scispace - formally typeset
Search or ask a question

Showing papers by "Amazon.com published in 2010"


Patent
02 Apr 2010
TL;DR: In this paper, an improved user interface and method for presenting recommendations to a user when the user adds an item to a shopping cart is presented, where a page generation process generates and returns a page that includes a recommendation portion and a condensed view of the shopping cart.
Abstract: An improved user interface and method are provided for presenting recommendations to a user when the user adds an item to a shopping cart. In response to the shopping cart add event, a page generation process generates and returns a page that includes a recommendations portion and a condensed view of the shopping cart. The recommendations portion preferably includes multiple recommendation sections, each of which displays a different respective set of recommended items selected according to a different respective recommendation or selection algorithm (e.g., recommendations based on shopping cart contents, recommendations based on purchase history, etc.). The condensed shopping cart view preferably lacks controls for editing the shopping cart, and lacks certain types of product information, making more screen real estate available for the display of the recommendations content. A link to a full shopping cart page allows the user to edit the shopping cart and view expanded product descriptions.

555 citations


Patent
20 Dec 2010
TL;DR: In this article, a robotic device can provide power management and other functionality for various electronic devices, such as data transfer, data transmission, and resource-intensive activities when in communication with an electronic device.
Abstract: A robotic device can provide power management and other functionality for various electronic devices. An electronic device and the robotic device can communicate information such as device charge level, relative position and rate of power consumption and can determine an appropriate time at which the robotic device should cause the electronic device to be charged, either by charging the device directly or transporting the device to an appropriate charger. The robotic device can also cause other functions to be performed as well, such as to enable high-bandwidth data transfer or perform resource-intensive activities when in communication with the electronic device. The robotic device can transport the electronic device to specific locations or to specific users, or as otherwise appropriate.

200 citations


Patent
30 Sep 2010
TL;DR: In this paper, the authors describe a system for providing electronic coupons to users of mobile devices, where the relevance of the coupons may be determined based on the distance of the mobile device from a merchant location and/or a time period during which the coupon is valid.
Abstract: Techniques for providing electronic coupons to users of mobile devices are described herein. The coupons may be redeemable at certain merchant locations and at certain times. Users may actively select coupons they wish to access from a mobile device. Alternatively, the users may opt in to a system that automatically presents potentially relevant coupons. The relevance of the coupons may be determined based on the distance of the mobile device from a merchant location and/or a time period during which the coupon is valid. The users may activate coupons by logging into a remote computing system from their respective mobile devices. Activated coupons may be transmitted as an electronic signal from a mobile device to a merchant computing device. Alternatively, a display screen of a mobile device may show a barcode or image of the coupon that is read by a machine or employee of the merchant.

198 citations


Patent
Daniel T. Cohn1
22 Jul 2010
TL;DR: In this article, the authors describe techniques for providing capabilities to dynamically migrate computing nodes between two or more computer networks while the computer networks are in use, such as to dynamically and incrementally migrate an entire originating first computer network to a destination second computer network at a remote location.
Abstract: Techniques are described for providing capabilities to dynamically migrate computing nodes between two or more computer networks while the computer networks are in use, such as to dynamically and incrementally migrate an entire originating first computer network to a destination second computer network at a remote location. For example, the first computer network may include one or more physically connected computer networks, while the second computer network may be a virtual computer network at a remote geographical location (e.g., under control of a network-accessible service available to remote users). The provided capabilities may further include facilitating the ongoing operations of the originating first computer network while a subset of the first computer network computing nodes have been migrated to the remote destination second computer network, such as by forwarding communications between the first and second computer networks in a manner that is transparent to the various computing nodes.

184 citations


Book ChapterDOI
15 Sep 2010
TL;DR: This work model users' access patterns by profiling the data points that users access, in contrast to analyzing the query expressions in prior approaches, based on the key observation that query syntax alone is a poor discriminator of user intent.
Abstract: The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciously harvest data. We propose a new direction to address this problem. We model users' access patterns by profiling the data points that users access, in contrast to analyzing the query expressions in prior approaches. Our data-centric approach is based on the key observation that query syntax alone is a poor discriminator of user intent, which is much better rendered by what is accessed. We present a feature-extraction method to model users' access patterns. Statistical learning algorithms are trained and tested using data from a real Graduate Admission database. Experimental results indicate that the technique is very effective, accurate, and is promising in complementing existing database security solutions. Practical performance issues are also addressed.

176 citations


Patent
24 Sep 2010
TL;DR: In this paper, a logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices, where the synchronization takes into account the capabilities of each device to provide versions and formats of that content that are appropriate for each device.
Abstract: A logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices. Such communication enables content such as applications and data to be synchronized between various devices, where the synchronization takes into account the capabilities of each device to provide versions and/or formats of that content that are appropriate for each device. A user purchasing an additional device, for example, can have various applications and other content automatically installed or copied over to the additional device, but with versions or formats that take advantage of, and are appropriate for, the capabilities of that additional device. Further, the intelligent communication via a logically centralized service can enable such devices to interact even though those devices might utilize different protocols and/or formats, and might otherwise not be able to communicate or have ever have been tested together.

168 citations


Journal ArticleDOI
TL;DR: In this paper, the authors demonstrate that a single squall line propagating across Amazonia in January, 2005, caused widespread forest tree mortality and may have contributed to the elevated mortality observed that year.
Abstract: [1] Climate change is expected to increase the intensity of extreme precipitation events in Amazonia that in turn might produce more forest blowdowns associated with convective storms. Yet quantitative tree mortality associated with convective storms has never been reported across Amazonia, representing an important additional source of carbon to the atmosphere. Here we demonstrate that a single squall line (aligned cluster of convective storm cells) propagating across Amazonia in January, 2005, caused widespread forest tree mortality and may have contributed to the elevated mortality observed that year. Forest plot data demonstrated that the same year represented the second highest mortality rate over a 15-year annual monitoring interval. Over the Manaus region, disturbed forest patches generated by the squall followed a power-law distribution (scaling exponent α = 1.48) and produced a mortality of 0.3–0.5 million trees, equivalent to 30% of the observed annual deforestation reported in 2005 over the same area. Basin-wide, potential tree mortality from this one event was estimated at 542 ± 121 million trees, equivalent to 23% of the mean annual biomass accumulation estimated for these forests. Our results highlight the vulnerability of Amazon trees to wind-driven mortality associated with convective storms. Storm intensity is expected to increase with a warming climate, which would result in additional tree mortality and carbon release to the atmosphere, with the potential to further warm the climate system.

166 citations


Journal ArticleDOI
01 Feb 2010-Pain
TL;DR: IL‐17 is a novel pro‐nociceptive cytokine in mBSA‐induced arthritis, whose effect depends on both neutrophil migration and various pro‐inflammatory mediators, as TNF‐&agr;, IL‐1&bgr;, CXCR1/2 chemokines ligands, MMPs, endothelins, prostaglandins and sympathetic amines.
Abstract: IL-17 is an important cytokine in the physiopathology of rheumatoid arthritis (RA). However, its participation in the genesis of nociception during RA remains undetermined. In this study, we evaluated the role of IL-17 in the genesis of articular nociception in a model of antigen (mBSA)-induced arthritis. We found that mBSA challenge in the femur-tibial joint of immunized mice induced a dose- and time-dependent mechanical hypernociception. The local IL-17 concentration within the mBSA-injected joints increased significantly over time. Moreover, co-treatment of mBSA challenged mice with an antibody against IL-17 inhibited hypernociception and neutrophil recruitment. In agreement, intraarticular injection of IL-17 induced hypernociception and neutrophil migration, which were reduced by the pre-treatment with fucoidin, a leukocyte adhesion inhibitor. The hypernociceptive effect of IL-17 was also reduced in TNFR1(-/-) mice and by pre-treatment with infliximab (anti-TNF antibody), a CXCR1/2 antagonist or by an IL-1 receptor antagonist. Consistent with these findings, we found that IL-17 injection into joints increased the production of TNF-alpha, IL-1beta and CXCL1/KC. Treatment with doxycycline (non-specific MMPs inhibitor), bosentan (ET(A)/ET(B) antagonist), indomethacin (COX inhibitor) or guanethidine (sympathetic blocker) inhibited IL-17-induced hypernociception. IL-17 injection also increased PGE(2) production, MMP-9 activity and COX-2, MMP-9 and PPET-1 mRNA expression in synovial membrane. These results suggest that IL-17 is a novel pro-nociceptive cytokine in mBSA-induced arthritis, whose effect depends on both neutrophil migration and various pro-inflammatory mediators, as TNF-alpha, IL-1beta, CXCR1/2 chemokines ligands, MMPs, endothelins, prostaglandins and sympathetic amines. Therefore, it is reasonable to propose IL-17 targeting therapies to control this important RA symptom.

156 citations


Patent
Eric Jason Brandwine1
03 Mar 2010
TL;DR: In this paper, the authors describe techniques for managing communications for computing nodes of a managed computer network by automatically determining to separate a particular outgoing packet or other outgoing communication from a source computing node into multiple parts (e.g., multiple packets) to be independently sent using two or more alternative network paths between the sending computing node and the destination for the communication.
Abstract: Techniques are described for providing managed computer networks. In some situations, the techniques include managing communications for computing nodes of a managed computer network by automatically determining to separate a particular outgoing packet or other outgoing communication from a source computing node into multiple parts (e.g., multiple packets) to be independently sent using two or more alternative network paths between the sending computing node and the destination for the communication. For example, a manager module associated with the source computing node may automatically determine to encode the outgoing communication into a dynamically determined quantity of multiple parts (e.g., by using a configurable erasure code), such as based on current information about available alternative paths, and another manager module associated with the destination may receive at least some of the multiple parts and decode them into the original outgoing communication, which is then provided to the destination.

149 citations


Journal ArticleDOI
TL;DR: In this article, a multilevel modeling approach was used to identify within-tree gradients within individual tree canopies as opposed to stand level gradients occurring because of systematic differences occurring between different trees of different heights.
Abstract: . Vertical profiles in leaf mass per unit leaf area (MA), foliar 13C composition (δ13C), nitrogen (N), phosphorus (P), carbon (C) and major cation concentrations were estimated for 204 rain forest trees growing in 57 sites across the Amazon Basin. Data was analysed using a multilevel modelling approach, allowing a separation of gradients within individual tree canopies (within-tree gradients) as opposed to stand level gradients occurring because of systematic differences occurring between different trees of different heights (between-tree gradients). Significant positive within-tree gradients (i.e. increasing values with increasing sampling height) were observed for MA and [C]DW (the subscript denoting on a dry weight basis) with negative within-tree gradients observed for δ13C, [Mg]DW and [K]DW. No significant within-tree gradients were observed for [N]DW, [P]DW or [Ca]DW. The magnitudes of between-tree gradients were not significantly different to the within-tree gradients for MA, δ13C, [C]DW, [K]DW, [N]DW, [P]DW and [Ca]DW. But for [Mg]DW, although there was no systematic difference observed between trees of different heights, strongly negative within-tree gradients were found to occur. When expressed on a leaf area basis (denoted by the subscript "A"), significant positive gradients were observed for [N]A, [P]A and [K]A both within and between trees, these being attributable to the positive intra- and between-tree gradients in MA mentioned above. No systematic within-tree gradient was observed for either [Ca]A or [Mg]A, but with a significant positive gradient observed for [Mg]A between trees (i.e. with taller trees tending to have a higher Mg per unit leaf area). Significant differences in within-tree gradients between individuals were observed only for MA, δ13C and [P] A. This was best associated with the overall average [P]A for each tree, this also being considered to be a surrogate for a tree's average leaf area based photosynthetic capacity, Amax. A new model is presented which is in agreement with the above observations. The model predicts that trees characterised by a low upper canopy Amax should have shallow, or even non-existent, within-canopy gradients in Amax, with optimal intra-canopy gradients becoming sharper as a tree's upper canopy Amax increases. Nevertheless, in all cases it is predicted that the optimal within-canopy gradient in Amax should be substantially less than for photon irradiance. Although this is also shown to be consistent with numerous observations as illustrated by a literature survey of gradients in photosynthetic capacity for broadleaf trees, it is also in contrast to previously held notions of optimality. A new equation relating gradients in photosynthetic capacity within broadleaf tree canopies to the photosynthetic capacity of their upper canopy leaves is presented.

135 citations


Patent
28 Jun 2010
TL;DR: In this article, techniques for managing distributed execution of programs, including by dynamically scaling a cluster of multiple computing nodes performing ongoing distributed execution, such as to increase and/or decrease computing node quantity.
Abstract: Techniques are described for managing distributed execution of programs, including by dynamically scaling a cluster of multiple computing nodes performing ongoing distributed execution of a program, such as to increase and/or decrease computing node quantity. An architecture may be used that has core nodes that each participate in a distributed storage system for the distributed program execution, and that has one or more other auxiliary nodes that do not participate in the distributed storage system. Furthermore, as part of performing the dynamic scaling of a cluster, computing nodes that are only temporarily available may be selected and used, such as computing nodes that might be removed from the cluster during the ongoing program execution to be put to other uses and that may also be available for a different fee (e.g., a lower fee) than other computing nodes that are available throughout the ongoing use of the cluster.

Patent
30 Jun 2010
TL;DR: In this paper, the authors propose to use virtualization technologies such as VMWare, XEN, or User-Mode Linux to allow a single physical computing machine to be shared among multiple virtual networks by providing each virtual network user with one or more virtual machines.
Abstract: With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware rather than actual routers For example, virtualization technologies such as those provided by VMWare, XEN, or User-Mode Linux can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing each virtual network user with one or more virtual machines hosted by the single physical computing machine, with each such virtual machine being a software simulation acting as a distinct logical computing system that provides users with the illusion that they are the sole operators and administrators of a given hardware computing resource In addition, routing can be accomplished through software, providing additional routing flexibility to the virtual network in comparison with traditional routing As a result, in some implementations, supplemental information other than packet information can be used to determine network routing

Patent
26 Oct 2010
TL;DR: In this paper, a monitoring component periodically communicates with a primary and a secondary replica for an instance, with each capable of residing in a separate data zone or geographic location to provide a level of reliability and availability.
Abstract: Replicated instances in a database environment provide for automatic failover and recovery. A monitoring component can periodically communicate with a primary and a secondary replica for an instance, with each capable of residing in a separate data zone or geographic location to provide a level of reliability and availability. A database running on the primary instance can have information synchronously replicated to the secondary replica at a block level, such that the primary and secondary replicas are in sync. In the event that the monitoring component is not able to communicate with one of the replicas, the monitoring component can attempt to determine whether those replicas can communicate with each other, as well as whether the replicas have the same data generation version. Depending on the state information, the monitoring component can automatically perform a recovery operation, such as to failover to the secondary replica or perform secondary replica recovery.

Patent
24 Sep 2010
TL;DR: In this paper, a logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices, where the synchronization takes into account the capabilities of each device to provide versions and formats of that content that are appropriate for each device.
Abstract: A logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices. Such communication enables content such as applications and data to be synchronized between various devices, where the synchronization takes into account the capabilities of each device to provide versions and/or formats of that content that are appropriate for each device. A user purchasing an additional device, for example, can have various applications and other content automatically installed or copied over to the additional device, but with versions or formats that take advantage of, and are appropriate for, the capabilities of that additional device. Further, the intelligent communication via a logically centralized service can enable such devices to interact even though those devices might utilize different protocols and/or formats, and might otherwise not be able to communicate or have ever have been tested together.

Patent
30 Sep 2010
TL;DR: In this paper, the authors proposed a method for providing information to a user of a mobile device based on an online or web-identity of the user and a geolocation of the mobile device.
Abstract: Techniques for providing information to a user of a mobile device based on an online or web-identity of the user and a geolocation of the mobile device are described herein. The user may be notified when a nearby merchant has a good or service for sale that matches a good or service in a list, such as a wish list, associated with the web-identity of the user. The users may also be provided access to a coupon within an electronic document when a mobile device storing the electronic document is located at a particular merchant. This convergence of geographical location of the user, as determined by the geolocation of his or her mobile device, with his or her web-identity can bring the online and off-line worlds closer together to provide relevant information for the user and improved marketing opportunities for merchants.

Patent
22 Dec 2010
TL;DR: In this article, the authors describe techniques for facilitating interactions between task requesters who have tasks available to be performed and task performers who are available to perform tasks, such as by an intermediary electronic marketplace or other task fulfillment facilitator system.
Abstract: Techniques are described for facilitating interactions between task requesters who have tasks that are available to be performed and task performers who are available to perform tasks, such as by an intermediary electronic marketplace or other task fulfillment facilitator system. In some situations, task performer users and/or other users may create task subscriptions for use in automatically identifying tasks of interest to the users about which the users desire to receive notification. The users may be notified of the identified tasks in various ways, such as by sending electronic messages of various types to the users that include indications of the tasks identified for those users based on their subscriptions. Tasks of interest may be identified in various ways, such as based on task attributes of interest specified for a subscription that are later matched against tasks that are available at the time of the matching.

Patent
08 Nov 2010
TL;DR: In this paper, a processing device obtains and processes performance metric information associated with processing a request corresponding to two or more embedded resources, and then uses the processed metric information to determine an allocation of one or more domains to be associated with the two ormore embedded resources.
Abstract: Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to two or more embedded resources. The processing device uses the processed performance metric information to determine an allocation of one or more domains to be associated with the two or more embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent requests for the two or more embedded resources using each of a variety of alternative allocations of domains associated with the two or more embedded resources. The processing device may also consider a number of factors, including domain selection criteria obtained from an original content provider. Aspects of systems and methods for generating recommendations to use a particular allocation of domains to process a subsequent request corresponding to the two or more embedded resources are also provided.

Patent
19 Aug 2010
TL;DR: In this article, a reflective display such as an electrophoretic display (EPD) and an emissive display, such as a backlit liquid crystal display, are combined to form an amalgamated display.
Abstract: A reflective display, such as an electrophoretic display (EPD), and an emissive display, such as a backlit liquid crystal display, may be combined to form an amalgamated display. This combination may include layering one display atop the other, alternating reflective and emissive display elements, or otherwise interspersing reflective and emissive display elements with one another. Images on the amalgamated display may be presented using either reflective or emissive modes or a combination of the two, depending upon factors such as refresh rate, power consumption, presence of color and/or video, and so forth.

Patent
26 Jan 2010
TL;DR: Haptic feedback may be provided to a user of an electronic device, such as an electronic book reader device, to confirm receipt of user input or otherwise convey information to the user as discussed by the authors.
Abstract: Haptic feedback may be provided to a user of an electronic device, such as an electronic book reader device, to confirm receipt of user input or otherwise convey information to the user. The haptic feedback may be provided more quickly than a display update time of a display of the electronic device. Different patterns, durations, and/or intensities of haptic feedback may be used in response to different events.

Patent
12 Oct 2010
TL;DR: In this paper, a computing device can analyze image or video information to determine a relative position of an active user and optimize audio or video data capture based at least in part upon the relative location.
Abstract: A computing device can analyze image or video information to determine a relative position of an active user. The computing device can optimize audio or video data capture based at least in part upon the relative location. The device can capture audio using one or more microphones pointing toward the relative location of the active user, and can use other microphones to determine audio from other sources to be removed from the captured audio. If video data is being captured, a video capture element can be adjusted to focus primarily on the active user. The position of the user can be monitored so the audio and video data capture can be adjusted accordingly.

Journal ArticleDOI
TL;DR: It is suggested that innovative consumers adopt and use new technology for not just utilitarian but also for experiential outcomes, and that even utilitarian users have hedonic and social factors present in their consumption patterns.

Patent
26 Oct 2010
TL;DR: In this article, a monitoring component can obtain a lease enabling the component to periodically communicate with, and monitor, one or more data instances in the data environment, where the data instance can be a replicated instance including a primary and a secondary replica.
Abstract: Replicated instances in a database environment provide for automatic failover and recovery. A monitoring component can obtain a lease enabling the component to periodically communicate with, and monitor, one or more data instances in the data environment, where the data instance can be a replicated instance including a primary and a secondary replica. For a large number of instances, the data environment can be partitioned such that each monitoring component can be assigned a partition of the workload. In the event of a failure of a monitoring component, the instances can be repartitioned and the remaining monitoring components can be assigned to the new partitions to substantially evenly distribute the workload.

Patent
Ian W. Freed1
28 Sep 2010
TL;DR: In this paper, techniques for navigating through a user interface with a force-sensitive touch sensor are described, where the user can navigate through a hierarchy of folders and files using touch and force.
Abstract: Techniques for navigating through a user interface with a force-sensitive touch sensor are described. In some implementations, the force-sensitive touch sensor is also a display that presents the user interface. Touches on the force-sensitive touch sensor may be interpreted as indicating a vector direction based on the location of the touch and a vector magnitude based on the force of the touch. For instance, when a user navigates through a collection of photographs on a device having a force-sensitive touch sensor, the vector direction may determine if the user is scrolling forwards or backwards through the photographs and the vector magnitude may determine how rapidly the scrolling occurs. The user may also navigate through a hierarchy of folders and files using touch and force. Selection of a folder and application of force exceeding a threshold may result in display of the contents of a most commonly accessed subfolder or file.

Patent
31 Mar 2010
TL;DR: In this paper, a user can call into an externally-facing interface of the control environment, the call being analyzed to determine actions to be performed in the data environment, and a workflow can be instantiated that includes tasks necessary to perform the action.
Abstract: Aspects of a data environment, such as the creation, provisioning, and management of data stores and instances, are managed using a separate control environment. A user can call into an externally-facing interface of the control environment, the call being analyzed to determine actions to be performed in the data environment. A monitoring component of the control plane also can periodically communicate with the data environment to determine any necessary actions to be performed, such as to recover from faults or events in the data environment. A workflow can be instantiated that includes tasks necessary to perform the action. For each task, state information can be passed to a component in the data environment operable to perform the task, until all tasks for an action are completed. Data in the data environment can be accessed directly using an externally-facing interface of the data environment, without accessing the control plane.

Patent
29 Jul 2010
TL;DR: In this article, a force-sensitive touch sensor detects location and force of touches applied to the sensor, which can be interpreted as different commands to manipulate objects displayed on the display device.
Abstract: A force-sensitive touch sensor detects location and force of touches applied to the sensor. Movement of an object touching the force-sensitive touch sensor correlates to movement of a pointer on a display device. Varying levels of force applied to the force-sensitive touch sensor are interpreted as different commands. Objects displayed on the display device can be manipulated by a combination of gestures across a surface of the force-sensitive touch sensor and changes in force applied to the force-sensitive touch sensor.

Patent
28 Jun 2010
TL;DR: In this paper, techniques for managing distributed execution of programs, including by dynamically scaling a cluster of multiple computing nodes used to perform ongoing distributed execution, such as to increase and/or decrease the quantity of computing nodes in the cluster at various times and for various reasons.
Abstract: Techniques are described for managing distributed execution of programs, including by dynamically scaling a cluster of multiple computing nodes used to perform ongoing distributed execution of a program, such as to increase and/or decrease the quantity of computing nodes in the cluster at various times and for various reasons. An architecture may be used that facilitates the dynamic scaling of a cluster, including by having at least some of the computing nodes act as core nodes that each participate in a distributed storage system for the distributed program execution, and having one or more other computing nodes that act as auxiliary nodes that do not participate in the distributed storage system. If computing nodes are selected to be removed from the cluster during ongoing distributed execution of a program, one or more nodes of the auxiliary computing node type may be selected for the removal.

Patent
03 Dec 2010
TL;DR: In this paper, a service provider can assign DNS servers corresponding to a distributed set of network addresses, or portions of network address, such that DNS queries exceeding a threshold, such as in DNS query-based attacks, can be filtered in a manner that can mitigate performance impact on for the content provider or service provider.
Abstract: Generally described, the present disclosure is directed to managing request routing functionality corresponding to resource requests for one or more resources associated with a content provider. The processing of the DNS requests by the service provider can include the selective filtering of DNS queries associated with a DNS query-based attack. A service provider can assign DNS servers corresponding to a distributed set of network addresses, or portions of network addresses, such that DNS queries exceeding a threshold, such as in DNS query-based attacks, can be filtered in a manner that can mitigate performance impact on for the content provider or service provider.

Patent
11 Feb 2010
TL;DR: In this paper, a system and method for protecting devices from impact damage is provided, prior to impact between a surface and a device, a determination of a risk of damage to the device is made.
Abstract: A system and method for protecting devices from impact damage is provided. Prior to impact between a surface and a device, a determination of a risk of damage to the device is made. If the risk of damage to the device exceeds a threshold, a protection system is activated to reduce or substantially eliminate damage to the device.

Patent
23 Feb 2010
TL;DR: In this article, a method for fulfilling requests in an inventory system includes receiving a request indicating an activity to be completed, and selecting a holder to fulfill the request and an inventory station at which to fulfil the request.
Abstract: A method for fulfilling requests in an inventory system includes receiving a request indicating an activity to be completed. The method also includes selecting a holder to fulfill the request and an inventory station at which to fulfill the request. The inventory station is associated with a queue that includes a plurality of queue spaces. The method further includes moving the selected holder from a first location to a second location remote from the selected inventory station. Additionally, the method also includes determining that a trigger event has occurred and, in response to determining that the trigger event has occurred, moving the selected holder from the second location to a queue space of a queue associated with the selected inventory station.

Patent
28 Dec 2010
TL;DR: In this paper, a migration manager monitors the resource usage of a virtual machine instance over time in order to create a migration profile and schedules the migration to occur such that the migration conforms to the migration profile.
Abstract: Systems and method for the management of migrations of virtual machine instances are provided. A migration manager monitors the resource usage of a virtual machine instance over time in order to create a migration profile. When migration of a virtual machine instance is desired, the migration manager schedules the migration to occur such that the migration conforms to the migration profile.