mode that may involve a vehicle operation paradigm and/or a vehicle travel route and/or a vehicle travel destination. In some embodiments, implementation of the selected vehicle operation mode may modify a conformity status of the vehicle relative to the administrative standard. Various accessible records may be maintained regarding administrative compliance states and their respective benefits, as well as regarding certification of preferable consequential results available to qualified recipients based on a correlated vehicle operational mode.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction.