The subject specification relates to systems and methods for compensating an agent that utilizes a software application in exchange for the agent's intent in using the application, and for displaying advertisement to the agent in response to the intent.
In conventional user-service provider interaction, a user or agent selects a service or goods provider based on an expectation that the provider would deliver relevant and competent service that would satisfy the needs of the agent. In addition, cost-benefit analysis generally contributes to the selection process, with the agent seeking the most value among available alternative. Once a selection is made—either a service provider is engage in a commercial transaction, or a product is bought from a merchant—the agent conveys intent in accessing the service or utilizing a product. In response to the provided intent, an adequate selection of service provider or product generally leads service or product satisfaction. In such a commercial paradigm, service providers and merchants typically compete for agent's intent by offering quality service and products while campaigning for brand recognition and awareness, as well as service or product differentiation. It should be appreciated, notwithstanding that advertising efforts and agent's intent are either primarily disjointed or marginally exploited. Furthermore, merchants and product distributors generally pursue independent advertisement campaigns.
The above mentioned predominant disconnect between advertisement efforts and agent's intent, as well as disjointed merchant-distributor advertisement efforts can significantly undermine efforts for product penetration and recognition. Additionally, disjointed efforts can result in missed synergistic opportunities between product drivers (e.g., merchant, distributors, and service providers). More importantly, synergistic commercial opportunities between product drivers and product adopters can also be missed. As an example of missed opportunities between market forces among merchants and consumers can be illustrated with software applications in scenarios where users have few options to access licensed software. In such scenarios, agents (e.g., a single user, or a group of users) oftentimes would turn to pirate copies of licensed software. Even when agents avoid turning to piracy, it appears likely that such agents would consider open-source software applications. Clearly, tendencies like resorting to piracy and leaning toward open-source software not only can result in loss of market share or opportunities for product penetration, but it can allow lost revenues for developers of licensed software and its distributors. Moreover, the foregoing tendencies can also affect agents as pirated copies are not supported and open-source applications demand a certain level of savvy to leverage off community efforts that offer support through user groups, blogs, and web-based boards.
The following presents a simplified summary of the claimed subject matter in order to provide a basic understanding of some aspects of the claimed subject matter. This summary is not an extensive overview of the claimed subject matter. It is intended to neither identify key or critical elements of the claimed subject matter nor delineate the scope of the claimed subject matter. Its sole purpose is to present some concepts of the claimed subject matter in a simplified form as a prelude to the more detailed description that is presented later.
The subject specification discloses systems and methods are provided for an intent-compensation commercial model that directly compensates an agent that utilizes a software application in exchange for the agent's intent in using the application, and for displaying advertisement to the agent in response to the intent. Intent can be inferred through information received from the agent when utilizing the software application and according to the agent's privacy settings. Intent inference and privacy settings can be accomplished through an interface that links the agent with a service provider that delivers the advertisement and provides the compensation. Based on inferred agent's intent, an intent-specific advertisement is displayed to the agent and an associated software-related compensation is provided.
Compensation accumulation profiles can be established based at least in part on privacy settings determined by the agent. A single agent can determine multiple privacy settings, and such settings can be associated with multiple applications. Compensation possesses monetary value and can be facilitated through advertisement spend received by a service platform from an advertisement engine. Compensation can be directed towards (a) increasing software functionality, (b) providing credits for training and literature related to the utilization of the application, or (c) servicing a device in which the application is executed. The software-related compensation provided to an agent has monetary value and originates primarily on intent-driven advertisement; therefore, such compensation can effectively fund the agent's software application through advertisement.
The following description and the annexed drawings set forth in detail certain illustrative aspects of the claimed subject matter. These aspects are indicative, however, of but a few of the various ways in which the principles of the claimed subject matter may be employed and the claimed subject matter is intended to include all such aspects and their equivalents. Other advantages and novel features of the claimed subject matter will become apparent from the following detailed description of the claimed subject matter when considered in conjunction with the drawings.
The claimed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the claimed subject matter.
Moreover, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
Further, the terms “component,” “system,” “module,” “platform,” or the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
As employed herein, the terms “agent,” “user,” “customer,” “player,” “participant” and the like generally refer to a human entity (e.g., a single person or group of people) that utilizes a software application (e.g., plays, participates in, or employs a computer-implemented game; or utilizes a utility software application like presentation-preparation software, data-analysis software, online investment and related business transactions, navigation software; and so on) and possesses access to computer-related communication infrastructure, computer-related systems, electronic devices, portable or otherwise, or any combination thereof. The aforementioned terms can be, and often are, hereinafter employed interchangeably.
Furthermore, the term “service” can refer to executing a software, such as using a toolbar or web-based email engine; retrieving information (e.g., status of a pending patent application, a proposal submission, immigration process, or package delivery); purchasing goods; making a payment (e.g. mortgage, rent, student loan, credit card, car, phone, utilities, late fees); taking a class at an online school; making an appointment with an offline provider (e.g., dentist, medical doctor, lawyer, hairdresser, mechanic); or registering for an online or offline conference. It should be appreciated that this listing of services is provided as an illustration.
In the subject specification, systems and methods for an intent-compensation commercial model are provided. The model contemplates directly compensating an agent that utilizes a software application in exchange for the agent's intent in using the application, and for displaying advertisement to the agent in response to the intent. Such intent can be inferred through information received from the agent when utilizing the software application and according to the agent's privacy settings. Based on agent's intent, an advertisement is displayed and an associated software-related compensation is provided to the agent.
Compensation accumulation profiles can be established based at least in part on privacy settings determined by the agent. A single agent can determine multiple privacy settings, and such settings can be associated with multiple applications. Compensation possesses monetary value and can be facilitated through advertisement spend received by a service platform from an advertisement engine. Compensation can be directed towards (i) increasing software functionality, (ii) providing credits for training and literature related to the utilization of the application, or (iii) servicing a device in which the application is executed. The monetary aspect of the software-related compensation originated in intent-driven advertisement effectively funds the agent's software application. Next, details of the foregoing aspect as described in detail.
In order to participate in the ad-funded software initiative of service platform 130, and receive compensation 150 in exchange for intent 120 associated to utilization of software application 115, agent 110 can be required to register with service platform 130. It should be appreciated that agent 110 can sign-up for intent-based compensation at the time of accessing software application for a first time (e.g., at the time of buying a licensed copy of the application, or downloading a freeware or limited-time licensed copy), or at a later time typically within a predetermined time frame. Agent registration generally results in user intelligence associated with the agent, and can facilitate customization of compensation 150 to specific characteristics (e.g., interests) of agent 110. Depending on marketing strategy of service platform 130 and the disposition of agent 110 towards privacy, collected user intelligence can include varied demographic information (e.g., ethnic background, level of education, marital status, employer, and the like). Service platform 130 can deliver and manage compensation 150 through a compensation component 155. Typically, such compensation possesses monetary value; accordingly, an antifraud component 165 can ensure that bona fide intent is rewarded.
Antifraud component 165 can implement multiple mechanisms for fraud prevention. In an aspect, in order to account advertisement impressions towards intent-based compensation, antifraud component 165 can ensure software application 115 is actually used by agent 115 instead of an automated script (e.g., a robot) that emulated the agent. As an example, antifraud component 165 can implement variations of Turing tests to discern whether an agent 110 is utilizing software application 115. In another aspect, antifraud component can probe temporal variations of intent, as legitimate utilization of software 115 can lead to disparate intents within a specific period of time. In yet another aspect, antifraud component 165 can reduce the frequency at which an advertisement impression 140 is generated during a specific session of use of software application 115. In particular, after extended periods of continued use without response to advertisement or collection of new user intelligence, service platform 130 can substantially stop displaying advertisement, and associated software-related compensation 150.
In system 100, intent 120, advertisement display 140, and compensation 150 can be processed via an interface 170. Through forward link (FL) 175 and reverse link (RL) 178, interface 170 affords, respectively, traffic (e.g., data, control and management information) between agent 110 and service platform 130, and service platform 130 and agent 110. FL 175 and RL 179 can be substantially any type of communication link, either wired (e.g., a T-carrier like T1 phone line, an E-carrier such as an E1 phone line, a T1/E1 carrier, a T1/E1/J1 carrier, a twisted-pair link, an optical fiber, and so on) or wireless (e.g., Ultra-mobile Broadband (UMB), Long Term Evolution (LTE), Wireless Fidelity (Wi-Fi), etc.), or any combination thereof.
Service platform 130 generates advertisement through an associated advertisement engine 180. In an aspect, engine 180 can be part of a merchant which utilizes service platform 130 as an advertisement service or broker. In another aspect, advertisement engine can be an advertisement intermediary between service platform 130 and a set of disparate merchants. In yet another aspect, advertisement engine 180 can be an integral part of, and managed by, service platform 130. Furthermore, software application 115 can be developed by service platform 130, or can be distributed thereby on behalf of its developer (not shown). In either scenario, software applications, e.g., application 115, are generally stored in software store 190. Alternatively or in addition, a software application 115 can be developed, retailed and distributed through a disparate service platform.
It should be appreciated that example system 100 illustrates a commercial model that exploit synergies among the service platform 130, a software (e.g., product) developers (not shown) and distributors, as well as agent(s). By displaying intent-based advertisement in response to agent's intent, advertisement engine 180 can access a high-quality audience, which intrinsically offers the prospect(s) of increased return-on-investment. Moreover, in view of software-related compensation, agent 110 can obtain a high value by employing software applications that participate in the intent-compensation ad-funded software commercial model. In addition, by having access to an intrinsically targeted audience (e.g., user of software application 115), and associated user intelligence, service platform 130 can provide complementary services of possible interest to agent(s), thus increasing its user share.
Various aspects of associated with funding software through intent-driven advertisement are discussed next.
Interface 170 can utilize a privacy component 215 to apportion collected information 210 to generate intent. Agent 110 who participates in an intent-compensation model for funding software through advertisement can determine dynamically the level of information that is to be utilized by interface 170 to establish agent's intent. User intelligence 235 regarding agent 110 is employed by privacy component 215 to facilitate a determination of intent 120. As discussed above, user intelligence can be collected at the time of agent 110 registers to participate in an ad-funded software program. Interface 170 exploits an intelligent component 235 to infer agent's intent 120. Such intelligent component 235 generates, and relies, on data stored in a memory 235.
Intelligent component 235 can reason or draw conclusions about, e.g., infer, a current or future intent of agent 110, or generally a system that includes agent 110, based on existing information about the agent or system that includes said agent. In addition to inferring intent, intelligent component 235 can thus be employed to identify a specific context of, or action related to, the inferred intent 120. Furthermore, intelligent component 235 can generate a probability distribution of specific states of an agent, or system that includes an agent, and associated intent 120 without human intervention. To infer intent 120, intelligent component 235 relies on artificial intelligence techniques, which apply advanced mathematical algorithms—e.g., decision trees, neural networks, regression analysis, cluster analysis, genetic algorithm, and reinforced learning—to a set of available (as it can be determined by privacy component 215) information on the agent 110, or a system that include the agent.
In particular, the intelligent component 235 can employ one of numerous methodologies for learning from data and then drawing inferences from the models so constructed, e.g., Hidden Markov Models (HMMs) and related prototypical dependency models, more general probabilistic graphical models, such as Bayesian networks, e.g., created by structure search using a Bayesian model score or approximation, linear classifiers, such as support vector machines (SVMs), non-linear classifiers, such as methods referred to as “neural network” methodologies, fuzzy logic methodologies, and other approaches that perform data fusion, etc.) in accordance with implementing various automated aspects described herein.
Intent 120 can be explicit, like in instances in which agent 110 utilizes a search engine, or queries specific information in databases or merchant websites. Alternatively, intent 20 can be implicit and therefore inference-based can be necessary to determine agent's intent. As an example, a user that utilizes Microsoft® PowerPoint® and frequently access the Help engine of the application can indicate a “learning,” “training,” or “reference” intent. Such an agent can then be presented with an advertisement for literature related to Microsoft® PowerPoint®, e.g., “PowerPoint® for Dummies,” or with advertisement for PowerPoint online training or onsite training at a location near agent 110. It is to be noted that the nature of the intent-driven advertisement depends on the privacy settings established by the agent, as the degree of confidence in inferring intent is greatly influenced by available contextual information. Accordingly, intent 120 can be inferred with various degrees of confidence. The degree of confidence depends primarily on the available information extracted or gleaned from information 210. As compensation is attained through intent-based advertisement impressions, agent 110 can tune the rate at which compensation 150 is received, and also the quality of the compensation 150 that is received, by adjusting a privacy setting.
To infer user intent 120, intelligent component 235 can comprise a data miner component 335 and an analysis component 345. Data miner component can include a suite of utility application deployed by service platform in order to extract information in accordance with privacy profile 375; for instance, such utility applications can include a key logger which can be utilized when agent's privacy settings are set to low, or a monitor of data, such as tutorials downloaded from the internet in connection with software application 115. Analysis component 345 provides functionality to intelligent component and relies of data collected through data miner 345 to infer intent through semantic networks, multivariate regression, data fusion, and the like.
Additionally, concurrently with advertisement impression 410, display 130 can present a privacy indicator 440 that summarizes a current level of privacy. For example, indicia 445 can comprise a color coded level of privacy wherein darker tones indicate higher levels of privacy. It should be appreciated, notwithstanding, that substantially any suitable indicia that conveys a scale level can be employed by privacy indicator 410.
In diagram 450, an advertisement impression is conveyed through a side-to-side scrolling bar 460. Multiple ad impressions can be delivered in an ad persistence interval Δτ 470. An action-compensation indication 475 is also displayed to the agent, with substantially the same content as described above in connection with indicator 425.
It is to be noted that the receiving an ad impression in format 410 or 460, with associated indicia, can be based at least in part on available display real state in the device utilized to execute application 430. As an example, a scrolling ad impression 460, with limited or substantially absent sound and imagery, can be exploited in a cell phone display, whereas format 470 can be employed in an electronic device with a large display, such as a monitor, console, or TV display.
It should be appreciated that the intent-compensation ad-funded software model can be utilized pervasively in substantially any electronic device or combination of electronic devices that can exploit a software application for operation, or control and monitoring, and can establish communication links 175 and 178 with a service platform. As an example, a smart fridge can be combined with a PDA, or smart phone, to exploit ad-funded software in the following illustrative manner. A “scheduler/memo pad” software application (e.g., application 115) can be downloaded in the PDA from a service platform 130. As a part of the ad-funded software model, an agent (e.g., agent 110) can agree to have a portion of contents included in the “memo pad” application monitored by the service platform (e.g., by customizing a specific privacy profile 325) in exchange for receiving advertisement in the PDA and associated software-related application. As the agent utilizes the “memo pad” application to set up grocery lists, advertisements related to grocery products are presented to the agent in either a static impression 410 or a scrolling impression 460—it should be appreciated that such ads can carry active coupons for the advertised products conveyed through action indicia 425 or 475—and after a number of advertisement impressions, the agent can receive a software-related compensation containing a driver for the memo pad application that enables connectivity with a smart fridge. Through the driver, the smart fridge can convey items for a grocery list to the “memo pad” application based at least in part on availability of such item in the fridge; for instance, items bought by the agent that have packaging with RFID (radio frequency identification) tags can facilitate the fridge to monitor a stock of such items, in such a manner that when the items reach a threshold level the smart fridge can wirelessly convey to the “memo pad” application in the agent's PDA the need for said items. It is to be noted that other combinations of pervasive device utilization of the ad-funded software model can be implemented.
Diagram 550 illustrates four classes of software-related compensation that can fund a software application, or related costs, through intent-driven advertisement. As advertisement impressions are accumulated, compensation 560 can include increasing application functionality. Such functionality can comprise add-on drivers or template that simplify specific tasks, or satisfies specific needs, of an agent 110; for instance, as a result of intent-driven ad exposure the following functionalities can be added: (1) customized Microsoft® Visio® stencils (e.g., a stencil that includes Feynman diagrams, which are objects readily used in high-energy and many-body physics, or a stencil that includes elements for home design can be added to the set of available stencils in the version of Visio® that the agent utilizes); (2) a set of maps for specific regions of a fantasy world or a set of powers and health-preserving tokens in an MMOG can be included in the agent's current subscription; (3) drivers that facilitate connectivity among disparate electronic devices with wireless capabilities (similarly to those discussed above in connection with the PDA and the smart fridge), such as autonomous download of music files from a pocket computer, a digital media player such as Zune®, or smart phone to a high-fidelity stereo system, or movies to DVD players and other movie/image rendering devices, such as thin-film smart paper; (4) a library of landmarks, restaurants and diners, art galleries, hotels, coffee shops, kids museums, parks, trails, and the like can be provided for a GPS-based navigation system; (5) a translation driver to be employed for digital map reading or for vehicle navigation in a foreign country; (6) fraud alerts and online and wireless banking security add-ons; and so forth.
Additionally, compensation can also include credit for benefits such as application training 560 which can comprise online and onsite seminars and lectures; application literature 580 such as online tutorials, hardcopy and electronic books, commentaries and columns by experts, specially in sophisticated simulation applications like investment and trade simulations, data warehouse applications, digital art authoring applications; and credit for device service 590, which can include service of computers like installing and tuning spam-filters, as well as “phising” mitigation applications, setting firewalls and related security, various software installations and removal, and the like.
In view of the example systems, and associated aspects, presented and described above, methodologies for funding software through advertisement in exchange for an agent's intent that may be implemented in accordance with the disclosed subject matter can be better appreciated with reference to the flowcharts of
At step 720 an advertisement based at least in part on the established intent is displayed. In an aspect, a service platform can act as an advertisement service or broker to various merchants (e.g., online retailers, or offline merchants). Thus, based on established intent, the service platform can display a targeted ad impression. Such an ad impression can include an action cue or an instantaneous reward, such as a coupon or gift associated with the software application that is utilized by the agent generating the information that leads to the intent.
Act 730 is validation act that checks whether the established intent is fraudulent. In the affirmative case the source of the intent is flagged and multiple subsequent action can be pursued, such as monitoring the source of intent, active mitigation of fraudulent activities, counter-fraud measures such as increased number of compensation-free advertisement impressions conveyed to the source of fraud, fraud resolution, and so on. In case intent is legitimate, at act 750 a software-related compensation in exchange for the displayed intent-driven advertisement is provided. The compensation is typically delivered by adhering to a compensation accumulation profile versus advertisement impressions that can be based at least in part on privacy settings that determine a volume of information received to establish intent. In an aspect, a compensation component associated with a service platform (e.g., service platform 130) delivers the compensation. The compensation possesses monetary value and it is related to the software application that originates the received intent. In an aspect, as discussed above in connection with
At act 820 an intent based at least in part on the received information is inferred. Such an inference can be based on semantic networks, where propagation of concepts of disparate level of complexity can support an inference of an intent based on elements of the received information and assumed or known, or a combination of both, relationships are incorporated in the generation of an intent. Models utilized for intent generation can provide with a confidence metric that can reflect the extent to which a predicted intent is reliable.
At act 920 the payment for advertisement is split in two streams: a revenue stream and a compensation stream. Such a division of advertisement can fund an intent-based compensation scheme wherein software is funded through a series of compensation events in exchange for an agent's intent, and for exposure to intent-driven advertisement. Directing a fraction of ad spend can benefit both the service platform and the advertiser: (i) The service platform mitigates user attrition by directly compensating, through software-related rewards, the user with a reward of monetary value. (ii) The merchant, or advertiser, that delivers the advertisement can have access to a highly customized audience which has manifested implicitly or explicitly its intent; thus, substantially increasing the effectiveness of an advertisement campaign.
At act 930, a reward, or compensation, is delivered in response to a received, software-related intent to a compensation account associated with the source of intent. Typically, the source of intent is an agent that utilizes the software application. Moreover, the compensation can be accumulated in the compensation account until a sufficiently high level of compensation allows the agent that delivers intent to access a software-related compensation. It should be appreciated that such scenario can be identified with a forward compensation scheme, wherein compensation is build up as the intent is cumulatively received at a service platform. Alternatively, or in addition, in software-related intent-based compensation, it can be possible to provide a backward compensation, in which a specific level of compensation is provided to an agent in exchange for prospective intent to be conveyed. For example, a user buys a license of a software application that is fully functional at a discounted price (e.g., the discount is the software-related compensation); however, in order to utilize the application the user registers to receive intent-driven advertisement for a specific period of time which can typically be related to the magnitude of the provided discount.
In order to provide additional context for various aspects of the subject specification,
Generally, program modules include routines, programs, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the inventive methods can be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like, each of which can be operatively coupled to one or more associated devices.
The illustrated aspects of the specification may also be practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules can be located in both local and remote memory storage devices.
A computer typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media can comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.
Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
In
The system bus 1008 can be any of several types of bus structure that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. The system memory 1006 includes read-only memory (ROM) 1010 and random access memory (RAM) 1012. A basic input/output system (BIOS) is stored in a non-volatile memory 1010 such as ROM, EPROM, EEPROM, which BIOS contains the basic routines that help to transfer information between elements within the computer 1002, such as during start-up. The RAM 1012 can also include a high-speed RAM such as static RAM for caching data.
The computer 1002 further includes an internal hard disk drive (HDD) 1014 (e.g., EIDE, SATA), which internal hard disk drive 1014 may also be configured for external use in a suitable chassis (not shown), a magnetic floppy disk drive (FDD) 1016, (e.g., to read from or write to a removable diskette 1018) and an optical disk drive 1020, (e.g., reading a CD-ROM disk 1022 or, to read from or write to other high capacity optical media such as the DVD). The hard disk drive 1014, magnetic disk drive 1016 and optical disk drive 1020 can be connected to the system bus 1008 by a hard disk drive interface 1024, a magnetic disk drive interface 1026 and an optical drive interface 1028, respectively. The interface 1024 for external drive implementations includes at least one or both of Universal Serial Bus (USB) and IEEE 1394 interface technologies. Other external drive connection technologies are within contemplation of the subject specification.
The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For the computer 1002, the drives and media accommodate the storage of any data in a suitable digital format. Although the description of computer-readable media above refers to a HDD, a removable magnetic diskette, and a removable optical media such as a CD or DVD, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as zip drives, magnetic cassettes, flash memory cards, cartridges, and the like, may also be used in the example operating environment, and further, that any such media may contain computer-executable instructions for performing the methods of the specification.
A number of program modules can be stored in the drives and RAM 1012, including an operating system 1030, one or more application programs 1032, other program modules 1034 and program data 1036. All or portions of the operating system, applications, modules, and/or data can also be cached in the RAM 1012. It is appreciated that the specification can be implemented with various commercially available operating systems or combinations of operating systems.
A user can enter commands and information into the computer 1002 through one or more wired/wireless input devices, e.g., a keyboard 1038 and a pointing device, such as a mouse 1040. Other input devices (not shown) may include a microphone, an IR remote control, a joystick, a game pad, a stylus pen, touch screen, or the like. These and other input devices are often connected to the processing unit 1004 through an input device interface 1042 that is coupled to the system bus 1008, but can be connected by other interfaces, such as a parallel port, an IEEE 1394 serial port, a game port, a USB port, an IR interface, etc.
A monitor 1044 or other type of display device is also connected to the system bus 408 via an interface, such as a video adapter 1046. In addition to the monitor 444, a computer typically includes other peripheral output devices (not shown), such as speakers, printers, etc.
The computer 1002 may operate in a networked environment using logical connections via wired and/or wireless communications to one or more remote computers, such as a remote computer(s) 1048. The remote computer(s) 1048 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 1002, although, for purposes of brevity, only a memory/storage device 1050 is illustrated. The logical connections depicted include wired/wireless connectivity to a local area network (LAN) 1052 and/or larger networks, e.g., a wide area network (WAN) 1054. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, e.g., the Internet.
When used in a LAN networking environment, the computer 1002 is connected to the local network 1052 through a wired and/or wireless communication network interface or adapter 1056. The adapter 1056 may facilitate wired or wireless communication to the LAN 1052, which may also include a wireless access point disposed thereon for communicating with the wireless adapter 1056.
When used in a WAN networking environment, the computer 1002 can include a modem 1058, or is connected to a communications server on the WAN 1054, or has other means for establishing communications over the WAN 1054, such as by way of the Internet. The modem 1058, which can be internal or external and a wired or wireless device, is connected to the system bus 1008 via the serial port interface 1042. In a networked environment, program modules depicted relative to the computer 1002, or portions thereof, can be stored in the remote memory/storage device 1050. It will be appreciated that the network connections shown are example and other means of establishing a communications link between the computers can be used.
The computer 1002 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g., a printer, scanner, desktop and/or portable computer, portable data assistant, communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone. This includes at least Wi-Fi and Bluetooth™ wireless technologies. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
Wi-Fi, or Wireless Fidelity, allows connection to the Internet from a couch at home, a bed in a hotel room, or a conference room at work, without wires. Wi-Fi is a wireless technology similar to that used in a cell phone that enables such devices, e.g., computers, to send and receive data indoors and out; anywhere within the range of a base station. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b, g, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, or with products that contain both bands (dual band), so the networks can provide real-world performance similar to the basic 10BaseT wired Ethernet networks used in many offices.
The system 1100 also includes one or more server(s) 1104. The server(s) 1104 can also be hardware and/or software (e.g., threads, processes, computing devices). The servers 1104 can house threads to perform transformations by employing the specification, for example. One possible communication between a client 1102 and a server 1104 can be in the form of a data packet adapted to be transmitted between two or more computer processes. The data packet may include a cookie and/or associated contextual information, for example. The system 1100 includes a communication framework 1106 (e.g., a global communication network such as the Internet) that can be employed to facilitate communications between the client(s) 1102 and the server(s) 1104.
Communications can be facilitated via a wired (including optical fiber) and/or wireless technology. The client(s) 1102 are operatively connected to one or more client data store(s) 1108 that can be employed to store information local to the client(s) 1102 (e.g., cookie(s) and/or associated contextual information). Similarly, the server(s) 1104 are operatively connected to one or more server data store(s) 1110 that can be employed to store information local to the servers 1104.
Various aspects or features described herein may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks [e.g., compact disk (CD), digital versatile disk (DVD) . . . ], smart cards, and flash memory devices (e.g., card, stick, key drive . . . ).
What has been described above includes examples of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Accordingly, the claimed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the terms “includes,” “possesses,” and the like are used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.