Wilson, Seattle
Aaron Lamar Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140327608 | TRANSFORMING VISUALIZED DATA THROUGH VISUAL ANALYTICS BASED ON INTERACTIVITY - A data visualization application transforms visualized data through visual analytics. A detected gesture and associated visualization are processed through a visual analytics engine of the application. The visual analytics engine determines attributes for a new visualization based on the contextual information of the gesture and the visualization. The analytics engine dynamically builds an action based on the attributes. Execution of the action generates the new visualization which is rendered for presentation. | 11-06-2014 |
20140372851 | Conversion of Data Ranges to Table Objects - Conversion of data ranges to table objects in an electronic spreadsheet document is provided. When an electronic spreadsheet document is being utilized, data ranges may be automatically converted to tables to allow the user to enjoy the full benefits of the table properties and functionalities. When a data range is automatically converted to a table object, a user will be given an opportunity to revert the table object back to the data range from which it was converted. Instead of automatic conversion, a suggestion may be provided to a user before a data range is converted to a table object. If the user accepts the suggestion, then the data range may be automatically converted to a table object. | 12-18-2014 |
20140372857 | Smart Fill - A smart fill feature is provided, which may be utilized to provide suggestions to a user and to prepopulate fill results in a spreadsheet. Characteristics associated with a set of data may be recognized and used to help determine fill results Suggestions may be determined from internal and or/external data sources, and may use contextual information in a data set to determine what a user may be trying to accomplish. External data sources may include one or more Internet data sources or internal corporate databases, providing a large amount of data from which to search for potential fill results. A split column command may be used to split a column into two or more columns. Data may be split between columns or combined by various methods, which may include, by example, by direct manipulation via tokens, or via a slider UI. | 12-18-2014 |
20140372933 | Automatically displaying suggestions for entry - Suggestions are automatically displayed in response to an event. For example, suggestions may be automatically displayed in response to a receiving an indication from a user to enter content (e.g. receiving a selection of a content entry area). The suggestions may be displayed before a user enters any characters and before an input device is displayed and/or used (e.g. keyboard, Software Input Panel (SIP), and the like. Suggestions may also be automatically displayed in response to detecting a pause while a user is entering content. For example, when a user is actively entering content, suggestions are not automatically displayed but when a user pauses a predetermined amount while entering content, suggestions are automatically displayed. The suggestions may be determined from content that may be seen on a display and/or hidden from view (e.g. hidden rows in a spreadsheet). | 12-18-2014 |
20150261736 | Enhanced Indicators for Identifying Affected Data - Technologies are described herein for displaying one or more visual indicators to assist users in identifying cells of a spreadsheet that are affected by an operation. In embodiments disclosed herein, an application is configured to receive a request to perform an operation on at least one cell of the spreadsheet. The application then identifies cells of the spreadsheet that are affected by the operation. The application then displays a visual indicator to emphasize the affected cells. By providing a timely displayed visual indicator that brings attention to affected cells, the user is able to gain a better perspective of the extent of the operation and how the operation applies to the cells of the spreadsheet. | 09-17-2015 |
20160055374 | Enhanced Interpretation of Character Arrangements - Technologies are described herein for interpreting character arrangements. An image including an arrangement of characters may be received or captured by a computing device. Techniques described herein generate data representative of the characters. Characteristics and other information interpreted from the image may be processed to determine a data type. The data representative of the characters may be arranged into a data structure based on the data type, an arrangement type and/or other information interpreted from the image. The data type may indicate one or more attributes of the arranged data such as a format, font, date, language, or currency. The data type may also indicate how data is used in a process, equation or calculation. In addition, the data type may identify an anchor that may be used to merge data generated from the image with other data generated from another image. | 02-25-2016 |
20160055659 | Enhanced Recognition of Charted Data - An image including a chart displaying graphical elements may be received or captured by a computing device. The graphical elements, for example, may be bars of a bar chart, or components of a pie chart. Techniques described herein may determine values for the graphical elements. Techniques described herein may also analyze the arrangement of the graphical elements and other contextual information to determine a chart type. The generated values may be arranged into an editable chart and/or an editable data structure based on the chart type. Touch-enabled gestures may be applied to the data structure to allow a user to modify, save or otherwise process the data structure. | 02-25-2016 |
Adam Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150015504 | INTERACTIVE DIGITAL DISPLAYS - The description relates to an interactive digital display. One example includes a display device configured to receive user input and recognize commands relative to data visualizations. The system also includes a graphical user interface configured to be presented on the display device that allows users to interact with the data visualizations via the user commands. | 01-15-2015 |
Adam David Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150278315 | DATA FITTING SELECTED VISUALIZATION TYPE - A mechanism to visualize data to a user in a sufficient manner. The user selects a visualization type to visualize a selected subset of a data model. To fit the data well into a visualization of that visualization type, the system then evaluates the user selections of the visualization type of the subset of data against the rule set. Based on the evaluation, the system determines that the subset of data does not populate or insufficiently populates the visualization type. In some embodiments, the system further recommends additional data to supplement the selected subset of data to more sufficiently utilize the visualization to display the subset of data in conjunction with the supplemented data. The system may further display the visualization based on the selected subset of the data model perhaps before and/or after supplemented with the supplemented data. | 10-01-2015 |
20150302051 | DATA FILTERING TO FIT SELECTED VISUALIZATION TYPE - A mechanism to visualize data to a user in a sufficient manner. The user selects a visualization type to visualize a selected subset of a data model. To fit the data well into a visualization of that visualization type, the system then evaluates the user selections of the visualization type of the subset of data against the rule set. Based on the evaluation, the system determines that the subset of data overpopulates the visualization type. In some embodiments, the system further identifies one or more filters to apply to the subset of data which would decrease the population of data within the virtualization type. Then, a visualization of the selected visualization type is to be displayed using at least one of the one or more identified filter. | 10-22-2015 |
Andrew Daivd Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150346837 | Gestures, Interactions, And Common Ground In a Surface Computing Environment - Aspects relate to detecting gestures that relate to a desired action, wherein the detected gestures are common across users and/or devices within a surface computing environment. Inferred intentions and goals based on context, history, affordances, and objects are employed to interpret gestures. Where there is uncertainty in intention of the gestures for a single device or across multiple devices, independent or coordinated communication of uncertainty or engagement of users through signaling and/or information gathering can occur. | 12-03-2015 |
Andrew T. Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150207852 | BACKGROUND ELEMENT ASSOCIATED WITH AN APPLICATION INSTALLED IN A BROWSER APPLICATION - A computer-implemented method includes running a background element that is an invisible element in a browser application, where the background element includes a declared association with an application and includes instructions related to one or more visible elements of the application in the browser application and executing the instructions on the background element to perform a function related to the one or more visible elements of the application in the browser application. | 07-23-2015 |
Brett Michael Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20160094580 | DYNAMIC LOADING AND CONFIGUATION OF THREAT DETECTORS BASED ON FEEDBACK FROM OTHER NODES - Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. The DCA implementation may use an inflammation signal to communicate information among the processes of device or a network or among nodes of a network, where the inflammatory signal indicates a likelihood that a process or a node has been attacked by malicious software. The DCA implementation may dynamically change the malware sensitivity and responsiveness based on the inflammation signals without requiring user intervention. The inflammatory signal includes one or more inflammatory tuples, which may include multiple components such as a strength, a PrimeIndicator, and an optional third element, p. The strength component may be an indication of the magnitude of an attack and provide a degree of certainty of the attack. The PrimeIndicator may be an identifier of the indicator type that is the source of the inflammation tuple. | 03-31-2016 |
Cherie Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130232861 | Methods of Higher Alcohol Synthesis - Systems, catalysts, and methods are provided for transforming carbon based material into synthetic mixed alcohol fuel. | 09-12-2013 |
Darrel Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20160095480 | HINGE PIN FOR LAVATORY SEAT AND/OR LID - A hinge pin for pivotally mounting at least one of a toilet seat and a lid to a toilet or surrounding structure comprises a first hinge pin component, a second hinge pin component a linking member and fasteners. The first hinge pin component and the second hinge pin component each has a cylindrical outer end, a semicylindrical inner end with a flat joining surface and a shoulder between the outer end and the inner end. The linking member is semicylindrical and has a flat linking surface dimensioned to link the first hinge pin component and the second hinge component when they are axially aligned with their inner ends facing each other and the linking surface is in contact with each joining surface and secured by the fasteners. The assembled linking member and first and second hinge components define a center section of the hinge pin having a circular cross section. | 04-07-2016 |
Eric Chandler Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150142602 | METHOD AND SYSTEM FOR AUTOMATED IDENTIFICATION AND ENGAGEMENT OF SERVICE PROVIDERS - The current document is directed to methods and systems that identify projects for which service consumers desire service provision and identify available candidate service providers that best match various project parameters and service-provision criteria determined by the automated system. Information describing the identified candidate service providers is presented to the service consumers by the systems to allow service consumers in order to facilitate their selection of service providers and scheduling of service provision. In one described implementation, service providers are matched to stock-keeping-unit (“SKU”) identifiers and location or locations. Service providers identified in the initial SKU-and-location-based matching process are then scored and ranked according to additional criteria and constraints, with information describing the highest-ranked service candidate providers provided to service consumers for selection and scheduling. | 05-21-2015 |
20160034995 | METHOD AND SYSTEM FOR AUTOMATED INDENTIFICATION AND ENGAGEMENT OF SERVICE PROVIDERS - The current document is directed to methods and systems that identify projects for which service consumers desire service provision and identify available candidate service providers that best match various project parameters and service-provision criteria determined by the automated system. Information describing the identified candidate service providers is presented to the service consumers by the systems to allow service consumers in order to facilitate their selection of service providers and scheduling of service provision. In one described implementation, service providers are matched to stock-keeping-unit (“SKU”) identifiers and location or locations. Service providers identified in the initial SKU-and-location-based matching process are then scored and ranked according to additional criteria and constraints, with information describing the highest-ranked service candidate providers provided to service consumers for selection and scheduling. | 02-04-2016 |
John T.r. Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140135742 | Cavitation reduction in catheter removal - This invention identifies cavitation as a damaging problem in catheterization occurring upon removal of the catheter from the urethra. This invention is means for reducing cavitation related damage to the urinary track upon catheter removal. This invention shows vent means to reduce cavitation damage can be plastic “trimmer lines” used in lawn trimmers also called “weed eaters”. | 05-15-2014 |
20140236130 | Catheter - This invention identifies cavitation as a damaging problem in catheterizing, such cavitation occurring upon removal of the catheter from the urethra. This invention shows venting the catheter tip to reduce cavitation related damage to the urinary track upon catheter removal. This invention discloses methods to reduce or prevent cavitation damage to portions of the urinary track This invention shows a vent to reduce partial vacuum formation leading to cavitation damage can be plastic “trimmer lines” used in lawn trimmers also called “weed eaters”. | 08-21-2014 |
John T. R. Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140135742 | Cavitation reduction in catheter removal - This invention identifies cavitation as a damaging problem in catheterization occurring upon removal of the catheter from the urethra. This invention is means for reducing cavitation related damage to the urinary track upon catheter removal. This invention shows vent means to reduce cavitation damage can be plastic “trimmer lines” used in lawn trimmers also called “weed eaters”. | 05-15-2014 |
20140236130 | Catheter - This invention identifies cavitation as a damaging problem in catheterizing, such cavitation occurring upon removal of the catheter from the urethra. This invention shows venting the catheter tip to reduce cavitation related damage to the urinary track upon catheter removal. This invention discloses methods to reduce or prevent cavitation damage to portions of the urinary track This invention shows a vent to reduce partial vacuum formation leading to cavitation damage can be plastic “trimmer lines” used in lawn trimmers also called “weed eaters”. | 08-21-2014 |
Matthew Shawn Wilson, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140208096 | SECURE INTERFACE FOR INVOKING PRIVILEGED OPERATIONS - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order authorize and authenticate requests sent to a virtualization later. The interfaces can be invoked to perform security monitoring, forensic capture, and/or patch software systems at runtime. In addition to the foregoing, other aspects are described in the claims, detailed description, and figures. | 07-24-2014 |
20140208097 | SECURING RESULTS OF PRIVILEGED COMPUTING OPERATIONS - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to secure the results of privileged operations on systems such as the operating system (OS) kernel and/or the hypervisor. The interface allows a public key to be included into a request to perform a privileged operation on a hypervisor and/or kernel. The kernel and/or hypervisor use the key included in the request to encrypt the results of the privileged operation. In some embodiments, the request itself can also be encrypted, such that any intermediate parties are not able to read the parameters and other information of the request. | 07-24-2014 |
20140208111 | SECURE VIRTUAL MACHINE MIGRATION - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to enable secure migration of virtual machine instances between multiple host computing devices. The migration is performed by receiving a request to migrate a virtual machine where the request includes public keys for the source host computing and the destination host computing. The source and destination hosts use the public keys to establish an encrypted session and then use the encrypted session to migrate the virtual machine. | 07-24-2014 |
20160092677 | ALLOCATION OF SHARED SYSTEM RESOURCES - Techniques are described for allocating resources to a task from a shared hardware structure. A plurality of tasks may execute on a processor, wherein the processor may include one or more processing cores and each task may include a plurality of computer executable instructions. In accordance with one technique for allocating resources to a task from a shared hardware structure amongst multiple tasks, aspects of the disclosure describe assigning a first identifier to a first task from the plurality of tasks, associating a portion of the shared hardware resource with the first identifier, and restricting access and/or observability for computer executable instructions executed from any other task than the first task to the portion of the hardware resource associated with the first identifier. | 03-31-2016 |