Patent classifications
G06F16/951
Systems and methods for client-side data analysis
Systems and methods are provided for analyzing data in one or more datasets, where the one or more datasets are embodied as local, embedded databases in a client-side application, such as a web browser or web browser tab. A client-side data analysis application or artifact may be used to interact, i.e., query, the local, embedded databases, and retrieve results to analyze data. Because the one or more datasets are localized, there is no need to access a remote database/datastore in order to analyze the data. Moreover, the client-side data analysis application or artifact can be executed as individual instances in the client-side application. The state of a local, embedded database may be stored as another file that can be used as a local, embedded database for another instance of the client-side data analysis application or artifact.
Transcoding and serving resources
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transcoding and providing resources. A query is received. A resource is generated, and the resource, when processed by a client device, causes the client device to perform various operations. The operations include displaying a search result having an associated landing page and detecting user interaction with the search result. The operations include, in response to detecting user interaction with the search result, displaying a first portion of the landing page that is embedded within the resource and requesting, over a network, a second portion of the landing page. The operations include receiving the second portion of the landing page, and loading the second portion of the landing page. The generated resource is provided in response to the query.
Transcoding and serving resources
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transcoding and providing resources. A query is received. A resource is generated, and the resource, when processed by a client device, causes the client device to perform various operations. The operations include displaying a search result having an associated landing page and detecting user interaction with the search result. The operations include, in response to detecting user interaction with the search result, displaying a first portion of the landing page that is embedded within the resource and requesting, over a network, a second portion of the landing page. The operations include receiving the second portion of the landing page, and loading the second portion of the landing page. The generated resource is provided in response to the query.
Methods and systems for generating and manipulating electronic vehicle checklists using web-based editing tool
Disclosed are methods, systems, and non-transitory computer-readable medium for a web-based process to generate electronic checklists and deploy electronic checklists. One method may include: receiving bulk data from a user device; parsing the bulk data to form a loadable database for an electronic procedure system of a vehicle; generating a rendering of an electronic checklist of one or more electronic checklists based on the loadable database; transmitting a first message to the user device, the first message including the rendering of the electronic checklist; iteratively performing an authoring process using a web-based tool to update the loadable database; receiving a second message from the user device, the second message including an instruction to transmit the updated loadable database to the electronic procedure system of the vehicle; and transmitting a third message to the vehicle, the third message including the updated loadable database.
Methods and systems for generating and manipulating electronic vehicle checklists using web-based editing tool
Disclosed are methods, systems, and non-transitory computer-readable medium for a web-based process to generate electronic checklists and deploy electronic checklists. One method may include: receiving bulk data from a user device; parsing the bulk data to form a loadable database for an electronic procedure system of a vehicle; generating a rendering of an electronic checklist of one or more electronic checklists based on the loadable database; transmitting a first message to the user device, the first message including the rendering of the electronic checklist; iteratively performing an authoring process using a web-based tool to update the loadable database; receiving a second message from the user device, the second message including an instruction to transmit the updated loadable database to the electronic procedure system of the vehicle; and transmitting a third message to the vehicle, the third message including the updated loadable database.
Regular expression generation using span highlighting alignment
Techniques for generated regular expressions are disclosed. In some embodiments, a regular expression generator may receive input data comprising one or more character sequences. The regular expression generator may convert character sequences into a sets of regular expression codes and/or span data structures. The regular expression generator may identify a longest common subsequence shared by the sets of regular expression codes and/or spans, and may generate a regular expression based upon the longest common subsequence. Alignment of span data structures may be performed when generating the regular expression.
Automation system and method
A computer-implemented method, computer program product and computing system for receiving a complex task; processing the complex task to define a plurality of discrete tasks each having a discrete goal; executing the plurality of discrete tasks on a plurality of machine-accessible public computing platforms; determining if any of the plurality of discrete tasks failed to achieve its discrete goal; and if a specific discrete task failed to achieve its discrete goal, defining a substitute discrete task having a substitute discrete goal.
Automation system and method
A computer-implemented method, computer program product and computing system for receiving a complex task; processing the complex task to define a plurality of discrete tasks each having a discrete goal; executing the plurality of discrete tasks on a plurality of machine-accessible public computing platforms; determining if any of the plurality of discrete tasks failed to achieve its discrete goal; and if a specific discrete task failed to achieve its discrete goal, defining a substitute discrete task having a substitute discrete goal.
Systems and methods to secure searchable data having personally identifiable information
A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.
Systems and methods to secure searchable data having personally identifiable information
A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.