REGISTERING THE HARVEST OF A RESOURCE USING IMAGE DATA AND METADATA

    公开(公告)号:US20190095688A1

    公开(公告)日:2019-03-28

    申请号:US16204211

    申请日:2018-11-29

    Abstract: A method, system and computer program product are disclosed for tagging a resource. In one embodiment, the method comprises receiving a given number of unique electronic tags for tagging a specified resource; for a harvested one of the specified resources, generating image data representing an image of the harvested resource, and selecting one of the electronic tags for the harvested resource; and sending the image data and data identifying the selected electronic tag to a specified entity to register the harvested resource. In an embodiment, the given number of unique physical tags are generated for the specified resource, and the generated image data include data representing one of the physical tags. In an embodiment, a mobile computing device is used to receive the electronic tags, to generate the image data, and to transmit the image data to the specified entity.

    RESOURCE SUBSTITUTION AND REALLOCATION IN A VIRTUAL COMPUTING ENVIRONMENT

    公开(公告)号:US20190087235A1

    公开(公告)日:2019-03-21

    申请号:US16194623

    申请日:2018-11-19

    Abstract: A host system reallocates resources in a virtual computing environment by first receiving a request to reallocate a first quantity of a first resource type. Next, potential trade-off groups are evaluated and a trade-off group is selected based on the evaluation. The selected trade-off group includes a set of applications running in the virtual computing environment that can use one or more alternate resource types as a substitute for the first quantity of the first resource type. After the selection, the host system reallocates the first quantity of the first resource type from the trade-off group. This reallocation may be made from the trade-off group to either a first application running in the virtual computing environment or the host system itself. If the reallocation is to the host system, then the total quantity of the first resource type allocated to applications running in the virtual computing environment is thereby reduced.

    Management of virtual machine migration in an operating environment

    公开(公告)号:US10228984B2

    公开(公告)日:2019-03-12

    申请号:US15136456

    申请日:2016-04-22

    Abstract: Embodiments directed toward a method, and a system. A method can be directed toward deciding whether to accept a virtual machine migration on a host. The method can include receiving a request to host a migrated virtual machine. The method can include determining if the host is overcommitted. The method can include selecting a low priority virtual machine in response to the host being overcommitted. The method can include determining if a resource for the low priority virtual machine can be reduced to accommodate the migrated virtual machine. The method can include reducing the resources for the low priority virtual machine in response to the resources being able to be reduced. The method can include accepting the request to host the migrated virtual machine in response to the reduction of the resources.

    INFORMATION INSIGHT SYSTEM FOR PROVIDERS OF PRODUCTS OR SERVICES

    公开(公告)号:US20190034991A1

    公开(公告)日:2019-01-31

    申请号:US15844988

    申请日:2017-12-18

    Abstract: A first user entering a physical location can be identified. In response, a first user profile information for the user can be accessed. The first user profile information can be compared to user profile information of a plurality of other users who are present at the physical location. Based on the comparing, at least a second user whose user profile information most closely matches the first user profile information can be identified. A notification can be communicated to a client device used by the second user, the notification notifying the second user to initiate interaction with the first user. The client device can be configured to present the notification to the second user.

    SELECTIVE DIRECTIONAL MITIGATION OF WIRELESS SIGNAL INTERFERENCE

    公开(公告)号:US20190028218A1

    公开(公告)日:2019-01-24

    申请号:US16127161

    申请日:2018-09-10

    CPC classification number: H04J11/003

    Abstract: A boundary of a wireless network is monitored for incoming wireless signals that may interfere with an ability of a first wireless computing device to connect to the wireless network within the boundary of the wireless network. For an incoming wireless signal determined to interfere with the ability of the first wireless computing device to connect to the wireless network within the boundary of the wireless network, a directional opposing outgoing wireless signal is emitted to counteract the incoming wireless signal and to stop the incoming wireless signal from further interfering with the ability of the first wireless computing device to connect to the wireless network within the boundary of the wireless network.

    Personalized emergency evacuation plan

    公开(公告)号:US10181242B1

    公开(公告)日:2019-01-15

    申请号:US15646425

    申请日:2017-07-11

    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for generating and transmitting a Personalized Emergency Evacuation Plan (PEEP). The computer receives an emergency condition real-time data from a plurality of building sensors, a tracking data of at least one user from a plurality of tracking sensors, a facility structural data from a facility database, and a stored user data from a user database for the at least one user. The computer generates a personalized emergency evacuation plan (PEEP) for the at least one user, wherein is a set of recommendations to put the user in the safest position, based on at least the emergency condition real-time data and the received stored user data. The computer transmits the PEEP to a user mobile device, wherein the user mobile device presents the PEEP to the at least one user.

    MENTAL ACUITY-DEPENDENT ACCESSIBILITY
    49.
    发明申请

    公开(公告)号:US20180349626A1

    公开(公告)日:2018-12-06

    申请号:US15609509

    申请日:2017-05-31

    Abstract: In an approach to adjusting user permissions based on mental acuity, one or more computer processors determine whether an individual is within a threshold proximity to a monitored location. In response to determining that an individual is within a threshold proximity to the monitored location, the one or more computer processors identify a required mental acuity for the monitored location. The one or more computer processors determine a current mental acuity for the individual. The one or more computer processors compare the determined mental acuity for the individual with the required mental acuity for the monitored location.

    CONTEXT BASED IDENTIFICATION OF NON-RELEVANT VERBAL COMMUNICATIONS

    公开(公告)号:US20180336001A1

    公开(公告)日:2018-11-22

    申请号:US15601092

    申请日:2017-05-22

    Abstract: A computer-implemented method includes identifying a first set of utterances from a plurality of utterances. The plurality of utterances is associated with a conversation and transmitted via a plurality of audio signals. The computer-implemented method further includes mining the first set of utterances for a first context. The computer-implemented method further includes determining that the first context associated with the first set of utterances is not relevant to a second context associated with the conversation. The computer-implemented method further includes dynamically muting, for at least a first period of time, a first audio signal in the plurality of audio signals corresponding to the first set of utterances. A corresponding computer system and computer program product are also disclosed.

Patent Agency Ranking