Patent classifications
G06F9/4451
Systems and methods for intelligent application instantiation
The systems and methods discussed herein provide for intelligent identification of applications or tasks to be utilized or performed by a user based on a variety of variables that provide relevant context. In some implementations, applications may be pre-launched or instantiated prior to a user requesting to execute the application, reducing user experience latency and avoiding incorrect application launch. User behavior patterns, location, time of day, user events, etc. may be utilized to identify and recommend or pre-launch relevant applications that should or can be used at any given instance. In some implementations, deep linking may be used to pre-launch or suggest specific tasks to be performed within an application.
Utilization of predictive gesture analysis for preloading and executing application components
The techniques disclosed herein utilize predictive gestures to preload and/or execute application components to provide improved responsiveness and loading times in software applications. In some configurations, a system can monitor user input gestures to determine if a user-controlled cursor moves into a detection area positioned in proximity to one or more selectable user interface (“UI”) elements. When a user input causes a cursor to move into the detection area, a computing device can preload or execute one or more application components in memory. The system can also dynamically adjust the position, size and/or shape of the detection area based on a number of factors, including the recognition of one or more predetermined input gestures. By dynamically adjusting a detection area, the system can optimize the predictive techniques for identifying the intent of a user for initiating preload or pre-execution operations for one or more application components.
Systems and methods for personalized care management
Disclosed are systems and methods for personalized care management. A plurality of user devices corresponding to a plurality of authorized caregivers are configured to provide input data to a processing module 1004. The input data is associated with an actionable item being performed for at least one care receiver, wherein the actionable item includes one of: a scheduled actionable item and a non-scheduled actionable item. The processing module 1004 receives, the at least one input data based on the scheduled actionable item and the non-scheduled actionable item. A profile of the at least one care receiver is updated based on the received at least one input data, and thereafter stored in a database 1010. The plurality of authorized caregivers is facilitated to access the stored updated profiles of the at least one care receiver for further analysis.
Personalization of map content via an application programming interface
A mapping API provides a digital map via a user interface of a computing device. When invoked by a software application, the mapping API is configured to receive an identifier of a user operating the software application, provide a first interactive digital map including a representation of a certain geographic area for display by the software application, where the first interactive digital map is personalizable via the software application, receive personalization content from the user via the software application, and cause a second digital map including a representation of the geographic area, when provided to the same user, to be modified in view of the personalization content, where the first digital map and the second digital map are created independently.
Dataflow graph configuration
A method for configuring a first computer executable program includes through a user interface, receiving information indicative of a source of data and a data target; and receiving a characterization of a process, including a type of the process and values for characteristics associated with the process. The method includes based on the received information, automatically assigning values to respective parameters of the first computer executable program to cause the first computer executable program to, when executed, receive data from the source of data and output data to the data target. The method includes automatically configuring the first computer executable program to reference a second computer executable program, including identifying the second computer executable program based on the type of the process; and assigning values to respective parameters of the second computer executable program based on the values for the respective characteristics.
Policy based persistence
A computing device includes a memory and at least one processor configured to cooperate with the memory. The processor is to boot the computing device, and direct generated data to data storage. The data storage includes at least one persistent layer and a non-persistent layer. The processor determines if the data is to be stored in the at least one persistent layer or the non-persistent layer based on a version of the operating system being used to boot the computing device.
Integrated agricultural production system and method
A host system maintains a plurality of user accounts each including offboard electronic device information and agricultural machine information specific to a user. The host system receives requests for user access, determines whether the source of the request is an offboard electronic device or an onboard computing system of an agricultural machine, determines whether the user has access rights to the device or system, and identifies any apps authorized for use by the user and the device or system. The host system synchronizes application data and settings between the device or system and the user's account so that when the user runs related apps from any device or machine the app data and the settings will be reflected. When a user purchases an application for a device or machine the same or related applications automatically become available on other devices or systems that are managed by the host system.
Memory system for handling a bad block and operation method thereof
A memory system includes a memory device including plural non-volatile memory blocks and a controller configured to determine whether a first memory block among the plural non-volatile memory blocks is re-usable after the first memory block is determined to be a bad block and copy second block information associated with a second memory block including a second program sequence number within a set range of a first program sequence number in the first memory block to first block information of the first memory block.
CONFIGURATION CHANGE CONTROL FOR COMPUTING ENVIRONMENTS
Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.
METHOD AND DEVICE FOR EFFICIENTLY PROVIDING PROFILE FOR COMMUNICATION SERVICE
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method by which a terminal receives a profile for a communication service in a wireless communication system according to an embodiment of the present invention comprises the steps of: receiving, from a query server by the terminal, first download information for receiving a second bootstrap profile by using a first bootstrap profile, which is one of a plurality of bootstrap profiles installed in the terminal; downloading the second bootstrap profile from a first profile server by using the first download information and installing the second bootstrap profile in the terminal; and installing a user profile in the terminal on the basis of the second bootstrap profile and user selection, and accessing a mobile network by using the user profile.