Inversion-of-control component service models for virtual environments

    公开(公告)号:US10579442B2

    公开(公告)日:2020-03-03

    申请号:US15433034

    申请日:2017-02-15

    IPC分类号: G06F9/54 G06F9/455

    摘要: In the field of computing, many scenarios involve the execution of an application within a virtual environment of a device (e.g., web applications executing within a web browser). Interactions between applications and device components are often enabled through hardware abstractions or component application programming interfaces (API), but such interactions may provide more limited and/or inconsistent access to component capabilities for virtually executing applications than for native applications. Instead, the device may provide hardware interaction as a service to the virtual environment utilizing a callback model, wherein applications within the virtual environment initiate component request specifying a callback, and the device initiates the component requests with the components and invokes associated callbacks upon completion of a component request. This model may enable the applications to interact with the full capability set of the components, and may reduce blocked execution of the application within the virtual application in furtherance of application performance.

    Undesirable encounter avoidance
    32.
    发明授权

    公开(公告)号:US10349217B2

    公开(公告)日:2019-07-09

    申请号:US16142963

    申请日:2018-09-26

    摘要: A method disclosed herein for allows users to avoid such undesirable encounters by determining whether an undesirable contact of the user has opted for sharing location information, in response to determining that the undesirable contact has opted for sharing location information, collecting location signal from the undesirable contact, forecasting anticipated locations of the undesirable contact over a period based on the location signal of the undesirable contact, forecasting anticipated locations of the user over the period, determining potential of encounter between the user and the undesirable contact based on analysis of anticipated locations of the user and the anticipated locations of the undesirable contact over the period, generating an undesirable contact avoidance scheme based on the potential of encounter, and optionally notifying the user of the undesirable contact avoidance scheme.

    Forwarding Notification Information
    35.
    发明申请

    公开(公告)号:US20180091456A1

    公开(公告)日:2018-03-29

    申请号:US15275058

    申请日:2016-09-23

    IPC分类号: H04L12/58

    CPC分类号: H04L51/14 H04L51/24 H04L67/26

    摘要: A computer-implemented technique is described herein by which a first user can forward notification information to one or more other users, including a second user. The first user can interact with the notification information via a first computing device, while the second user can interact with the notification information using a second computing device. In some implementations, both the first computing device and the second computing device have access to an application which has generated the notification information or to which the notification information otherwise pertains. In other implementations, the second computing device may lack access to the application. In some implementations, the first user receives the notification information and then explicitly and manually controls the forwarding of the notification information (or a version of the notification information) to the second user. In other implementations, decision logic automatically controls the forwarding of the notification information to the second user.

    COMMUNICATING METADATA THAT IDENTIFIES A CURRENT SPEAKER

    公开(公告)号:US20170278518A1

    公开(公告)日:2017-09-28

    申请号:US15617907

    申请日:2017-06-08

    摘要: A computer system may communicate metadata that identifies a current speaker. The computer system may receive audio data that represents speech of the current speaker, generate an audio fingerprint of the current speaker based on the audio data, and perform automated speaker recognition by comparing the audio fingerprint of the current speaker against stored audio fingerprints contained in a speaker fingerprint repository. The computer system may communicate data indicating that the current speaker is unrecognized to a client device of an observer and receive tagging information that identifies the current speaker from the client device of the observer. The computer system may store the audio fingerprint of the current speaker and metadata that identifies the current speaker in the speaker fingerprint repository and communicate the metadata that identifies the current speaker to at least one of the client device of the observer or a client device of a different observer.

    PERSISTENT AND RESILIENT WORKER PROCESSES
    38.
    发明申请
    PERSISTENT AND RESILIENT WORKER PROCESSES 有权
    持久和有力的工作流程

    公开(公告)号:US20150331726A1

    公开(公告)日:2015-11-19

    申请号:US14811761

    申请日:2015-07-28

    IPC分类号: G06F9/54 G06F9/455

    摘要: In the field of computing, many scenarios involve the execution of an application within a virtual environment (e.g., web applications executing within a web browser). In order to perform background processing, such applications may invoke worker processes within the virtual environment; however, this configuration couples the life cycle of worker processes to the life cycle of the application and/or virtual environment. Presented herein are techniques for executing worker processes outside of the virtual environment and independently of the life cycle of the application, such that background computation may persist after the application and/or virtual environment are terminated and even after a computing environment restart, and for notifying the application upon the worker process achieving an execution event (e.g., detecting device events even while the application is not executing). Such techniques may heighten the resiliency and persistence of worker processes and expand the capabilities of applications executing within virtual environments.

    摘要翻译: 在计算领域中,许多场景包括在虚拟环境(例如,在web浏览器内执行的web应用程序)中执行应用程序。 为了执行后台处理,这样的应用可以在虚拟环境中调用工作进程; 然而,该配置将工作进程的生命周期与应用程序和/或虚拟环境的生命周期相结合。 这里提出的是用于在虚拟环境之外执行工作进程并且独立于应用程序的生命周期的技术,使得在应用和/或虚拟环境终止之后甚至在计算环境重新启动之后背景计算可能持续,并且用于通知 工作进程上的应用程序实现执行事件(例如即使在应用程序未执行时也检测设备事件)。 这种技术可以提高工作进程的弹性和持久性,并扩展在虚拟环境中执行的应用程序的能力。

    Traffic data reconciliation and brokering

    公开(公告)号:US11783698B2

    公开(公告)日:2023-10-10

    申请号:US17027245

    申请日:2020-09-21

    摘要: Traffic data reconciliation and brokering are provided. A traffic data brokering system ingests traffic-related data provided from a plurality of data sources, analyzes the data, and reconciles the data for identifying accurate, up-to-date, and comprehensive traffic data. The system identifies current traffic conditions based on identified relationships between pieces of received data, calculates confidence scores, and determines which pieces of data are accurate based on the calculated confidence scores. The traffic data brokering system provides the reconciled traffic data to various users of traffic data, such as individuals or third-party services. One aspect includes a route generation engine that determines and provides recommended route(s) to clients. Another aspect includes a forecast engine that predicts traffic conditions based on past traffic data. The forecasted data can be used to determine recommended routes. The system provides APIs for enabling sources and clients to provide and receive traffic data.

    Forwarding notification information

    公开(公告)号:US11483271B2

    公开(公告)日:2022-10-25

    申请号:US16450820

    申请日:2019-06-24

    摘要: A computer-implemented technique is described herein by which a first user can forward notification information to one or more other users, including a second user. The first user can interact with the notification information via a first computing device, while the second user can interact with the notification information using a second computing device. In some implementations, both the first computing device and the second computing device have access to an application which has generated the notification information or to which the notification information otherwise pertains. In other implementations, the second computing device may lack access to the application. In some implementations, the first user receives the notification information and then explicitly and manually controls the forwarding of the notification information (or a version of the notification information) to the second user. In other implementations, decision logic automatically controls the forwarding of the notification information to the second user.