Composite graphical interface with shareable data-objects

Information

  • Patent Grant
  • 10437612
  • Patent Number
    10,437,612
  • Date Filed
    Thursday, February 2, 2017
    7 years ago
  • Date Issued
    Tuesday, October 8, 2019
    5 years ago
Abstract
Aspects of the present disclosure involve receiving references to application data of applications hosted by the servers. The application data includes information defining an interface of the application (e.g., a set of interface elements), and data types associated with the application. As a part of the process for generating a composite graphical user interface (GUI), the composite interface system receives references to application data of one or more applications at various memory locations (e.g., at both local and third-party servers). In this way, the composite interface system accesses the application data of any referenced application in order to retrieve application data to configure a composite GUI which includes interface elements of each of the referenced application.
Description
TECHNICAL FIELD

The subject matter disclosed herein relates to the seamless sharing of data object across multiple application platforms. In particular, example embodiments relate to a composite interface system for generating a composite graphical user interface, and facilitating the sharing of data objects across multiple platforms in a computer network environment, through the composite graphical user interface.


BACKGROUND

In an effort to create specialized and independent products, developers have developed a multitude of unique applications for computer systems, configured to perform a vast array of functions quickly and effectively. However, in pressing for this isolated application development model, some of the advantages of monolithic products and applications have been abandoned—namely, seamless user experience, and data sharing. Applications of computer systems utilize a variety of different file and data types, to perform distinct functions which are often unique to a particular application or system. Additionally, the applications themselves have corresponding user interfaces, with interface elements unique to themselves, and specially configured to facilitate access to certain data types.


As a result, user experience between applications tends to be choppy and jarring, with little to no continuity. Furthermore, data types are often incompatible between applications. These issues lead to a disconnected and problematic user experience.





BRIEF DESCRIPTION OF THE DRAWINGS

Various ones of the appended drawings merely illustrate example embodiments of the present disclosure and are not intended to limit its scope to the illustrated embodiments. On the contrary, these examples are intended to cover alternatives, modifications, and equivalents as may be included within the scope of the disclosure.



FIG. 1 is a network diagram depicting a network system comprising a group of application servers in communication with a network-based composite interface system configured for receiving references to application data and generating a composite graphical user interface, according to an example embodiment.



FIG. 2 is a block diagram illustrating various components of the composite interface system, which is provided as part of the network system, consistent with some embodiments.



FIG. 3 is a flowchart illustrating a method for generating a composite graphical user interface, according to some example embodiments.



FIG. 4 is a flowchart, illustrating a method for displaying a set of interface elements, consistent with some embodiments.



FIG. 5 is a flowchart, illustrating a method of generating and sharing a project, consistent with some embodiments.



FIG. 6 is an interface diagram illustrating a composite graphical user interface displaying a set of artifacts, consistent with some embodiments.



FIG. 7 is an interface diagram illustrating a composite graphical user interface displaying a set of artifacts, consistent with some embodiments.



FIG. 8 is an illustration of the various components of a composite user interface, consistent with some embodiments.



FIG. 9 is a diagrammatic representation of a machine in the example form of a computer system within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein may be executed.





DETAILED DESCRIPTION

Reference will now be made in detail to specific example embodiments for carrying out the inventive subject matter of the present disclosure. In the following description, specific details are set forth in order to provide a thorough understanding of the subject matter. It shall be appreciated that embodiments may be practiced without some or all of these specific details.


Example embodiments relate to a network-based composite interface system, employed for generating a composite graphical user interface (GUI) based on interface elements of referenced applications, to facilitate the sharing of data objects across those applications. A “data object” as used herein may include any item of data or code that can be used by one or more computer programs to execute operations. “Application data” refers to data associated with an application, including, for example, configuration files to configure the parameters and initial settings of applications, as well as application program interfaces (API) associated with the applications. In example embodiments, the data is stored in one or more network databases and are capable of being accessed by applications hosted by servers that share common access to the network database, through the composite graphical user interface. Additional details regarding data objects can be found in U.S. Provisional Application No. 62,272,003 entitled “NETWORK-BASED PERMISSIONING SYSTEM,” assigned to the assignee of the instant application, which application is hereby incorporated by reference in its entirety.


Aspects of the present disclosure involve receiving references to application data of applications hosted by the servers. As briefly stated above, the application data includes the set of routines, protocols, and tools for building an application, and the interface of the application. Additionally, the application data may also refer to specific data types associated with the application. Thus, the application data is essentially a description for a computer of how to build a particular application (including its functionality). As a part of the process for generating a composite GUI, the composite interface system receives references to application data of one or more applications at various memory locations (e.g., at both local and third-party servers, as well as cloud servers). In this way, the composite interface system may access the application data of any referenced application in order to configure a composite GUI which includes interface elements of the referenced application (e.g., interface elements and locations of the interface elements within a GUI).


Accordingly, having received the references to the application data, the composite interface system generates and presents a composite GUI at a client device. The composite GUI includes the interface elements of the referenced application, and thereby facilitates the execution of functions and operations performed by the application, without the client device necessarily having direct access or compatibility to the functions of the application itself. In some embodiments, the composite interface system is configured to cause one or more processors of the client device to generate the composite interface.


A portion of the composite GUI generated by the composite interface system includes a sidebar configured to display a graphical element (or elements) representative of the referenced applications. The composite GUI may receive inputs from a client device through the sidebar (e.g., a selection of a graphical element), to launch and cause display of interface elements associated with referenced applications.


Once the composite GUI has been generated and displayed at the client device, the composite interface system receives a selection of a data object from the client device. The data object may be located at a third party server, a local database, or at the client device itself. Having received a selection of the data object, the composite interface system identifies an object type of the data object in order to determine a compatible application to access. After determining the compatible application, the composite interface system access the application data of the compatible application to retrieve the information defining the interface of the application, and causes display of the interface elements of the application within the composite GUI. Thus, a user of the client device may have access to interfaces and functionality of multiple applications through a single composite GUI.


In some embodiments, in order to facilitate sharing of data objects between applications, the composite interface system employs a method of creating and storing artifacts which reference individual data objects of the application (or applications) referenced to the composite GUI. Artifacts are structured and accessed depending on what the base application specifies. An artifact is a reference to a particular data object (or instance of a data object). For example, the referenced application has a data object associated with it, and the data object itself has a number of data attributes surrounding it. The data attributes include, for example, user permissions, a data type identifier, a search instance identifier, a source identifier, and a specific ID of the data object itself.


Having received a selection of a particular data object, the composite interface system creates an artifact referencing the data object. The artifact includes metadata associated with the data object, and formatted by the composite interface system. For example, the composite interface system may include an artifact repository for the discovery, organization, and collection of artifacts, to enable collaborative project development by facilitating the creation and sharing of projects comprising one or more artifacts.


In some example embodiments, the composite interface system provides a publish-subscribe type messaging service, where users may define projects within the composite graphical user interface by selecting one or more artifacts to include in a project, and automatically distribute the project to groups of subscribers. For example, a user of the client device may search the set of artifacts displayed at the client device via a search field within the composite GUI. The composite interface system may then remove at least a portion of artifacts from the set of artifacts based on the search, leaving a presentation of only relevant artifacts. The user may then select one or more artifacts from among the remaining artifacts to assign to a project. Having defined a project, the user may then distribute the project to a subscriber or group of subscribers.



FIG. 1 is a network diagram illustrating a network environment 100 suitable for operating a composite interface system 150. A networked system 102 provides server-side functionality, via a network 104 (e.g., an intranet, the Internet or a Wide Area Network (WAN)), to one or more clients such as the client device 110. FIG. 1 illustrates a web client 112, client applications 114 executing on respective client device 110.


An Application Program Interface (API) server 120 and a web server 122 are coupled to, and provide programmatic and web interfaces respectively to, one or more application servers 140. The application servers 140 host the composite interface system 150. The application servers 140 are, in turn, shown to be coupled to one or more database servers 124 that facilitate access to one or more databases 126.


A composite interface system 150 facilitates the creation of composite GUI and sharable artifacts for the networked system 102. For example, the composite interface system 150 is configured to receive references to application data from a client device 110, and generate a composite GUI based on the referenced application data.


As shown, the network environment 100 includes the client device 110 in communication with the networked system 102 over the network 104. The networked system 102 communicates and exchanges data with the client device 110 that pertains to various functions and aspects associated with the networked system 102 and its users. Likewise, the client device 110, which may be any of a variety of types of devices that include at least a display, a processor, and communication capabilities that provide access to the network 104 (e.g., a smart phone, a tablet computer, a personal digital assistant (PDA), a personal navigation device (PND), a handheld computer, a desktop computer, a laptop or netbook, or a wearable computing device), may be operated by a user (e.g., a person) of the network system 100 to exchange data with the presentation platform 104 over the network 106.


The client device 110 communicates with the network 104 via a wired or wireless connection. For example, one or more portions of the network 104 may comprises an ad hoc network, an intranet, an extranet, a Virtual Private Network (VPN), a Local Area Network (LAN), a wireless LAN (WLAN), a Wide Area Network (WAN), a wireless WAN (WWAN), a Metropolitan Area Network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, a wireless network, a Wireless Fidelity (Wi-Fi®) network, a Worldwide Interoperability for Microwave Access (WiMax) network, another type of network, or any suitable combination thereof.


In various embodiments, the data exchanged between the client device 110 and the networked system 102 may involve user-selected functions available through one or more user interfaces (UIs). The UIs may be specifically associated with a web client 112 (e.g., a browser) or an application 114, executing on the client device 110, and in communication with the presentation platform 102.


Turning specifically to the networked system 102, a web server 122 is coupled to (e.g., via wired or wireless interfaces), and provides web interfaces to, an application server 140. In some embodiments, the composite interface system 150 runs and executes on the application server 140, while in other embodiments, the application server 140 provides the client device 110 with a set of instructions (e.g., computer-readable code) that causes the web client 112 and the client application 114 of the client device 110 to execute and run the composite interface system 150.



FIG. 2 is a block diagram illustrating various components of the composite interface system 150, which is provided as part of the network system 102, consistent with some embodiments. To avoid obscuring the inventive subject matter with unnecessary detail, various functional components (e.g., modules and engines) that are not germane to conveying an understanding of the inventive subject matter have been omitted from FIG. 2. However, a skilled artisan will readily recognize that various additional functional components may be supported by the composite interface system 150 to facilitate additional functionality that is not specifically described herein.


As is understood by skilled artisans in the relevant computer arts, each functional component (e.g., module) illustrated in FIG. 2 may be implemented using hardware (e.g., a processor of a machine) or a combination of logic (e.g., executable software instructions) and hardware (e.g., memory and processor of a machine) for executing the logic. Furthermore, one or more of the various functional components depicted in FIG. 2 may reside on a single computer (e.g., a laptop, client device 110), or may be distributed across several computers in various arrangements such as cloud-based architectures. In some embodiments, modules of the composite interface system 150 may be distributed between the client device 110 and application server 140. Moreover, it shall be appreciated that while the functional components (e.g., modules) of FIG. 2 are discussed in the singular sense, in other embodiments, multiple instances of one or more of the modules may be employed.


The composite interface system 150 is shown as including an artifact module 210, a composite interface module 220, a notification module 230, and a permissions module 240, all configured to communicate with each other (e.g., via a bus, shared memory, a switch, or application programming interfaces (APIs)).


The artifact module 210 facilitates discovery, organization and collection of artifacts and to enable collaborative project development. The artifact module 210 creates artifacts based on metadata of identified data objects (e.g., by the artifact module 210 itself, or via user selection). An artifact is a reference to a data object, crated based on metadata associated with the data object. For example, a data object may have metadata which includes data defining a source of the data object, user permissions of the data object, a unique identifier of the data object, a data type of the data object, and so on. Upon identifying the data object, the artifact module 210 creates an artifact for the data object with the metadata. Having created an artifact, the artifact module 210 may store the artifact within an artifact repository, along with a set of artifacts.


In some embodiments, the artifact module 210 facilitates the creation, editing, and exporting of projects. In the context of this specification, a project is a sharable object comprising one or more artifacts. For example, the artifact module 210 may receive a selection of one or more artifacts through a composite GUI presented at a client device, and assign the selection of artifacts to a project. The artifact module 210 may additionally assign a project identifier (e.g., project ID) to the project.


The composite interface module 220 receives references to application data, extracts interface data defining interface elements from the application data, and generates a composite GUI based on the application data. The application data may include an identifier of the application, a network address of the application, and interface data defining an interface of the application. The composite interface module 220 may reside server side (e.g., within the application server 140), or in some embodiments may reside client side (e.g., within the client device 110), such that the generation of the composite GUI is accomplished by one or more processors of the client device 110.


In some example embodiments, the composite interface module 220 receives a set of references to multiple sets of application data, and in response to receiving an instruction to generate a composite GUI, generates a composite GUI based on the referenced application data. The composite GUI includes a presentation of interface elements from each of the applications associated with the set of application data received. For example, in response to receiving a reference to application data, the composite interface module 220 may generate and cause display of a graphical icon representative of the application data at a location within the composite GUI, such that selection of the graphical icon causes the composite interface module 220 to display the interface elements associated with the selected graphical element.


In further example embodiments, a portion of the composite GUI created by the composite interface module 220 includes a sidebar containing a presentation of the graphical icons associated with each of the referenced applications. For example, the sidebar may include an application icon, such that selection of the application icon results in display of a window which includes an arrangement of the graphical icons. A user may select one or more of the graphical icons from the display window in order to cause display of the corresponding interface elements associated with each referenced application. In some embodiments, the composite interface module 220 communicates the selection of the graphical icon to the artifact module 210, and in response to receiving the selection, the artifact module 210 causes display of an assortment of artifacts referencing data objects associated with the selected graphical icon. The assortment of graphical icons may be presented as a sortable list within the composite GUI.


The notification module 230 provides publish-subscribe type messaging capability, to automatically distribute projects defined by a user within the composite graphical user interface (e.g., by selecting one or more artifacts to include in a project) to a group of subscribers. For example, upon receiving a project definition (i.e., a set of artifacts selected and assigned to the project), the notification module 230 identifies a subscription request from a referenced application. The subscription request may include one or more user identifiers with various network addresses to receive the project (and corresponding artifacts).


The notification module 230 distributes the project to the application. Upon receipt of the project, the application may access the data objects associated the project through the associated artifacts. For example, upon receipt of the projects, the applications may extract the artifacts, and access the data objects associated with the artifacts through the composite interface system 150. In this way, an application itself doesn't have to know how to read a particular data type itself, but can instead rely on the composite interface system 150 to retrieve and access the data based on the artifact.


The permissions module 240 is configured to evaluate and determine user access permissions with respect to data objects referenced by artifacts in the composite interface system 150. The evaluation of user access permissions, in most instances, is triggered by receipt of an access request received via an API from a referenced application supported by the composite interface system 150. The access request includes a data resource identifier corresponding to the data object for which access is being requested, and a user identifier corresponding to the requesting user. In some instances, the access request may further include one or more filters identifying one or more particular operations or sets of operations that are of interest.



FIG. 3 is a flow-chart illustrating a method 300 for generating and causing display of a composite GUI at a client device, according to some example embodiments. The method 300 is embodied in computer-readable instructions for execution by one or more processors such that the operations of the method 300 are performed in part or in whole by the network-based composite interface system 150; accordingly, the method 300 is described below by way of example with reference thereto. However, it shall be appreciated that at least some of the operations of the method 300 may be deployed on various other hardware configurations, and the method 300 is not intended to be limited to the network-based composite interface system 150.


At operation 310, the composite interface module 220 receives a reference to application data of an application. For example, the composite interface module 220 may provide a set of computer-readable instructions to the client device 110 that causes the client device 110 to display an application reference interface. The user 106 may thereby provide references to application data of applications to be included within the composite GUI generated by the composite interface system 150. In some embodiments, in response to receiving the reference to the application data, the artifact module 210 identifies data objects associated with the referenced application and creates one or more artifacts based on the metadata of the data objects.


At operation 320, the composite interface module 220 receives an instruction to generate a composite GUI, and in response, generates a composite GUI which includes the interface elements of the referenced application. A portion of the composite GUI may include a sidebar in which a graphical icon representing the referenced application data is displayed. In some example embodiments, the sidebar may include an application icon, which a user may select, and in response to receiving a selection of the application icon, the composite interface module 220 may cause display of a window which includes one or more graphical icons associated with referenced applications (e.g., such that selection of the graphical icon results in display of interface elements of a referenced application).


In further example embodiments, the composite GUI includes a presentation of a listing of artifacts associated with the referenced application data. For example, responsive to receiving the reference to the application data, the artifact module 210 creates one or more artifacts based on the referenced application data, and stores the artifacts within an artifact repository (e.g., database 126). Thus, at operation 320, when the composite interface module 220 generates the composite GUI based on the application data, the composite interface module 220 may access the artifact repository to retrieve the set of artifacts associated with the application.


At operation 330, the composite interface module 220 causes display of the composite GUI at a client device (e.g., client device 110). In some embodiments, the permissions module 240 may identify user access permissions associated with a user identifier associated with the client device 110, and cause display of the composite GUI based on the determined user permissions. For example, a user may not have access to an entire set of artifacts based on their user permissions. Upon determining the user permissions of the user identifier, the permissions module 240 removes artifacts which are inaccessible to the user identifier, and presents only those artifacts which the user permissions allow.



FIG. 4 is a flow-chart illustrating a method 400 for causing display of a set of interface elements associated with a referenced application based on a selection of an artifact, according to some example embodiments. The method 400 is embodied in computer-readable instructions for execution by one or more processors such that the operations of the method 400 are performed in part or in whole by the network-based composite interface system 150; accordingly, the method 400 is described below by way of example with reference thereto. However, it shall be appreciated that at least some of the operations of the method 400 may be deployed on various other hardware configurations, and the method 400 is not intended to be limited to the network-based composite interface system 150.


At operation 410, the composite interface module 220 receives a selection of an artifact from a client device 110. For example, the composite GUI may include a set of artifacts associated with referenced applications. The set of artifacts may be presented in a user defined sort order (e.g., through a selection of an attribute), based on metadata associated with the artifact.


At operation 420, in response to receiving a selection of the artifact at the client device 110, the composite interface module 220 identifies the referenced application associated with the artifact and causes display of the interface elements of the identified application.



FIG. 5 is a flow-chart illustrating a method 500 for distributing a project based on a subscription request, according to some example embodiments. The method 500 is embodied in computer-readable instructions for execution by one or more processors such that the operations of the method 500 are performed in part or in whole by the network-based composite interface system 150; accordingly, the method 500 is described below by way of example with reference thereto. However, it shall be appreciated that at least some of the operations of the method 500 may be deployed on various other hardware configurations, and the method 500 is not intended to be limited to the network-based composite interface system 150.


Many applications or services need long-running calls and a scheme for pushing data to the front-end, and in some cases, backend services may need to communicate with unrelated or incompatible front-ends (e.g. pushing data from one referenced application to another referenced application). The front-end refers to the portion of an application which users interact with, while the back-end refers to the resources of the application configured to service and provide functionality to the front-end. The front-end of one application may not necessarily be compatible with the back-end of another application. The composite GUI generated by the composite interface system 150 therefore provides a general communications channel between the back-end of a referenced application and a front-end of another referenced application, and as such provides a way to address messages to reach the front-end via the use of projects (e.g., sets of artifacts).


At operation 510, the notification module 230 receives a subscription request from a referenced application. The subscription request includes an application identifier of the subscribing application, and a user identifier of a subscribing user. The subscription request may also include a data type.


At operation 520, the artifact module 210 receives a selection of one or more artifacts at the client device 110. For example, a user 106 may select one or more artifacts among a set of artifacts displayed in the composite GUI at the client device 110.


At operation 530, the artifact module 210 receives a request from the client device 110 to assign the selected artifacts to a project. In response to receiving the request to assign the selected artifacts to a project, the artifact module 210 generates a project which includes the selected artifacts.


At operation 540, the notification module 230 distributes the project based on the subscription request, to the referenced application. The referenced application may then notify the subscribing user (e.g., based on the user identifier) of the project. The requesting application may then access then artifacts through the project, and cause display of the data objects associated with the artifacts through the composite GUI.


As an example of the composite GUI generated by the composite interface module 220, FIG. 6 is an interface diagram illustrating a composite GUI 600 for displaying interface elements of a referenced application, according to some example embodiments. As shown, the composite GUI 600 includes a sidebar 610, an application window 620, the application window 620 including a set of graphical icons representing referenced applications (e.g., graphical icon 630), a cursor 640 to make selections within the composite GUI 600, a referenced application interface 650, and a set of interface elements 660, of the referenced application.


For example, in response to receiving the reference to the application data, as in operation 310 of FIG. 3, the composite interface module 220 creates a graphical icon 630 to display within the sidebar 610. As shown in FIG. 6, the sidebar may also include an application icon 670, which a user 106 may select with the cursor 640 to display the application window 620, which includes a set of graphical icons, such as graphical icon 630, representative of referenced applications. Upon receiving a selection of the graphical icon 630, the composite interface module 220 causes display of the associated interface (e.g., interface 650), and its interface elements 660.


As an example of the composite GUI generated by the composite interface module 220, FIG. 7 is an interface diagram illustrating the composite GUI 600 for displaying a set of artifacts to create a sharable project, according to some example embodiments. As shown, the composite GUI 600 is shown to include a set of artifacts 710, a graphical icon identifying an application type 720, a search field 730, a project creation window 740, and the cursor 640.


In some embodiments, the composite GUI 600 displays a set of artifacts associated with the referenced applications (e.g., set of artifacts 710). A user 106 may select an artifact (e.g., artifact 750) with the cursor 640. In response to receiving the selection of the artifact 750, the composite GUI 600 causes display of a project creation window 740. The project creation window 740 includes a set of options to share the artifact in a project or to an individual or group of individuals based on a user identifier or set of user identifiers provided by the user 106, or to duplicate, rename, or convert the artifact into another format or data type. For example, as in operation 520 of FIG. 5, a user 106 may select the artifact 750 to assign the artifact 750 to a project, which may then be distributed to a subscriber or subscriber list.


The composite GUI 600 is also shown to include a search field 730. A user 106 may enter a search term into the search field 730, and in response to receiving the search term, the artifact module 210 may present relevant artifacts within the composite GUI 600.



FIG. 8 is an illustration of the composite interface system 150, a set of applications 810, and a composite user interface 820, generated by the composite interface system 150, based on the applications 810. The applications 810 may be located at both local (e.g., databases 126) and third-party servers, as well as cloud servers. The composite interface system 150 receives references to the applications 810 (e.g., App. 1, App. 2, App. 3, App. 4), and generate the composite user interface 820, based on interface elements from the set of applications 810.



FIG. 9 is a diagrammatic representation of a machine in the example form of a computer system within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein may be executed. Specifically, FIG. 9 shows a diagrammatic representation of the machine 900 in the example form of a system, within which instructions 902 (e.g., software, a program, an application, an applet, an app, a driver, or other executable code) for causing the machine 900 to perform any one or more of the methodologies discussed herein may be executed. For example, the instructions 902 include executable code that causes the machine 900 to execute the methods 400 and 500. In this way, these instructions 902 transform the general, non-programmed machine into a particular machine programmed to carry out the described and illustrated functions in the manner described herein. The machine 900 may operate as a standalone device or may be coupled (e.g., networked) to other machines.


By way of non-limiting example, the machine 900 may comprise or correspond to a television, a computer (e.g., a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, or a netbook), a set-top box (STB), a personal digital assistant (PDA), an entertainment media system (e.g., an audio/video receiver), a cellular telephone, a smart phone, a mobile device, a wearable device (e.g., a smart watch), a portable media player, or any machine capable of outputting audio signals and capable of executing the instructions 902, sequentially or otherwise, that specify actions to be taken by machine 900. Further, while only a single machine 900 is illustrated, the term “machine” shall also be taken to include a collection of machines 900 that individually or jointly execute the instructions 902 to perform any one or more of the methodologies discussed herein.


The machine 900 may include processors 904, memory 906, storage unit 908 and I/O components 910, which may be configured to communicate with each other such as via a bus 912. In an example embodiment, the processors 904 (e.g., a central processing unit (CPU), a reduced instruction set computing (RISC) processor, a complex instruction set computing (CISC) processor, a graphics processing unit (GPU), a digital signal processor (DSP), an application specific integrated circuit (ASIC), a radio-frequency integrated circuit (RFIC), another processor, or any suitable combination thereof) may include, for example, processor 914 and processor 916 that may execute instructions 902. The term “processor” is intended to include multi-core processors that may comprise two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously. Although FIG. 9 shows multiple processors, the machine 900 may include a single processor with a single core, a single processor with multiple cores (e.g., a multi-core processor), multiple processors with a single core, multiple processors with multiples cores, or any combination thereof.


The memory 906 (e.g., a main memory or other memory storage) and the storage unit 908 are both accessible to the processors 904 such as via the bus 912. The memory 906 and the storage unit 908 store the instructions 902 embodying any one or more of the methodologies or functions described herein. In some embodiments, the databases 126 resides on the storage unit 908. The instructions 902 may also reside, completely or partially, within the memory 906, within the storage unit 908, within at least one of the processors 904 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 900. Accordingly, the memory 906, the storage unit 908, and the memory of processors 904 are examples of machine-readable media.


As used herein, “machine-readable medium” means a device able to store instructions and data temporarily or permanently and may include, but is not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, optical media, magnetic media, cache memory, other types of storage (e.g., erasable programmable read-only memory (EEPROM)), or any suitable combination thereof. The term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions 902. The term “machine-readable medium” shall also be taken to include any medium, or combination of multiple media, that is capable of storing instructions (e.g., instructions 902) for execution by a machine (e.g., machine 900), such that the instructions, when executed by one or more processors of the machine 900 (e.g., processors 904), cause the machine 900 to perform any one or more of the methodologies described herein (e.g., methods 400 and 500). Accordingly, a “machine-readable medium” refers to a single storage apparatus or device, as well as “cloud-based” storage systems or storage networks that include multiple storage apparatus or devices. The term “machine-readable medium” excludes signals per se.


Furthermore, the “machine-readable medium” is non-transitory in that it does not embody a propagating signal. However, labeling the tangible machine-readable medium as “non-transitory” should not be construed to mean that the medium is incapable of movement—the medium should be considered as being transportable from one real-world location to another. Additionally, since the machine-readable medium is tangible, the medium may be considered to be a machine-readable device.


The I/O components 910 may include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. The specific I/O components 910 that are included in a particular machine will depend on the type of machine. For example, portable machines such as mobile phones will likely include a touch input device or other such input mechanisms, while a headless server machine will likely not include such a touch input device. It will be appreciated that the I/O components 910 may include many other components that are not specifically shown in FIG. 9. The I/O components 910 are grouped according to functionality merely for simplifying the following discussion and the grouping is in no way limiting. In various example embodiments, the I/O components 910 may include input components 918 and output components 920. The input components 918 may include alphanumeric input components (e.g., a keyboard, a touch screen configured to receive alphanumeric input, a photo-optical keyboard, or other alphanumeric input components), point based input components (e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, or other pointing instrument), tactile input components (e.g., a physical button, a touch screen that provides location and/or force of touches or touch gestures, or other tactile input components), audio input components, and the like. The output components 920 may include visual components (e.g., a display such as a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)), acoustic components (e.g., speakers), haptic components (e.g., a vibratory motor, resistance mechanisms), other signal generators, and so forth.


Communication may be implemented using a wide variety of technologies. The I/O components 910 may include communication components 922 operable to couple the machine 900 to a network 924 or devices 926 via coupling 928 and coupling 930, respectively. For example, the communication components 922 may include a network interface component or other suitable device to interface with the network 924. In further examples, communication components 922 may include wired communication components, wireless communication components, cellular communication components, near field communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. The devices 926 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a Universal Serial Bus (USB)).


Modules, Components and Logic


Certain embodiments are described herein as including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied on a machine-readable medium or in a transmission signal) or hardware modules. A hardware module is a tangible unit capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client, or server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein.


In various embodiments, a hardware module may be implemented mechanically or electronically. For example, a hardware module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field-programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.


Accordingly, the term “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired) or temporarily configured (e.g., programmed) to operate in a certain manner and/or to perform certain operations described herein. Considering embodiments in which hardware modules are temporarily configured (e.g., programmed), each of the hardware modules need not be configured or instantiated at any one instance in time. For example, where the hardware modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware modules at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.


Hardware modules can provide information to, and receive information from, other hardware modules. Accordingly, the described hardware modules may be regarded as being communicatively coupled. Where multiple of such hardware modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses that connect the hardware modules). In embodiments in which multiple hardware modules are configured or instantiated at different times, communications between such hardware modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware modules have access. For example, one hardware module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).


The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules.


Similarly, the methods described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or a server farm), while in other embodiments the processors may be distributed across a number of locations.


The one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., APIs).


Electronic Apparatus and System


Example embodiments may be implemented in digital electronic circuitry, or in computer hardware, firmware, or software, or in combinations of them. Example embodiments may be implemented using a computer program product, for example, a computer program tangibly embodied in an information carrier, for example, in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, for example, a programmable processor, a computer, or multiple computers.


A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site, or distributed across multiple sites and interconnected by a communication network.


In example embodiments, operations may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Method operations can also be performed by, and apparatus of example embodiments may be implemented as, special purpose logic circuitry (e.g., an FPGA or an ASIC).


The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In embodiments deploying a programmable computing system, it will be appreciated that both hardware and software architectures merit consideration. Specifically, it will be appreciated that the choice of whether to implement certain functionality in permanently configured hardware (e.g., an ASIC), in temporarily configured hardware (e.g., a combination of software and a programmable processor), or in a combination of permanently and temporarily configured hardware may be a design choice. Below are set out hardware (e.g., machine) and software architectures that may be deployed, in various example embodiments.


Language


Although the embodiments of the present invention have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader scope of the inventive subject matter. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. The accompanying drawings that form a part hereof show, by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced. The embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be used and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.


Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent, to those of skill in the art, upon reviewing the above description.


All publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated references should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.


In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of “at least one” or “one or more.” In this document, the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. In the appended claims, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein.” Also, in the following claims, the terms “including” and “comprising” are open-ended; that is, a system, device, article, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim.

Claims
  • 1. A system comprising: one or more processors of a machine; anda memory storing instructions that, when executed by at least one processor among the processors, causes the system to perform operations comprising: receiving, at a server system, a reference to application data of an application, wherein the application data includes interface elements of the application and a set of instructions to execute a function of the application;causing display of a composite graphical user interface (GUI) at a display of a client device, the composite GUI including a sidebar element displayed at a portion of the display of the client device, the sidebar element including a presentation of a graphical icon representative of the application;receiving, at the server system, a selection of the graphical element from the client device;updating the display of the composite GUI at the client device to include the interface elements of the application, in response to the receiving the selection;accessing a data repository associated with the application, the data repository including a data object that comprises data attributes;generating an artifact based on the data object at the client device, the artifact comprising a reference to a location of the data object within the data repository; andcausing display of the artifact with the composite GUI based on at least the data attributes of the data object.
  • 2. The system of claim 1, wherein the instructions cause the system to perform operations further comprising: causing the client device to perform the function of the application based on the set of instructions.
  • 3. The system of claim 1, wherein the application data indicates a compatible data type, and the instructions cause the system to perform operations further comprising: receiving, at the server system, a data object of the compatible data type indicated by the application data;determining the data object is of the compatible data type; andpresenting the data object within the composite GUI based on the set of instructions of the application data.
  • 4. The system of claim 1, wherein the reference is a first reference, the application is a first application, the application data is a first application data, the interface elements are a first set of interface elements, the graphical icon is a first graphical icon, and the set of instructions is a first set of instructions to execute the first application, and the instructions cause the system to perform operations further comprising: receiving a second reference to a second application data of a second application, the second application data including a second set of interface elements of the second application and a second set of instructions to execute a second function of the second application;updating the sidebar element to include a second graphical icon and the first graphical icon, wherein the second graphical icon represents the second application;receiving a selection of the second graphical element from the client device; andupdating the composite GUI to include the second set of interface elements of the second application.
  • 5. The system of claim 4, wherein the data attributes include a data type identifier of the data object, and the instructions cause the system to perform operation further comprising: receiving a selection of the artifact from the client device;retrieving the data attributes of the artifact from the data repository, in response to the receiving the selection of the artifact;determining a data type of the data object referenced by the artifact based on the data type identifier of the data attributes of the data object; andpresenting the data object within the composite GUI based on the data type.
  • 6. The system of claim 1, wherein the data attributes include a data type identifier of the data object, an identifier of the data object, and a user permission of the data object.
  • 7. The system of claim 1, wherein the data attributes include a data type identifier of the data object, and the instructions cause the system to perform operation further comprising: receiving a request to assign the artifact to a project from the client device;receiving a distribution list that includes a set of network addresses of a set of client devices; anddistributing the project to the set of client devices.
  • 8. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising: receiving, at a server system, a reference to application data of an application, wherein the application data includes interface elements of the application and a set of instructions to execute a function of the application;causing display of a composite graphical user interface (GUI) at a display of a client device, the composite GUI including a sidebar element displayed at a portion of the display of the client device, the sidebar element including a presentation of a graphical icon representative of the application;receiving, at the server system, a selection of the graphical element from the client device;updating the display of the composite GUI at the client device to include the interface elements of the application, in response to the receiving the selection;accessing a data repository associated with the application, the data repository including a data object that comprises data attributes;generating an artifact based on the data object at the client device, the artifact comprising a reference to a location of the data object within the data repository; andcausing display of the artifact with the composite GUI based on at least the data attributes of the data object.
  • 9. The non-transitory machine-readable storage medium of claim 8, wherein the instructions further comprise: causing the client device to perform the function of the application based on the set of instructions.
  • 10. The non-transitory machine-readable storage medium of claim 8, wherein the application data indicates a compatible data type, and the instructions further comprise: receiving, at the server system, a data object of the compatible data type indicated by the application data;determining the data object is of the compatible data type; andpresenting the data object within the composite GUI based on the set of instructions of the application data.
  • 11. The non-transitory machine-readable storage medium of claim 8, wherein the reference is a first reference, the application is a first application, the application data is a first application data, the interface elements are a first set of interface elements, the graphical icon is a first graphical icon, and the set of instructions is a first set of instructions to execute the first application, and the instructions further comprise: receiving a second reference to a second application data of a second application, the second application data including a second set of interface elements of the second application and a second set of instructions to execute a second function of the second application;updating the sidebar element to include a second graphical icon and the first graphical icon, wherein the second graphical icon represents the second application;receiving a selection of the second graphical element from the client device; andupdating the composite GUI to include the second set of interface elements of the second application.
  • 12. The non-transitory machine-readable storage medium of claim 8, wherein the data attributes include a data type identifier of the data object, an identifier of the data object, and a user permission of the data object.
  • 13. The non-transitory machine-readable storage medium of claim 8, wherein the data attributes include a data type identifier of the data object, and the instructions further comprise: receiving a selection of the artifact from the client device;retrieving the data attributes of the artifact from the data repository, in response to the receiving the selection of the artifact;determining a data type of the data object referenced by the artifact based on the data type identifier of the data attributes of the data object; andpresenting the data object within the composite GUI based on the data type.
  • 14. A method comprising: receiving, at a server system, a reference to application data of an application, wherein the application data includes interface elements of the application and a set of instructions to execute a function of the application;causing display of a composite graphical user interface (GUI) at a display of a client device, the composite GUI including a sidebar element displayed at a portion of the display of the client device, the sidebar element including a presentation of a graphical icon representative of the application;receiving, at the server system, a selection of the graphical element from the client device;updating the display of the composite GUI at the client device to include the interface elements of the application, in response to the receiving the selection;accessing a data repository associated with the application, the data repository including a data object that comprises data attributes;generating an artifact based on the data object at the client device, the artifact comprising a reference to a location of the data object within the data repository; andcausing display of the artifact with the composite GUI based on at least the data attributes of the data object.
  • 15. The method of claim 14, wherein the method further comprises: causing the client device to perform the function of the application based on the set of instructions.
  • 16. The method of claim 14, wherein the application data indicates a compatible data type, and the method further comprises: receiving, at the server system, a data object of the compatible data type indicated by the application data;determining the data object is of the compatible data type; andpresenting the data object within the composite GUI based on the set of instructions of the application data.
  • 17. The method of claim 14, wherein the reference is a first reference, the application is a first application, the application data is a first application data, the interface elements are a first set of interface elements, the graphical icon is a first graphical icon, and the set of instructions is a first set of instructions to execute the first application, and the method further comprises: receiving a second reference to a second application data of a second application, the second application data including a second set of interface elements of the second application and a second set of instructions to execute a second function of the second application;updating the sidebar element to include a second graphical icon and the first graphical icon, wherein the second graphical icon represents the second application;receiving a selection of the second graphical element from the client device; andupdating the composite GUI to include the second set of interface elements of the second application.
RELATED APPLICATIONS

This application in a continuation of U.S. patent application Ser. No. 15/139,793, entitled “COMPOSITE GRAPHICAL INTERFACE WITH SHAREABLE DATA-OBJECTS,” filed Apr. 27, 2016, which claims the priority benefit of U.S. Provisional Application No. 62/273,320, entitled “COMPOSITE GRAPHICAL INTERFACE WITH SHAREABLE DATA-OBJECTS,” filed Dec. 30, 2015, which is hereby incorporated by reference in its entirety.

US Referenced Citations (510)
Number Name Date Kind
5109399 Thompson Apr 1992 A
5329108 Lamoure Jul 1994 A
5632009 Rao et al. May 1997 A
5670987 Doi et al. Sep 1997 A
5781704 Rossmo Jul 1998 A
5798769 Chiu et al. Aug 1998 A
5845300 Corner et al. Dec 1998 A
6057757 Arrowsmith et al. May 2000 A
6091956 Hollenberg Jul 2000 A
6161098 Wallman Dec 2000 A
6190053 Stahlecker et al. Feb 2001 B1
6232971 Haynes May 2001 B1
6247019 Davies Jun 2001 B1
6279018 Kudrolli et al. Aug 2001 B1
6341310 Leshem et al. Jan 2002 B1
6366933 Ball et al. Apr 2002 B1
6369835 Lin Apr 2002 B1
6456997 Shukla Sep 2002 B1
6549944 Weinberg et al. Apr 2003 B1
6560620 Ching May 2003 B1
6581068 Bensoussan et al. Jun 2003 B1
6594672 Lampson et al. Jul 2003 B1
6631496 Li et al. Oct 2003 B1
6642945 Sharpe Nov 2003 B1
6674434 Chojnacki et al. Jan 2004 B1
6714936 Nevin, III Mar 2004 B1
6775675 Nwabueze et al. Aug 2004 B1
6820135 Dingman et al. Nov 2004 B1
6828920 Owen et al. Dec 2004 B2
6839745 Dingari et al. Jan 2005 B1
6877137 Rivette et al. Apr 2005 B1
6976210 Silva et al. Dec 2005 B1
6980984 Huffman et al. Dec 2005 B1
6985950 Hanson et al. Jan 2006 B1
7036085 Barros Apr 2006 B2
7043702 Chi et al. May 2006 B2
7055110 Kupka May 2006 B2
7139800 Bellotti et al. Nov 2006 B2
7158878 Rasmussen Jan 2007 B2
7162475 Ackerman Jan 2007 B2
7168039 Bertram Jan 2007 B2
7171427 Witkowski et al. Jan 2007 B2
7174377 Bernard et al. Feb 2007 B2
7216088 Chappel May 2007 B1
7269786 Malloy et al. Sep 2007 B1
7278105 Kitts et al. Oct 2007 B1
7290698 Poslinski et al. Nov 2007 B2
7333998 Heckerman et al. Feb 2008 B2
7370047 Gorman May 2008 B2
7379811 Rasmussen et al. May 2008 B2
7379903 Caballero et al. May 2008 B2
7426654 Adams, Jr. et al. Sep 2008 B2
7454466 Bellotti et al. Nov 2008 B2
7467375 Tondreau et al. Dec 2008 B2
7487139 Fraleigh et al. Feb 2009 B2
7502786 Liu et al. Mar 2009 B2
7525422 Bishop et al. Apr 2009 B2
7529727 Arning et al. May 2009 B2
7529734 Dirisala May 2009 B2
7558677 Jones Jul 2009 B2
7574409 Patinkin Aug 2009 B2
7574428 Leiserowitz et al. Aug 2009 B2
7579965 Bucholz Aug 2009 B2
7596285 Brown Sep 2009 B2
7614006 Molander Nov 2009 B2
7617232 Gabbert et al. Nov 2009 B2
7620628 Kapur et al. Nov 2009 B2
7627812 Chamberlain et al. Dec 2009 B2
7634717 Chamberlain et al. Dec 2009 B2
7703021 Flam Apr 2010 B1
7706817 Bamrah et al. Apr 2010 B2
7712049 Williams et al. May 2010 B2
7716077 Mikurak et al. May 2010 B1
7725530 Sah et al. May 2010 B2
7725547 Albertson et al. May 2010 B2
7730082 Sah et al. Jun 2010 B2
7730109 Rohrs et al. Jun 2010 B2
7770100 Chamberlain et al. Aug 2010 B2
7805457 Viola et al. Sep 2010 B1
7809703 Balabhadrapatruni et al. Oct 2010 B2
7818658 Chen Oct 2010 B2
7870493 Pall et al. Jan 2011 B2
7894984 Rasmussen et al. Feb 2011 B2
7899611 Downs et al. Mar 2011 B2
7917376 Bellin et al. Mar 2011 B2
7920963 Jouline et al. Apr 2011 B2
7933862 Chamberlain et al. Apr 2011 B2
7962281 Rasmussen et al. Jun 2011 B2
7962495 Jain et al. Jun 2011 B2
7962848 Bertram Jun 2011 B2
7970240 Chao et al. Jun 2011 B1
7971150 Raskutti et al. Jun 2011 B2
7984374 Caro et al. Jul 2011 B2
8001465 Kudrolli et al. Aug 2011 B2
8001482 Bhattiprolu et al. Aug 2011 B2
8010545 Stefik et al. Aug 2011 B2
8015487 Roy et al. Sep 2011 B2
8024778 Cash et al. Sep 2011 B2
8036632 Cona et al. Oct 2011 B1
8103543 Zwicky Jan 2012 B1
8134457 Velipasalar et al. Mar 2012 B2
8145703 Frishert et al. Mar 2012 B2
8185819 Sah et al. May 2012 B2
8214361 Sandler et al. Jul 2012 B1
8214764 Gemmell et al. Jul 2012 B2
8225201 Michael Jul 2012 B2
8229947 Fujinaga Jul 2012 B2
8230333 Decherd et al. Jul 2012 B2
8271461 Pike et al. Sep 2012 B2
8280880 Aymeloglu et al. Oct 2012 B1
8290926 Ozzie et al. Oct 2012 B2
8290942 Jones et al. Oct 2012 B2
8301464 Cave et al. Oct 2012 B1
8301904 Gryaznov Oct 2012 B1
8312367 Foster Nov 2012 B2
8312546 Alme Nov 2012 B2
8352881 Champion et al. Jan 2013 B2
8368695 Howell et al. Feb 2013 B2
8397171 Klassen et al. Mar 2013 B2
8412707 Mianji Apr 2013 B1
8447722 Ahuja et al. May 2013 B1
8452790 Mianji May 2013 B1
8463036 Ramesh et al. Jun 2013 B1
8489331 Kopf et al. Jul 2013 B2
8489641 Seefeld et al. Jul 2013 B1
8498984 Hwang et al. Jul 2013 B1
8510743 Hackborn et al. Aug 2013 B2
8514082 Cova et al. Aug 2013 B2
8515207 Chau Aug 2013 B2
8554579 Tribble et al. Oct 2013 B2
8554653 Falkenborg et al. Oct 2013 B2
8554709 Goodson et al. Oct 2013 B2
8560413 Quaterman Oct 2013 B1
8577911 Stepinski et al. Nov 2013 B1
8589273 Creeden et al. Nov 2013 B2
8595234 Siripurapu et al. Nov 2013 B2
8620641 Farnsworth et al. Dec 2013 B2
8639757 Zang et al. Jan 2014 B1
8646080 Williamson et al. Feb 2014 B2
8655687 Zizzamia et al. Feb 2014 B2
8689108 Duffield et al. Apr 2014 B1
8713467 Goldenberg et al. Apr 2014 B1
8726379 Stiansen et al. May 2014 B1
8739278 Varghese May 2014 B2
8742934 Sarpy, Sr. et al. Jun 2014 B1
8744890 Bernier et al. Jun 2014 B1
8745516 Mason et al. Jun 2014 B2
8781169 Jackson et al. Jul 2014 B2
8787939 Papakipos et al. Jul 2014 B2
8788407 SIngh et al. Jul 2014 B1
8799799 Cervelli et al. Aug 2014 B1
8812960 Sun et al. Aug 2014 B1
8830322 Nerayoff et al. Sep 2014 B2
8832594 Thompson et al. Sep 2014 B1
8868537 Colgrove et al. Oct 2014 B1
8917274 Ma et al. Dec 2014 B2
8924872 Bogomolov et al. Dec 2014 B1
8937619 Sharma et al. Jan 2015 B2
8938686 Erenrich et al. Jan 2015 B1
9009171 Grossman et al. Apr 2015 B1
9009827 Albertson et al. Apr 2015 B1
9021260 Falk et al. Apr 2015 B1
9021384 Beard et al. Apr 2015 B1
9043696 Meiklejohn et al. May 2015 B1
9043894 Dennison et al. May 2015 B1
9116975 Shankar et al. Aug 2015 B2
9612723 Elliot et al. Apr 2017 B1
20010021936 Bertram Sep 2001 A1
20020033848 Sciammarella et al. Mar 2002 A1
20020065708 Senay et al. May 2002 A1
20020091707 Keller et al. Jul 2002 A1
20020095658 Shulman et al. Jul 2002 A1
20020116120 Ruiz et al. Aug 2002 A1
20020130907 Chi et al. Sep 2002 A1
20020174201 Ramer et al. Nov 2002 A1
20020194119 Wright et al. Dec 2002 A1
20030028560 Kudrolli et al. Feb 2003 A1
20030039948 Donahue Feb 2003 A1
20030140106 Raguseo Jul 2003 A1
20030144868 MacIntyre et al. Jul 2003 A1
20030163352 Surpin et al. Aug 2003 A1
20030200217 Ackerman Oct 2003 A1
20030225755 Iwayama et al. Dec 2003 A1
20030229848 Arend et al. Dec 2003 A1
20040032432 Baynger Feb 2004 A1
20040064256 Barinek et al. Apr 2004 A1
20040085318 Hassler et al. May 2004 A1
20040095349 Bito et al. May 2004 A1
20040111410 Burgoon et al. Jun 2004 A1
20040126840 Cheng et al. Jul 2004 A1
20040143602 Ruiz et al. Jul 2004 A1
20040143796 Lerner et al. Jul 2004 A1
20040163039 Gorman Aug 2004 A1
20040181554 Heckerman et al. Sep 2004 A1
20040193600 Kaasten et al. Sep 2004 A1
20040205656 Reulein Oct 2004 A1
20040221223 Yu et al. Nov 2004 A1
20040260702 Cragun et al. Dec 2004 A1
20040267746 Marcjan et al. Dec 2004 A1
20050027705 Sadri et al. Feb 2005 A1
20050028094 Allyn Feb 2005 A1
20050039119 Parks et al. Feb 2005 A1
20050065811 Chu et al. Mar 2005 A1
20050080769 Gemmell et al. Apr 2005 A1
20050086207 Heuer et al. Apr 2005 A1
20050114361 Roberts et al. May 2005 A1
20050125715 Di Franco et al. Jun 2005 A1
20050162523 Darrell et al. Jul 2005 A1
20050166144 Gross Jul 2005 A1
20050180330 Shapiro Aug 2005 A1
20050182793 Keenan et al. Aug 2005 A1
20050183005 Denoue et al. Aug 2005 A1
20050210409 Jou Sep 2005 A1
20050246327 Yeung et al. Nov 2005 A1
20050251786 Citron et al. Nov 2005 A1
20050289109 Arrouye Dec 2005 A1
20060026120 Carolan et al. Feb 2006 A1
20060026170 Kreitler et al. Feb 2006 A1
20060045470 Poslinski et al. Mar 2006 A1
20060059139 Robinson Mar 2006 A1
20060074866 Chamberlain et al. Apr 2006 A1
20060074881 Vembu et al. Apr 2006 A1
20060080619 Carlson et al. Apr 2006 A1
20060093222 Saffer et al. May 2006 A1
20060129746 Porter Jun 2006 A1
20060139375 Rasmussen et al. Jun 2006 A1
20060142949 Helt Jun 2006 A1
20060143034 Rothermel et al. Jun 2006 A1
20060149596 Surpin et al. Jul 2006 A1
20060203337 White Sep 2006 A1
20060218163 Marcjan et al. Sep 2006 A1
20060241974 Chao et al. Oct 2006 A1
20060242040 Rader Oct 2006 A1
20060242630 Koike et al. Oct 2006 A1
20060271277 Hu et al. Nov 2006 A1
20060279630 Aggarwal et al. Dec 2006 A1
20070011150 Frank Jan 2007 A1
20070016363 Huang et al. Jan 2007 A1
20070038646 Thota Feb 2007 A1
20070038962 Fuchs et al. Feb 2007 A1
20070047439 An Mar 2007 A1
20070057966 Ohno et al. Mar 2007 A1
20070078832 Ott, IV et al. Apr 2007 A1
20070083541 Fraleigh Apr 2007 A1
20070094256 Hite Apr 2007 A1
20070094389 Nussey et al. Apr 2007 A1
20070150369 Zivin Jun 2007 A1
20070174760 Chamberlain Jul 2007 A1
20070192265 Chopin et al. Aug 2007 A1
20070198571 Ferguson et al. Aug 2007 A1
20070208497 Downs et al. Sep 2007 A1
20070208498 Barker et al. Sep 2007 A1
20070208736 Tanigawa et al. Sep 2007 A1
20070233709 Abnous et al. Oct 2007 A1
20070240062 Christena et al. Oct 2007 A1
20070266336 Nojima et al. Nov 2007 A1
20070294643 Kyle Dec 2007 A1
20080016216 Worley et al. Jan 2008 A1
20080033919 Arrouye Feb 2008 A1
20080040684 Crump et al. Feb 2008 A1
20080051989 Welsh Feb 2008 A1
20080052142 Bailey et al. Feb 2008 A1
20080077597 Butler Mar 2008 A1
20080077642 Carbone Mar 2008 A1
20080082486 Lermant et al. Apr 2008 A1
20080091808 Mei Apr 2008 A1
20080104019 Nath May 2008 A1
20080126951 Sood et al. May 2008 A1
20080148398 Mezack et al. Jun 2008 A1
20080155440 Trevor et al. Jun 2008 A1
20080195417 Surpin Aug 2008 A1
20080195608 Clover Aug 2008 A1
20080222295 Robinson et al. Sep 2008 A1
20080263468 Cappione et al. Oct 2008 A1
20080267107 Rosenberg Oct 2008 A1
20080276167 Michael Nov 2008 A1
20080278311 Grange et al. Nov 2008 A1
20080288306 MacIntyre et al. Nov 2008 A1
20080301643 Appleton et al. Dec 2008 A1
20080313175 Kersten Dec 2008 A1
20090002492 Velipasalar et al. Jan 2009 A1
20090007088 Fischer Jan 2009 A1
20090027418 Maru et al. Jan 2009 A1
20090030915 Winter et al. Jan 2009 A1
20090055251 Shah et al. Feb 2009 A1
20090076845 Bellin et al. Mar 2009 A1
20090088964 Schaaf Apr 2009 A1
20090119309 Gibson May 2009 A1
20090119638 Li May 2009 A1
20090125359 Knapic May 2009 A1
20090125369 Kloostra May 2009 A1
20090125459 Norton May 2009 A1
20090132921 Hwangbo May 2009 A1
20090132953 Reed, Jr. May 2009 A1
20090143052 Bates Jun 2009 A1
20090144262 White Jun 2009 A1
20090144274 Fraleigh et al. Jun 2009 A1
20090164934 Bhattiprolu Jun 2009 A1
20090171939 Athsani Jul 2009 A1
20090172511 Decherd Jul 2009 A1
20090172821 Daira Jul 2009 A1
20090177962 Gusmorino Jul 2009 A1
20090179892 Tsuda Jul 2009 A1
20090187464 Bai Jul 2009 A1
20090222400 Kupershmidt Sep 2009 A1
20090222759 Drieschner Sep 2009 A1
20090222760 Halverson Sep 2009 A1
20090234720 George Sep 2009 A1
20090249244 Robinson et al. Oct 2009 A1
20090254970 Agarwal Oct 2009 A1
20090281839 Lynn Nov 2009 A1
20090287470 Farnsworth Nov 2009 A1
20090292626 Oxford Nov 2009 A1
20100011282 Dollard Jan 2010 A1
20100042922 Bradateanu Feb 2010 A1
20100057716 Stefik Mar 2010 A1
20100070523 Delgo Mar 2010 A1
20100070842 Aymeloglu et al. Mar 2010 A1
20100070845 Facemire Mar 2010 A1
20100070897 Aymeloglu Mar 2010 A1
20100100963 Mahaffey Apr 2010 A1
20100103124 Kruzeniski Apr 2010 A1
20100114887 Conway May 2010 A1
20100122152 Chamberlain et al. May 2010 A1
20100131457 Heimendinger May 2010 A1
20100162176 Dunton Jun 2010 A1
20100191563 Schlaifer Jul 2010 A1
20100198684 Eraker Aug 2010 A1
20100199225 Coleman et al. Aug 2010 A1
20100228812 Uomini Sep 2010 A1
20100250412 Wagner Sep 2010 A1
20100280857 Liu Nov 2010 A1
20100293174 Bennett Nov 2010 A1
20100306713 Geisner Dec 2010 A1
20100313119 Baldwin Dec 2010 A1
20100318924 Frankel Dec 2010 A1
20100321399 Ellren Dec 2010 A1
20100325526 Ellis Dec 2010 A1
20100325581 Finkelstein Dec 2010 A1
20100330801 Rouh Dec 2010 A1
20110029526 Knight Feb 2011 A1
20110047159 Baid Feb 2011 A1
20110060753 Shaked Mar 2011 A1
20110061013 Bilicki Mar 2011 A1
20110066933 Ludwig Mar 2011 A1
20110074811 Hanson Mar 2011 A1
20110078055 Faribault Mar 2011 A1
20110078173 Seligmann Mar 2011 A1
20110093327 Fordyce, III Apr 2011 A1
20110117878 Barash May 2011 A1
20110119100 Ruhl May 2011 A1
20110137766 Rasmussen Jun 2011 A1
20110153384 Home Jun 2011 A1
20110161096 Buehler Jun 2011 A1
20110167105 Ramakrishnan Jul 2011 A1
20110170799 Carrino Jul 2011 A1
20110173032 Payne Jul 2011 A1
20110185316 Reid Jul 2011 A1
20110208724 Jones Aug 2011 A1
20110213655 Henkin Sep 2011 A1
20110218934 Elser Sep 2011 A1
20110219450 McDougal Sep 2011 A1
20110225198 Edwards Sep 2011 A1
20110238495 Kang Sep 2011 A1
20110238553 Raj Sep 2011 A1
20110251951 Kolkowitz Oct 2011 A1
20110258158 Resende, Jr. Oct 2011 A1
20110270705 Parker Nov 2011 A1
20110289397 Eastmond Nov 2011 A1
20110289420 Morioka Nov 2011 A1
20110291851 Whisenant Dec 2011 A1
20110310005 Chen Dec 2011 A1
20110314007 Dassa Dec 2011 A1
20120019559 Siler Jan 2012 A1
20120036013 Neuhaus Feb 2012 A1
20120036434 Oberstein Feb 2012 A1
20120050293 Carlhian et al. Mar 2012 A1
20120066296 Appleton et al. Mar 2012 A1
20120072825 Sherkin et al. Mar 2012 A1
20120079363 Folting et al. Mar 2012 A1
20120084118 Bai et al. Apr 2012 A1
20120106801 Jackson May 2012 A1
20120117082 Koperda et al. May 2012 A1
20120124547 Halbedel May 2012 A1
20120131512 Takeuchi et al. May 2012 A1
20120137235 Ts et al. May 2012 A1
20120144335 Abeln et al. Jun 2012 A1
20120159307 Chung et al. Jun 2012 A1
20120159362 Brown et al. Jun 2012 A1
20120159399 Bastide et al. Jun 2012 A1
20120170847 Tsukidate Jul 2012 A1
20120173985 Peppel Jul 2012 A1
20120180002 Campbell et al. Jul 2012 A1
20120196557 Reich et al. Aug 2012 A1
20120196558 Reich et al. Aug 2012 A1
20120197651 Robinson et al. Aug 2012 A1
20120203708 Psota et al. Aug 2012 A1
20120208636 Feige Aug 2012 A1
20120221511 Gibson et al. Aug 2012 A1
20120221553 Wittmer et al. Aug 2012 A1
20120221580 Barney Aug 2012 A1
20120245976 Kumar et al. Sep 2012 A1
20120246148 Dror Sep 2012 A1
20120254129 Wheeler et al. Oct 2012 A1
20120284345 Costenaro et al. Nov 2012 A1
20120290879 Shibuya et al. Nov 2012 A1
20120296907 Long et al. Nov 2012 A1
20120311684 Paulsen et al. Dec 2012 A1
20120323888 Osann, Jr. Dec 2012 A1
20120330801 Mcdougal et al. Dec 2012 A1
20120330973 Ghuneim et al. Dec 2012 A1
20130006426 Healey et al. Jan 2013 A1
20130006725 Simanek et al. Jan 2013 A1
20130006916 Mcbride et al. Jan 2013 A1
20130018796 Kolhatkar et al. Jan 2013 A1
20130024268 Manickavelu Jan 2013 A1
20130046635 Grigg et al. Feb 2013 A1
20130046842 Muntz et al. Feb 2013 A1
20130060786 Serrano et al. Mar 2013 A1
20130061169 Pearcy Mar 2013 A1
20130073377 Heath Mar 2013 A1
20130073454 Busch Mar 2013 A1
20130078943 Biage et al. Mar 2013 A1
20130086482 Parsons Apr 2013 A1
20130097482 Marantz et al. Apr 2013 A1
20130110822 Ikeda et al. May 2013 A1
20130110877 Bonham et al. May 2013 A1
20130111320 Campbell et al. May 2013 A1
20130117651 Waldman et al. May 2013 A1
20130150004 Rosen Jun 2013 A1
20130151148 Parundekar et al. Jun 2013 A1
20130151388 Falkenborg et al. Jun 2013 A1
20130157234 Gulli et al. Jun 2013 A1
20130166550 Buchmann et al. Jun 2013 A1
20130176321 Mitchell et al. Jul 2013 A1
20130179420 Park et al. Jul 2013 A1
20130224696 Wolfe et al. Aug 2013 A1
20130225212 Khan Aug 2013 A1
20130226318 Procyk et al. Aug 2013 A1
20130226953 Markovich et al. Aug 2013 A1
20130232045 Tai et al. Sep 2013 A1
20130238616 Rose et al. Sep 2013 A1
20130246170 Gross et al. Sep 2013 A1
20130251233 Yang et al. Sep 2013 A1
20130262527 Hunter et al. Oct 2013 A1
20130263019 Castellanos et al. Oct 2013 A1
20130267207 Hao et al. Oct 2013 A1
20130268520 Fisher et al. Oct 2013 A1
20130279757 Kephart Oct 2013 A1
20130282696 John et al. Oct 2013 A1
20130290011 Lynn et al. Oct 2013 A1
20130290825 Arndt et al. Oct 2013 A1
20130297619 Chandrasekaran et al. Nov 2013 A1
20130311375 Priebatsch Nov 2013 A1
20140019936 Cohanoff Jan 2014 A1
20140032506 Hoey et al. Jan 2014 A1
20140033010 Richardt et al. Jan 2014 A1
20140040371 Guervich et al. Feb 2014 A1
20140047319 Eberlein Feb 2014 A1
20140047357 Alfaro et al. Feb 2014 A1
20140059038 Mcpherson et al. Feb 2014 A1
20140067611 Adachi et al. Mar 2014 A1
20140068487 Steiger et al. Mar 2014 A1
20140074855 Zhao et al. Mar 2014 A1
20140095273 Tang et al. Apr 2014 A1
20140095509 Patton Apr 2014 A1
20140108068 Williams Apr 2014 A1
20140108380 Gotz et al. Apr 2014 A1
20140108985 Scott et al. Apr 2014 A1
20140129261 Bothwell et al. May 2014 A1
20140149436 Bahrami et al. May 2014 A1
20140156527 Grigg et al. Jun 2014 A1
20140157172 Peery et al. Jun 2014 A1
20140164502 Khodorenko et al. Jun 2014 A1
20140189536 Lange et al. Jul 2014 A1
20140195515 Baker et al. Jul 2014 A1
20140195887 Ellis et al. Jul 2014 A1
20140214579 Shen et al. Jul 2014 A1
20140222521 Chait Aug 2014 A1
20140244388 Manouchehri et al. Aug 2014 A1
20140267294 Ma et al. Sep 2014 A1
20140267295 Sharma et al. Sep 2014 A1
20140279824 Tamayo Sep 2014 A1
20140282370 Schaefer Sep 2014 A1
20140310266 Greenfield Oct 2014 A1
20140316911 Gross Oct 2014 A1
20140333651 Cervelli et al. Nov 2014 A1
20140337772 Cervelli et al. Nov 2014 A1
20140344230 Krause et al. Nov 2014 A1
20150019394 Unser et al. Jan 2015 A1
20150046870 Goldenberg et al. Feb 2015 A1
20150074819 Borenstein Mar 2015 A1
20150089424 Duffield et al. Mar 2015 A1
20150100897 Sun et al. Apr 2015 A1
20150100907 Erenrich et al. Apr 2015 A1
20150134666 Gattiker et al. May 2015 A1
20150169709 Kara et al. Jun 2015 A1
20150169726 Kara et al. Jun 2015 A1
20150170077 Kara et al. Jun 2015 A1
20150178825 Huerta et al. Jun 2015 A1
20150178877 Bogomolov et al. Jun 2015 A1
20150186821 Wang et al. Jul 2015 A1
20150187036 Wang et al. Jul 2015 A1
20150213082 Frankel Jul 2015 A1
20150227295 Meiklejohn et al. Aug 2015 A1
20150309719 Ma et al. Oct 2015 A1
20150317342 Grossman et al. Nov 2015 A1
20150324868 Kaftan et al. Nov 2015 A1
20150347099 Breedvelt-Schouten et al. Dec 2015 A1
20160170802 Belhekar Jun 2016 A1
Foreign Referenced Citations (38)
Number Date Country
102014103482 Sep 2014 DE
102014215621 Feb 2015 DE
1672527 Jun 2006 EP
2551799 Jan 2013 EP
2560134 Feb 2013 EP
2778977 Sep 2014 EP
2835745 Feb 2015 EP
2835770 Feb 2015 EP
2838039 Feb 2015 EP
2846241 Mar 2015 EP
2851852 Mar 2015 EP
2858014 Apr 2015 EP
2858018 Apr 2015 EP
2863326 Apr 2015 EP
2863346 Apr 2015 EP
2869211 May 2015 EP
2884439 Jun 2015 EP
2884440 Jun 2015 EP
2891992 Jul 2015 EP
2911078 Aug 2015 EP
2911100 Aug 2015 EP
2940603 Nov 2015 EP
2940609 Nov 2015 EP
3188006 Jul 2017 EP
2516155 Jan 2015 GB
2518745 Apr 2015 GB
2012778 Nov 2014 NL
2013306 Feb 2015 NL
624557 Aug 2014 NZ
WO-2000009529 Feb 2000 WO
WO-02065353 Aug 2002 WO
WO-2005104736 Nov 2005 WO
WO-2008064207 May 2008 WO
WO-2009061501 May 2009 WO
WO-2010000014 Jan 2010 WO
WO-2010030913 Mar 2010 WO
WO-2013010157 Jan 2013 WO
WO-2013102892 Jul 2013 WO
Non-Patent Literature Citations (205)
Entry
“5 Great Tools for Visualizing your Twitter Followers”, Amnet Blog, http://www.amnetblog.com/component/content/article/115-5-great-tools-for-visualizing-your-twitter-followers.html, (Aug. 4, 2010), 1-5.
“A First Look: Predicting Market Demand for Food Retails using a Huff Analysis”, TRF Policy Solutions, CDFI Fund, Capacity Building Initiative, (Jul. 2012), 1-30.
“A Quick Guide to UniProtKB Swiss-Prot & TrEMBL”, UniProt Consortium, Ongoing and future developments at the Universal Protein Resource, (Sep. 2011), 1-2.
“About 80 Minutes: Palantir in a number of parts—Part 6—Graph”, http://about80minutes.blogspot.com/2013/03/palantir-in-number-of-parts-part-6-graph.html, (Mar. 21, 2013), 1-7.
“About connecting shapes”, Microsoft Office-Visio, [Online] retrieved from the Internet: <http://office.microsoft.com/enus/visio-help/about-connecting-shapes-HP085050369.aspx>, (Aug. 4, 2011), 6 pgs.
“Add and glue connectors with the Connector tool”, Microsoft Office-Visio,, [Online] retrieved from the Internet: <http://office.microsoft.com/en-us/visio-help/add-and-glue-connectors-with-the-connector-tool-HA010048532.aspx?CTT =1 >, (Aug. 4, 2011), 1 pg.
“An Introduction to KeyLines and Network Visualization”, Keylines.com, [Online]. Retrieved from the Internet: <URL: http://keylines.com/wp-content/uploads/2014/03/KeyLines-White-Paper.pdf>, (Mar. 2014), 8 pgs.
“U.S. Appl. No. 12/556,318, Non Final Office Action dated Jul. 2, 2015”, 19 pgs.
“U.S. Appl. No. 12/556,318, Notice of Allowance dated Nov. 2, 2015”, 8 pgs.
“U.S. Appl. No. 13/247,987, Non Final Office Action dated Apr. 2, 2015”, 27 pgs.
“U.S. Appl. No. 13/247,987, Non Final Office Action dated Sep. 22, 2015”, 34 pgs.
“U.S. Appl. No. 13/831,199, Final Office Action dated Oct. 6, 2015”, 17 pgs.
“U.S. Appl. No. 13/831,199, Non Final Office Action dated May 9, 2016”, 12 pgs.
“U.S. Appl. No. 13/831,199, Non Final Office Action dated Jun. 3, 2015”, 23 pgs.
“U.S. Appl. No. 13/831,791, Final Office Action dated Aug. 6, 2015”, 19 pgs.
“U.S. Appl. No. 13/831,791, Non Final Office Action dated Mar. 4, 2015”, 20 pgs.
“U.S. Appl. No. 13/835,688, First Action Interview Pre-Interview Communication dated Jun. 17, 2015”, 23 pgs.
“U.S. Appl. No. 13/839,026, Non Final Office Action dated Aug. 4, 2015”, 66 pgs.
“U.S. Appl. No. 13/839,026, Restriction Requirement dated Apr. 2, 2015”, 5 pgs.
“U.S. Appl. No. 13/917,571, Issue Notification dated Aug. 5, 2014”, 1 pg.
“U.S. Appl. No. 14/102,394, Notice of Allowance dated Aug. 25, 2014”, 13 pgs.
“U.S. Appl. No. 14/108,187, Notice of Allowance dated Aug. 29, 2014”, 8 pgs.
“U.S. Appl. No. 14/134,558, Non Final Office Action dated Oct. 7, 2015”, 9 pgs.
“U.S. Appl. No. 14/148,568, Final Office Action dated Oct. 22, 2014”, 32 pgs.
“U.S. Appl. No. 14/148,568, Non Final Office Action dated Mar. 26, 2015”, 7 pgs.
“U.S. Appl. No. 14/148,568, Notice of Allowance dated Aug. 26, 2015”, 75 pgs.
“U.S. Appl. No. 14/192,767, Notice of Allowance dated Dec. 16, 2014”, 9 pgs.
“U.S. Appl. No. 14/196,814, Non Final Office Action dated May 5, 2015”, 24 pgs.
“U.S. Appl. No. 14/225,006, Final Office Action dated Sep. 2, 2015”, 28 pgs.
“U.S. Appl. No. 14/225,006, First Action Interview Pre-Interview Communication dated Feb. 27, 2015”, 5 pgs.
“U.S. Appl. No. 14/225,006, First Action Interview Pre-Interview Communication dated Sep. 10, 2014”, 4 pgs.
“U.S. Appl. No. 14/225,084, First Action Interview Pre-Interview Communication dated Feb. 20, 2015”, 5 pgs.
“U.S. Appl. No. 14/225,084, First Action Interview Pre-Interview Communication dated Sep. 2, 2014”, 17 pgs.
“U.S. Appl. No. 14/225,084, Non Final Office Action dated Sep. 11, 2015”, 13 pgs.
“U.S. Appl. No. 14/225,084, Notice of Allowance dated May 4, 2015”, 26 pgs.
“U.S. Appl. No. 14/225,160, Advisory Action dated May 20, 2015”, 7 pgs.
“U.S. Appl. No. 14/225,160, Final Office Action dated Feb. 11, 2015”, 30 pgs.
“U.S. Appl. No. 14/225,160, First Action Interview Pre-Interview Communication dated Jul. 29, 2014”, 19 pgs.
“U.S. Appl. No. 14/225,160, First Action Interview Pre-Interview Communication dated Oct. 22, 2014”, 6 pgs.
“U.S. Appl. No. 14/225,160, Non Final Office Action dated Aug. 12, 2015”, 23 pgs.
“U.S. Appl. No. 14/268,964, First Action Interview Pre-Interview Communication dated Sep. 3, 2014”, 13 pgs.
“U.S. Appl. No. 14/268,964, Notice of Allowance dated Dec. 3, 2014”, 13 pgs.
“U.S. Appl. No. 14/289,596, Advisory Action dated Apr. 30, 2015”, 3 pgs.
“U.S. Appl. No. 14/289,596, Final Office Action dated Jan. 26, 2015”, 38 pgs.
“U.S. Appl. No. 14/289,596, First Action Interview Pre-Interview Communication dated Jul. 18, 2014”, 4 pgs.
“U.S. Appl. No. 14/289,599, Advisory Action dated Sep. 4, 2015”, 24 pgs.
“U.S. Appl. No. 14/289,599, Final Office Action dated May 29, 2015”, 8 pgs.
“U.S. Appl. No. 14/289,599, First Action Interview Pre-Interview Communication dated Jul. 22, 2014”, 5 pgs.
“U.S. Appl. No. 14/294,098, Final Office Action dated Nov. 6, 2014”, 22 pgs.
“U.S. Appl. No. 14/294,098, First Action Interview Pre-Interview Communication dated Aug. 15, 2014”, 17 pgs.
“U.S. Appl. No. 14/294,098, Notice of Allowance dated Dec. 29, 2014”, 9 pgs.
“U.S. Appl. No. 14/306,138, Examiner Interview Summary dated Dec. 3, 2015”, 3 pgs.
“U.S. Appl. No. 14/306,138, Final Office Action dated Feb. 18, 2015”, 17 pgs.
“U.S. Appl. No. 14/306,138, Final Office Action dated Sep. 15, 2015”, 31 pgs.
“U.S. Appl. No. 14/306,138, First Action Interview Pre-Interview Communication dated Sep. 23, 2014”, 5 pgs.
“U.S. Appl. No. 14/306,138, Non Final Office Action dated May 26, 2015”, 13 pgs.
“U.S. Appl. No. 14/306,147, Final Office Action dated Feb. 19, 2015”, 15 pgs.
“U.S. Appl. No. 14/306,147, First Action Interview—Pre-Interview Communication dated Sep. 9, 2014”, 6 pgs.
“U.S. Appl. No. 14/306,147, Non Final Office Action dated Aug. 7, 2015”, 17 pgs.
“U.S. Appl. No. 14/306,154, Advisory Action dated May 15, 2015”, 3 pgs.
“U.S. Appl. No. 14/306,154, Final Office Action dated Mar. 11, 2015”, 12 pgs.
“U.S. Appl. No. 14/306,154, Final Office Action dated Nov. 16, 2015”, 14 pgs.
“U.S. Appl. No. 14/306,154, First Action Interview Pre-Interview Communication dated Sep. 9, 2014”, 4 pgs.
“U.S. Appl. No. 14/306,154, Non Final Office Action dated Jul. 6, 2015”, 22 pgs.
“U.S. Appl. No. 14/319,765, Advisory Action dated Sep. 10, 2015”, 3 pgs.
“U.S. Appl. No. 14/319,765, Final Office Action dated Jun. 16, 2015”, 37 pgs.
“U.S. Appl. No. 14/319,765, First Action Interview Pre-Interview Communication dated Feb. 4, 2015”, 3 pgs.
“U.S. Appl. No. 14/319,765, First Action Interview Pre-Interview Communication dated Nov. 25, 2014”, 4 pgs.
“U.S. Appl. No. 14/323,935, First Action Interview Pre-Interview Communication dated Mar. 31, 2015”, 6 pgs.
“U.S. Appl. No. 14/323,935, First Action Interview Pre-Interview Communication dated Nov. 28, 2014”, 4 pgs.
“U.S. Appl. No. 14/323,935, Non Final Office Action dated Jun. 22, 2015”, 18 pgs.
“U.S. Appl. No. 14/326,738, Final Office Action dated Jul. 31, 2015”, 5 pgs.
“U.S. Appl. No. 14/326,738, First Action Interview Pre-Interview Communication dated Mar. 31, 2015”, 6 pgs.
“U.S. Appl. No. 14/326,738, First Action Interview Pre-Interview Communication dated Dec. 2, 2014”, 5 pgs.
“U.S. Appl. No. 14/326,738, Notice of Allowance dated Nov. 18, 2015”, 13 pgs.
“U.S. Appl. No. 14/473,552, Examiner Interview Summary dated Feb. 24, 2015”, 21 pgs.
“U.S. Appl. No. 14/473,552, Notice of Allowance dated Jul. 24, 2015”, 8 pgs.
“U.S. Appl. No. 14/473,860, Notice of Allowance dated Jan. 5, 2015”, 13 pgs.
“U.S. Appl. No. 14/486,991, Non Final Office Action dated Mar. 10, 2015”, 23 pgs.
“U.S. Appl. No. 14/486,991, Notice of Allowance dated May 1, 2015”, 5 pgs.
“U.S. Appl. No. 14/490,612, Final Office Action dated Aug. 18, 2015”, 71 pgs.
“U.S. Appl. No. 14/504,103, First Action Interview Pre-Interview Communication dated Feb. 5, 2015”, 22 pgs.
“U.S. Appl. No. 14/504,103, First Action Interview Pre-Interview Communication dated Mar. 31, 2015”, 9 pgs.
“U.S. Appl. No. 14/504,103, Notice of Allowance dated May 18, 2015”, 18 pgs.
“U.S. Appl. No. 14/579,752, Final Office Action dated Aug. 19, 2015”, 35 pgs.
“U.S. Appl. No. 14/579,752, First Action Interview Pre-Interview Communication dated May 26, 2015”, 24 pgs.
“U.S. Appl. No. 14/616,080, Notice of Allowance dated Apr. 2, 2015”, 34 pgs.
“U.S. Appl. No. 14/631,633, First Action Interview Pre-Interview Communication dated Sep. 10, 2015”, 5 pgs.
“U.S. Appl. No. 14/639,606, Final Office Action dated Oct. 16, 2015”, 54 pgs.
“U.S. Appl. No. 14/639,606, First Action Interview Pre-Interview Communication dated May 18, 2015”, 9 pgs.
“U.S. Appl. No. 14/639,606, First Action Interview Pre-Interview Communication dated Jul. 24, 2015”, 9 pgs.
“U.S. Appl. No. 14/726,353, First Action Interview Pre-Interview Communication dated Sep. 10, 2015”, 31 pgs.
“U.S. Appl. No. 14/813,749, Non Final Office Action dated Sep. 28, 2015”, 22 pgs.
“U.S. Appl. No. 15/139,793, Notice of Allowance dated Nov. 18, 2016”, 25 pgs.
“Australian Application Serial No. 2014201511, Office Action dated Feb. 27, 2015”, 2 pgs.
“Australian Application Serial No. 2014202442, Office Action dated Mar. 19, 2015”, 5 pgs.
“Australian Application Serial No. 2014210604, Office Action dated Jun. 5, 2015”, 3 pgs.
“Australian Application Serial No. 2014210614, Office Action dated Jun. 5, 2015”, 5 pgs.
“Australian Application Serial No. 2014250678, Patent Examination Report dated Jun. 17, 2015”, 2 pgs.
“Bug 18726—[feature] Long-click means of invoking contextual menus not supported”, Bugzilla©Mozilla, [Online] retrieved from the internet: <http://bugzilla.mozilla.org/show_bug.cgi?id=18726>, (Jun. 13, 2013), 11 pgs.
“Chapter 2: IBM InfoSphere DataStage stages”, IBM Corp; Modification 0 of IBM Information Server, Version 8, Release 1, 1st Edition, (2008), 35-137.
“E-Security Begins with Sound Security Policies”, Symantec Corporation; Symantec Enterprise Security, (Jun. 2001), 12 pgs.
“European Application Serial No. 14158861.6, Extended European Search Report dated Jun. 16, 2014”, 6 pgs.
“European Application Serial No. 14159464.8, Extended European Search Report dated Jul. 31, 2014”, 7 pgs.
“European Application Serial No. 14159464.8, Non Final Office Action dated Feb. 18, 2016”, 6 pgs.
“European Application Serial No. 14159464.8, Non Final Office Action dated Sep. 22, 2014”, 2 pgs.
“European Application Serial No. 14180142.3, Extended European Search Report dated Feb. 6, 2015”, 7 pgs.
“European Application Serial No. 14180281.9, Extended European Search Report dated Jan. 26, 2015”, 8 pgs.
“European Application Serial No. 14180321.3, Extended European Search Report dated Apr. 17, 2015”, 9 pgs.
“European Application Serial No. 14180432.8, Extended European Search Report dated Jun. 23, 2015”, 8 pgs.
“European Application Serial No. 14186225.0, Extended European Search Report dated Feb. 13, 2015”, 6 pgs.
“European Application Serial No. 14187739.9, Extended European Search Report dated Jul. 6, 2015”, 9 pgs.
“European Application Serial No. 14187996.5, Extended European Search Report dated Feb. 12, 2015”, 7 pgs.
“European Application Serial No. 14189344.6, Non Final Office Action dated Feb. 29, 2016”, 9 pgs.
“European Application Serial No. 14189347.9, Extended European Search Report dated Mar. 4, 2015”, 4 pgs.
“European Application Serial No. 14189802.3, Extended European Search Report dated May 11, 2015”, 8 pgs.
“European Application Serial No. 14191540.5, Extended European Search Report dated May 27, 2015”, 9 pgs.
“European Application Serial No. 14197879.1, Extended European Search Report dated Apr. 28, 2015”, 3 pgs.
“European Application Serial No. 14197895.7, Extended European Search Report dated Apr. 28, 2015”, 3 pgs.
“European Application Serial No. 14197938.5, Extended European Search Report dated Apr. 28, 2015”, 3 pgs.
“European Application Serial No. 14199182.8, Extended European Search Report dated Mar. 13, 2015”, 8 pgs.
“European Application Serial No. 15155845.9, Extended European Search Report dated Oct. 6, 2015”, 5 pgs.
“European Application Serial No. 15155846.7, Extended European Search Report dated Jul. 8, 2015”, 8 pgs.
“European Application Serial No. 15165244.3, Extended European Search Report dated Aug. 27, 2015”, 10 pgs.
“European Application Serial No. 15175106.2, Extended European Search Report dated Nov. 5, 2015”, 8 pgs.
“European Application Serial No. 15175151.8, Extended European Search Report dated Nov. 25, 2015”, 8 pgs.
“European Application Serial No. 15183721.8, Extended European Search Report dated Nov. 23, 2015”, 8 pgs.
“European Application Serial No. 16206931.4, Extended European Search Report dated May 22, 2017”, w/ English Translation, 10 pgs.
“Federated Database System”, From Wikipedia, (Sep. 7, 2013), 1-6.
“Getting Started with VBA in Word 2010”, Microsoft Developer Network, [Online] Retrieved from the Internet: <http://msdn.microsoft.com/en-us/library/ff604039%28v=office.14%29.aspx>, (Apr. 2010), 17 pgs.
“GIS-NET 3 Public Department of Regional Planning”, Planning & Zoning Information for Unincorporated LA County, [Online] Retrieved from the internet: <http://gis.planning.lacounty.gov/GIS-NET3_Public/Viewer.html>, (Oct. 2, 2013), 1-2.
“Great Britain Application Serial No. 1404457.2, Office Action dated Aug. 14, 2014”, 8 pgs.
“Great Britain Application Serial No. 1404574.4, Office Action dated Dec. 18, 2014”.
“Great Britain Application Serial No. 1408025.3, Office Action dated Nov. 6, 2014”, 3 pgs.
“Great Britain Application Serial No. 1411984.6, Office Action dated Dec. 22, 2014”, 6 pgs.
“Great Britain Application Serial No. 1413935.6, Non Final Office Action dated Jan. 27, 2015”, 7 pgs.
“Identify—Defintion”, Downloaded Jan. 22, 2015, (Jan. 22, 2015), 1 pg.
“KeyLines Datasheet”, Keylines.com, [Online]. Retrieved from the Internet: <URL: http://keylines.com/wp-content/uploads/2014/03/KeyLines-datasheet.pdf>, (Mar. 2014), 2 pgs.
“Map Builder: Rapid Mashup Development Tool for Google and Yahoo Maps!”, http://web.archive.org/web/20090626224734/http://www.mapbuilder.net/, (Jul. 20, 2012), 2 pgs.
“Map of San Jose, CA”, Retrieved Oct. 2, 2013 from http://maps.google.com, (Oct. 2, 2013), 1 pg.
“Map of San Jose, CA.”, Retrieved Oct. 2, 2013 from http://maps.yahoo.com, (Oct. 2, 2013), 1 pg.
“Map of San Jose, CA.”, Retrieved Oct. 2, 2013 from http://maps.bing.com, (Oct. 2, 2013), 1 pg.
“Netherlands Application Serial No. 2012437, Netherlands Search Report dated Sep. 18, 2015”, W/ English Translation, 7 pgs.
“Netherlands Application Serial No. 2013306, Netherlands Search Report dated Apr. 24, 2015”, 8 pgs.
“New Zealand Application Serial No. 622513, Office Action dated Apr. 3, 2014”, 2 pgs.
“New Zealand Application Serial No. 622517, Office Action dated Apr. 3, 2014”, 3 pgs.
“New Zealand Application Serial No. 624557, Office Action dated May 14, 2014”, 2 pgs.
“New Zealand Application Serial No. 627962, Office Action dated Aug. 5, 2014”, 2 pgs.
“New Zealand Application Serial No. 628161, First Examination Report dated Aug. 25, 2014”, 2 pgs.
“New Zealand Application Serial No. 628263, Office Action dated Aug. 12, 2014”, 2 pgs.
“New Zealand Application Serial No. 628495, Office Action dated Aug. 19, 2014”, 2 pgs.
“New Zealand Application Serial No. 628585, Office Action dated Aug. 26, 2014”, 2 pgs.
“New Zealand Application Serial No. 628840, Office Action dated Aug. 28, 2014”, 2 pgs.
“Overlay—Definition”, Downloaded Jan. 22, 2015, (Jan. 22, 2015), 1.
“Palantir Labs—Timeline”, https://www.youtube.com/watch?v=JCgDW5bru9M, (Oct. 2010), 1 pg.
“Potential Money Laundering Warning Signs”, [Online] Retrieved from the internet: <https://web.archive.org/web/20030816090055/http:/finsolinc.com/ANTI-MONEY%20LAUNDERING%20TRAINING%20GUIDES.pdf>, (Accessed 2003), 6 pgs.
“Refresh CSS ellipsis when resizing container”, Stack Overflow, [Online]. Retrieved from the Internet: <URL: http://stackoverflow.com/questions/17964681/refresh-css-ellipsis-when-resizing-container>, (Accessed: May 18, 2015), 1 pg.
“The FASTA Program Package”, fasta-36.3.4, (Mar. 25, 2011), 1-29.
“Toad for Oracle 11.6, Guide to Using Toad”, Quest Software, (2012), 1-162.
“Visualizing Threats: Improved Cyber Security Through Network Visualization”, Keylines.com, [Online] retrieved from the internet: <http://keylines.com/wp-content/uploads/2014/04/Visualizing-Threats1.pdf>, (May 12, 2014), 10 pgs.
Acklen, Laura, “Absolute Beginner's Guide to Microsoft Office Word 2003”, (Dec. 24, 2003), 15-18, 34-41, 308-316.
Ananiev, et al., “The New Modality API”, Sun Developer Network (SDN), [Online] retrieved from the internet: <http://web.archive.org/web/20061211011958/http://java.sun.com/developer/technicaiArticles/J2SE/Desktop/javase6/modality/>, (Jan. 21, 2006), 12 pgs.
Bluttman, et al., “Excel Formulas and Functions for Dummies”, Wiley Publishing, Inc. (2005), 280, 284-286.
Boyce, Jim, “Microsoft Outlook 2010 Inside Out”, https://capdtron.files.wordpress.com/2013/01/outlook-2010-inside_out.pdf, (Aug. 1, 2010), 1-1111.
Butkovic, Asmir, et al., “Using Whois Based Geolocation and Google Maps API for support cybercrime investigations”, Recent Advances in Telecommunications and Circuits, 194-200.
Canese, Kathi, et al., “The Bibliographic Database”, PubMed: Chapter 2: The NCBI Handbook, (Oct. 2002), 1-10.
Celik, T, “CSS Basic User Interface Module Level 3 (CSS3 UI)”, Section 8; Resizing and Overflow, [Online] retrieved from the internet: <http://www.w3.org/TR/2012/WD-css3-ui-20120117/#resizing-amp-overflow>, (Jan. 17, 2012), 1-58.
Chen, et al., “Bringing Order to the Web: Automatically Categorizing Search Results”, Proceedings of the SIGCHI conference on Human Factors in Computing Systems, The Hague, The Netherlands, (2000), 145-152.
Chung, Chin-Wan, “Dataplex: An Access to Heterogeneous Distributed Databases”, Communications of the ACM, Association for Computing Machinery, Inc., vol. 33, No. 1, (Jan. 1, 1990), 70-80.
Conner, Nancy, “Google Apps: The Missing Manual”, (May 1, 2008), 15 pgs.
Delcher, Arthur, et al., “Identifying Bacterial Genes and Endosymbiont DNA with Glimmer”, Biolnformatics, vol. 23, No. 6, (2007), 673-679.
Dramowicz, Ela, “Retail Trade Area Analysis Using the Huff Model”, Directions Magazine,, [Online] retrieved from the Internet: <http://www.directionsmag.com/articles/retail-trade-area-analysis-using-the-huff-mode1/123411>, (Jul. 2, 2005), 10 pgs.
Gesher, Ari, “Palantir screenshots in the wild: Swing Sightings”, [Online] Retrieved from the internet: <https://www.palantir.com/2007/09/palantir-screenshots/>, (Sep. 11, 2007), 1-12.
Goswami, Gautam, “Quite Writely Said!”, Blog: One Brick a Time, [Online]. Retrieved from the Internet: <URL: http://gautamg.wordpress.com/2006/08/21/quite-writely-said/>, (Aug. 2005), 7 pgs.
Griffith, Daniel A, et al., “A Generalized Huff Model”, Geographical Analysis, vol. 14, No. 2, (Apr. 1982), 135-144.
Hansen, D., et al., “Analyzing Social Media Networks with NodeXL: Insights from a Connected World”, Chapter 4, pp. 53-67 and Chapter 10, pp. 143-164,, (Sep. 2010), 53-67; 143-164.
Hardesty, Larry, “Privacy Challenges: Analysis: It's Surprisingly Easy to Identify Individuals from Credit-Card Metadata”, MIT News on Campus and Around the World, MIT News Office, (Jan. 29, 2015), 1-3.
Hibbert, et al., “Prediction of Shopping Behavior Using a Huff Model Within a GIS Framework”, (Mar. 18, 2011), 16 pgs.
Hogue, Andrew, et al., “Thresher: Automating the Unwrapping of Semantic Content from the World Wide Web”, 14th International Conference on World Wide Web, WWW 2005, (May 2005), 86-95.
Huang, Da Wei, et al., “Systematic and Integrative Analysis of Large Gene Lists Using DAVID Bioinformatics Resources”, Nature Protocols, 4.1, (Dec. 2008), 44-57.
Huff, et al., “Calibrating the Huff Model Using ArcGIS Business Analyst”, ESRI, (Sep. 2008), 33 pgs.
Huff, David L, “Parameter Estimation in the Huff Model”, ESRI, ArcUser, (2003), 34-36.
Kahan, J., et al., “Annotea: an open RDF Infrastructure for Shared Web Annotations”, Computer Networks vol. 39, No. 5, (2002), 589-608.
Kitts, Paul, “Chapter 14: Genome Assembly and Annotation Process”, The NCBI Handbook, (Oct. 2002), 1-21.
Levi, Micheal, “Money Laundering Risks and E-Gaming: A European Overview and Assessment”, [Online]. Retrieved from the Internet: <URL: http://www.egba.eu/pdf/Levi_Final_Money_Laundering_Risks_egaming%20280909.pdf>, (2009), 30 pgs.
Li, H., et al., “Interactive Multimodal Visual Search on Mobile Device”, IEEE Transactions on Multimedia, vol. 15, No. 3, (Apr. 1, 2014), 594-607.
Liu, T., “Combining GIS and the Huff Model to Analyze Suitable Locations for a New Asian Supermarket in the Minneapolis and St. Paul, Minnesota USA”, Papers in Resource Analysis, 2012, vol. 14, (2012), 8 pgs.
Madden, “Chapter 16: BLAST Sequence Analysis Tool”, The NCBI Handbook, (Oct. 2002), 1-15.
Manno, et al., “Introducing Collaboration in Single-user Applications through the Centralized Control Architecture”, (2010), 10 pgs.
Manske, “File Saving Dialogs”, [Online] retrieved from the internet: <http://www.mozilla.org/editor/ui specs/FileSaveDialogs.html>, (Jan. 20, 1999), 7 pgs.
Mizrachi, Ilene, “Chapter 1: GenBank: The Nucleotide Sequence Database”, The NCBI Handbook, (Oct. 2002), 1-14.
Nierman, Andrew, et al., “Evaluating Structural Similarity in XML Documents”, U of Michigan, (2002), 1-6.
Nolan, Richard, et al., “MCARTA: A Malicious Code Automated Run-Time Analysis Framework”, Homeland Security, 2012 IEEE Conference, (2012), 13-17.
Olanoff, Drew, “Deep Dive with the New Google Maps for Desktop with Google Earth Integration, It's More than Just a Utility”, Retrieved from the Internet: http://web.archive.org/web/20130515230641/http://techcrunch.com/2013/05/15/deep-dive-with-the-new-google-maps-for-desktop-with-google-earth-integration-its-more-than-just-a-utility/, (May 15, 2013), 1-6.
Palmas, Gregorio, et al., “An Edge-Bundling Layout for Interactive Parallel Coordinates”, 2014 IEEE Pacific Visualization Symposium, (2014), 57-64.
Perdisci, Roberto, et al., “Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces”, USENIX, (Mar. 18, 2010), 1-14.
Rouse, Margaret, “OLAP Cube”, [Online] retrieved from the internet: <http://searchdatamanagement.techtarget.com/definition/OLAP-cube>, (Apr. 28, 2012), 15 pgs.
Shi, Liang, et al., “A Scalable Implementation of Malware Detection Based on Network Connection Behaviors”, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, IEEE, (Oct. 10, 2013), 59-66.
Sigrist, Christian, et al., “Prosite, a Protein Domain Database for Functional Characterization and Annotation”, Nucleic Acids Research, vol. 38, (2010), D161-D166.
Sirotkin, Karl, et al., “Chapter 13: The Processing of Biological Sequence Data at NCBI”, The NCBI Handbook, (Oct. 2002), 1-11.
Thompson, Mick, “Getting Started with GEO”, (Jul. 26, 2011), 3 pgs.
Umagandhi, R., et al., “Search Query Recommendations Using Hybrid User Profile with Query Logs”, International Journal of Computer Applications, vol. 80, No. 10, (Oct. 1, 2013), 7-18.
Wright, Brandon, et al., “Palantir Technologies VAST 2010 Challenge Text Records-Investigations into Arms Dealing”, (Oct. 29, 2010), 10 pgs.
Xiv, Golem, “A word about banks and the laundering of drug money”, http://www.golemxiv.co.uk/2012/08/a-word-about-banks-and-the-laundering-of-drug-money/, (Aug. 18, 2012), 1-21.
Yang, Yudong, “HTML Page Analysis Based on Visual Cues”, 2001 IEEE, (2001), 859-864.
Provisional Applications (1)
Number Date Country
62273320 Dec 2015 US
Continuations (1)
Number Date Country
Parent 15139793 Apr 2016 US
Child 15423380 US