Dismiss
We will be performing system updates on Sunday, July 21st, from 9-noon ET. You may experience brief service interruptions during that time.

Month of January 2015 - Page Number 9

Showing 81 - 90 of 342 from January 2015
Browse Prior Art Database
  1. 81.
    Disclosed is a system to encourage thorough user testing of software products by implementing gamification techniques, such as incentives and rewards, in the testing process.
    IPCOM000240382D | 2015-Jan-28
  2. 82.
    Disclosed are a system and method that, based on the user’s profile, current location, and activity, identify and collect historical and related data. This enables the consumers to quickly have access to information that is important and relevant to the current location, situation, and surroundings.
    IPCOM000240381D | 2015-Jan-28
  3. 83.
    The approach takes the form of a software solution, including data transmission protocols, data extraction protocols, data mining, data processing, logic and end user interface. Distributed data is acquired on the platform, then is processed and distributed under the form of status, alarms, zone or time selected data...
    IPCOM000240380D | 2015-Jan-28
  4. 84.
    A method and system is disclosed for minimizing self-heating problem in large Field-effect transistors (FETs) such as, multi-finger buffer FETs and large inverters by segmenting and interleaving between different circuit stages.
    IPCOM000240378D | 2015-Jan-28
  5. 85.
    When unifying data source systems for analytical purposes, thousands of mappings can be made from the data source systems to Analytical Requirements. This disclosure describes a method to quickly determine from these mappings the Analytical Requirements that are supported across the entire organisation.
    IPCOM000240377D | 2015-Jan-28
  6. 86.
    ATM are machines that need extra attention with regard to passwords. The bad consequences of a compromised password can be quick and expensive. As of today, they are protected only with passwords/PIN. We suggest here a system that adds extra identification security when withdrawing cash from an ATM machine. This...
    IPCOM000240376D | 2015-Jan-28
  7. 87.
    In intermittent traffic jams (start, drive a few tens of seconds and stop), car drivers (accelerating fast and stopping hard) do not adopt a driving behavior that can smooth the traffic behind them (they cannot influence the traffic in front of them). In this article we present a method to allow vehicles to auto...
    IPCOM000240375D | 2015-Jan-28
  8. 88.
    Applications are often required to load large amounts of data. Often these loading tasks must happen when the application is executing its main business tasks. The loader process is often expected to perform transformation, usually by Extract-Transform-Load (ETL) tools which are not part of the application, have...
    IPCOM000240374D | 2015-Jan-28
  9. 89.
    IPCOM000240373D | 2015-Jan-28
  10. 90.
    Presented herein are techniques by which media originators add a Contributing Source (CSRC) Identifier (CSI) to all media they send, segmented into a unique, random value to identify the sender and a value to differentiate between different sources that sender has. This CSI is conveyed via the Session Initiation...
    IPCOM000240372D | 2015-Jan-27