G06Q10/06314

Dynamic computing progress tracker

A system may measure one or more metrics relating to the performance of a job for a set of occurrences of the job with respect to a data set. The measurements may be used to predict a completion time for a subsequent job or phase of the job on the data set. This prediction may be used to present a more accurate indication of a job completion status on the data set. The process may be repeated or performed separately for each client or set of data to provide an individualized progress meter or indicator. Thus, in some cases, variances in the data or computing systems may be reflected in the displayed progress of the job providing for a more accurate indication of job progress.

THIRD-PARTY RESOURCE MANAGEMENT FROM CALENDAR APPLICATION

A calendar application server, a computer-readable storage medium, and corresponding methods for third-party resource management within the context of a calendar application are described herein. The computer-readable storage medium includes computer-executable instructions that, when executed one or more processors, cause the processor(s) to associate a third-party resource with an event within a calendar application in response to a user command received via an event UI functionality provided by the calendar application, to connect with the third-party resource via an API corresponding to the third-party resource in response to another user command received via the event UI functionality (where the API is provided within the context of the calendar application), to generate third-party resource data for the event in response to user interaction with the third-party resource via the API, and to reconcile the third-party resource data with event data within the calendar application.

AUTOMATED VALET PARKING MANAGEMENT SYSTEM AND AUTOMATED VALET PARKING MANAGEMENT METHOD

An automated valet parking (AVP) management system manages an AVP service delivered in a predetermined area. A pick-up or drop-off point is away from a parking facility in which a vehicle is parked. When it is not possible to deliver the AVP service to a user in accordance with a user request, notification information is delivered to the user. The notification information includes at least one of: a congestion situation on a route from a current position of the vehicle to a specified pick-up or drop-off point; a congestion situation at the specified pick-up or drop-off point; a waiting time for the user to get on or off the vehicle at the specified pick-up or drop-off point; a recommended time of day of use at the specified pick-up or drop-off point; and a substitute pick-up or drop-off point being a substitute for the specified pick-up or drop-off point.

System, method, and computer program for network experience optimization using a home network router

As described herein, a system, method, and computer program are provided for network experience optimization using a residential network router. In use, an electronic calendar is accessed by a residential network router. Additionally, the residential network router determines a plurality of events saved to the electronic calendar, wherein the plurality of events require, at least in part, simultaneous network resource (e.g. bandwidth) usage. Further, the plurality of events are prioritized, using the residential network router. Still yet, available network resources are assigned among the plurality of events, using the residential network router, based on the prioritization.

Provisioning of a shippable storage device and ingesting data from the shippable storage device
11514175 · 2022-11-29 · ·

When a client requests a data import job, a remote storage service provider provisions a shippable storage device that will be used to transfer client data from the client to the service provider for import. The service provider generates security information for the data import job, provisions the shippable storage device with the security information, and sends the shippable storage device to the client. The service provider also sends client-keys to the client, separate from the shippable storage device (e.g., via a network). The client receives the device, encrypts the client data and keys, transfers the encrypted data and keys onto the device, and ships it back to the service provider. The remote storage service provider authenticates the storage device, decrypts client-generated keys using the client-keys stored at the storage service provider, decrypts the data using the decrypted client-side generated keys, and imports the decrypted data.

Method, system, and non-transitory computer readable medium for an artificial intelligence based room assignment optimization system

Embodiments provide optimized room assignments for a hotel in response to receiving a plurality of hard constraints and soft constraints and receiving reservation preferences and room features. The optimization includes determining a guest satisfaction assignment cost based on the reservation preferences and room features, determining an operational efficiency assignment cost, generating a weighted cost matrix based on the guest satisfaction assignment cost and the operational efficiency assignment cost, and generating preliminary room assignments based on the weighted cost matrix. When the preliminary room assignments are feasible, the preliminary room assignments are the optimized room assignments comprising a feasible selection of elements of the matrix. When the preliminary room assignments are infeasible, embodiments relax one or more constraints and repeat the performing optimization until the preliminary room assignments are feasible.

RESOURCE AVAILABILITY PREDICTION

In some examples, resource availability prediction can include a non-transitory machine-readable medium having instructions thereon executable to receive at the first processing resource, the memory resource, or both, a plurality of input data from a plurality of sources comprising a first plurality of sensors to monitor a plurality of workstations and write from the first processing resource to the memory resource the received input data. The instructions can be executable to identify at the first processing resource or a second processing resource, output data representative of a resource availability prediction based on input data representative of the written data, receive from a mobile device accessible by a user, a request for the resource availability prediction, and transmit the output data to the mobile device via signaling sent via a radio in communication with a third processing resource of the mobile device.

System and methods for identifying stock anomalies in a fleet management system
11595779 · 2023-02-28 · ·

Methods and systems for identifying stock anomalies in a fleet management system. A computing device may be configured to receive a geofence location for a first vehicle from the fleet management system, and receive a second location from an on-board telematics unit of the first vehicle. The computing device may determine whether the received second location is within the received geofence location. The computing device may determining that the first vehicle is in a state of anomaly in response to determining that the received second location is not within the received geofence location.

Technologies for switching network traffic in a data center

Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuitry is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.

Method for exploiting charging stations
11507893 · 2022-11-22 · ·

Method for exploiting a network of electrical charging stations for motor vehicles. The method includes (a) a step in which a station is reserved via a reservation center and the center transmits to the vehicle a response comprising access data providing access to the station, and (b) a step in which, when the vehicle is less than 100 meters from the station, the vehicle requests access to the station and the station provides access to the electrical power available via a socket of the station. In step (b), the communication between the vehicle and the station is a local electromagnetic communication, preferably at a frequency comprised between 2400 and 2500 MHz.