This non-provisional patent application relates to U.S. patent application Ser. No. 13/191,321, filed on Jul. 26, 2011, entitled “Systems and Methods of Distributed File Storage,” which is hereby incorporated by reference herein in its entirety.
The present technology relates generally to the exchanging of virtual rewards for computing resources, and more specifically, but not by way of limitation, to the provisioning of virtual rewards within a networked gaming environment in exchange for the computing resources (e.g., processing, memory, bandwidth, and so forth) of an end use computing system.
Virtual rewards within gaming environments are ubiquitous. These virtual rewards may be provided to the end user in exchange for actions conducted within the gaming environment or the purchase of game related products that are either intrinsic or extrinsic to the gaming environment. The composition of virtual rewards may depend upon the type of game played. For example, in a first-person shooter game a virtual reward may include weaponry, currency, health, and experience—just to name a few. Additionally, the type of virtual rewards provided within a gaming environment may depend on the design preferences of game designers or the demands of end users (e.g., gamers).
Additionally, gaming environments, especially networked gaming environments, such as a MMORPGs (massively multiplayer online role-playing games) require and consume a large amount of computing resources in order to facilitate game play. In contrast, the computing resources of end user computing systems used to play these online games may frequently be unused or underutilized. If dedicated back to the networked gaming system that is utilized to facilitate the networked gaming environment, these dedicated computing resources of end user computing systems may be utilized to reduce the operating expenses associated with the networked gaming system. End user computing systems may form a distributed computing environment that provides computing resources to the networked gaming system. To incentivize participation and dedication of computing resources, virtual rewards may be provided to the end user within the networked gaming environment. These and other advantages of the present technology will be described in greater detail herein.
According to some embodiments, the present technology may be directed to methods for exchanging virtual rewards for computing resources. These methods may comprise: (a) receiving access to a portion of computing resources of an end user computing system; and (b) providing a virtual reward within a networked gaming environment to an end user in exchange for utilizing an amount of the portion of the computing resources of the end user computing system.
According to other embodiments, the present technology may be directed to methods for exchanging virtual rewards for computing resources. These methods may comprise: (a) monitoring an amount of computing resources of an end user computing system utilized by a networked gaming environment over a given period of time; and (b) providing a virtual reward to an end user within the networked gaming environment when the amount of computing resources of the end user computing system utilized by the networked gaming environment over the given period of time exceeds a threshold value.
According to additional embodiments, the present technology may be directed to an online gaming system that facilitates a networked gaming environment. The online gaming system may comprise: (a) at least one server that is selectively coupleable to an end user computing system, the at least one server comprising a processor configured to execute instructions that comprise: (i) a resource manager that receives access to a portion of computing resources of an end user computing system for use in the networked gaming environment; and (ii) a reward module that provides a virtual reward within the networked gaming environment to an end user in exchange for an amount of the portion of the computing resources of the end user computing system that is utilized to facilitate operation of the networked gaming environment.
While this technology is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail several specific embodiments with the understanding that the present disclosure is to be considered as an exemplification of the principles of the technology and is not intended to limit the technology to the embodiments illustrated.
Generally speaking, the present technology may be configured to exchange virtual rewards for computing resources within the context of a networked gaming system. The networked gaming system may be implemented as a server-based or cloud-based gaming system that facilitates a networked gaming environment. An exemplary networked gaming environment may include an MMORPG, first-person shooter, or other networked program. As mentioned above, the implementation of these networked gaming environments requires a large amount of computational resources, such as processing capacity, memory, storage, network bandwidth, and so forth. As the complexity of the gaming environment increases and the number of end users increases, the computing resources necessary to facilitate game play must scale accordingly. Thus, the cost to administer the gaming environment also scales upwardly. Often times, these costs are passed onto the end user in the form of increased access fees and/or costly in-game products and services.
The present technology alleviates these drawbacks by allowing for the provision of virtual rewards within a gaming environment in exchange for an end user allowing the networked gaming system to utilize at least a portion of the computing resources of the end user computing system. The computing resources provided to the networked gaming system may include processing capacity, network bandwidth, storage space, and other computing resources that would be known to one of ordinary skill in the art with the present disclosure before them.
The virtual rewards that are provided to the end user may be provided within the networked gaming environment (e.g., videogame). The content of the virtual rewards may depend upon the subject matter of the gaming environment (e.g., type of videogame), preferences of game designers, demands of the end users, and so forth. Exemplary virtual rewards may include, but are not limited to, virtual currency, virtual items, gaming points, prioritized access to the networked gaming environment, or any combinations thereof. One of ordinary skill in the art will appreciate the limitless number of virtual rewards types that may be contemplated for use within a gaming environment.
An end user computing system 115 (shown within a plurality of end user computing systems) may be communicatively coupled to the server 110 via a network connection 120. It will be understood that the network connection 120 may include any private or public network such as the Internet.
When the end user computing system 115 is communicatively coupled to the server 110, the end user computing system 115 may allocate at least a portion of its computing resources to the server 110 (and in turn the networked gaming system 105) in exchange for one or more virtual rewards. In some instances when each of a plurality of end user computing systems have dedicated a portion of their resources to the server 110, the end user computing systems behave as a cloud-based computing environment or distributed computing system.
In general, a cloud-based computing environment is a resource that combines the computational power of a large grouping of processors and/or that combines the storage capacity of a large grouping of computer memories or storage devices. For example, systems that provide a cloud resource may be utilized exclusively by their owners. These systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud may be formed, for example, by a network of web servers, with each web server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads provided by multiple users (e.g., cloud resource consumers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depend on the type of business associated with the user.
According to some embodiments, the networked gaming system 105 may be generally described as a particular purpose computing environment that includes executable instructions stored in memory. These instructions, when executed by the processor exchange virtual rewards for computing resources. Advantageously, these virtual rewards may be provisioned within the networked gaming environment 130. The networked gaming system 105 may receive access to a portion of computing resources of an end user computing system and provide a virtual reward within a networked gaming environment to an end user in exchange for utilizing an amount of the portion of the computing resources of the end user computing system.
In some embodiments, the networked gaming system 105 may exchange virtual rewards for computing resources by monitoring an amount of computing resources of an end user computing system utilized by a networked gaming environment over a given period of time. Moreover, the networked gaming system 105 may provide a virtual reward to an end user within the networked gaming environment when the amount of computing resources of the end user computing system utilized by the networked gaming environment over the given period of time exceeds a threshold value.
According to some embodiments, the end user computing system 115 may allocate a portion of its resources to the networked gaming system 105 in a manner that is transparent to the end user. That is, the end user may authorize the networked gaming system 105 to utilize a portion of the computing resources of the end user computing system 115. The end user may also establish a usage period (e.g., a timeframe) for when these computing resources may be allocated. Once these parameters have been established, the networked gaming system 105 may utilize the computing resources without further involvement of the end user.
In other embodiments, the end user computing system 115 may comprise a resource allocation application 125 that is configured to allow end users of the end user computing system 115 to specify the amount and type of computing resources that are to be allocated to networked gaming system 105. The resource allocation application 125 may be configured to run inconspicuously (for example, in the system tray of the operating system) to the end user when the end user is not interacting with the resource allocation application 125, so as to be unobtrusive to the end user. Additionally, the resource allocation application 125 may be configured to generate graphical user interfaces that allow end users to configure the operating parameters of the resource allocation application 125. For example, the end user may utilize the resource allocation application 125 to specify which computing resources of the end user computing system 115 are to be allocated to the networked gaming system 105.
The end user may also selectively determine the times at which specified computing resources are allocated. For example, the end user may choose to allocate computing resources only when the user is not utilizing the end user computing system 115 (e.g., when the end user has logged out of the end user computing system, or when the end user computing system goes into screensaver mode). In other embodiments, the end user may allocate computing resources even when the end user is currently utilizing the end user computing system 115 and even when the end user is interacting with the networked gaming environment 130.
The resource allocation application 125 may provide allocated resource data to the networked gaming system 105 to indicate that allocated resources are available for use by the networked gaming system 105. The resource allocation application 125 may provide the end user with resource utilization data that corresponds to the amount of distributed resources of the end user computing system 115 that are currently being utilized by the networked gaming system 105. In some embodiments, the resource allocation application 125 may display an aggregate amount of resources that have been utilized by the networked gaming system 105 within a given period of time.
According to some embodiments, the networked gaming system 105 may include executable instructions for exchanging virtual rewards for the computing resources of the end user computing system 115. In some embodiments, the executable instructions may reside on the server 110 and may include a resource manager module 135 and a reward module 140. It is noteworthy that the server 110 may include additional modules, engines, or components, and still fall within the scope of the present technology. As used herein, the term “module” may also refer to any of an application-specific integrated circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
An additional consideration is the actual availability of the distributed resources of the end user computing system 115. For example, while the end user computing system 115 allocates computing resources to the networked gaming system 105, the end user computing system 115 may rarely be communicatively coupled to the networked gaming system 105 (typically through a front end server such as server 110). As such, the resource manager module 135 may be configured to evaluate not only the available computing resource allocation from the end user computing system 115, but also determine the actual availability of the computing resources of the end user computing system 115. This availability may include immediate/current availability or an analysis of the availability of the allocated computing resources over a given period of time.
For example, the resource allocation application 125 of the end user computing system 115 may specify an amount of allocated computing resources such as a certain percentage of CPU processing availability. In reality, the resource manager module 135 may determine that the CPU processing resources of the end user computing system 115 are rarely available. For example, the end user computing system 115 may be offline a considerable amount of time, or may be online only during off-peak periods (e.g., times when the workload of the networked gaming system is inherently low). Based upon the actual resource allocation data determined by the resource manager module 135, the reward module 140 may selectively vary the virtual rewards that are provided to the end user.
In some instances, virtual rewards may be provided to the end user upon the dedication of computing resources to the networked gaming system 105. That is, the end user may not be negatively affected by the fact that the networked gaming system 105 has not actually used the allocated resources.
According to some embodiments, the computing resources that are allocated by the end user computing system 115 may comprise any of processing, network bandwidth, or any combinations thereof. Additional types of computing resources that would be known to one of ordinary skill in the art are likewise contemplated for use in accordance with the present technology.
The resource manager module 135 may also be configured to calculate, over a period of time, a total amount of computing resources of the end user computing system utilized by the networked gaming environment 130. Based upon this calculation, the reward module 140 may select one or more virtual rewards based upon the total amount of the computing resources of the end user computing system utilized by the networked gaming environment 130. To incentivize end users to dedicate their computing resources to the networked gaming environment 130 the reward module 140 may be configured to provide virtual rewards of greater value (or amount) based upon the amount of computing resources that are allocated and/or utilized by the networked gaming environment 130. Thus, the reward module 140 may provision rare or “expensive” items to end users that dedicate a desirable amount of computing resources.
In some instances, the value of the virtual rewards may increase as additional portions of the computing resources are dedicated and utilized. For example, larger amounts of virtual currency may be provided to the end user as the end user dedicates additional computing resources. An end user that allocates 5% of their processing capacity may receive a first amount of virtual currency, while another end user that allocates 8% of their processing capacity may receive a second amount of virtual currency that is greater than the first amount of virtual currency.
In some instances, the reward module 140 may provide different virtual rewards to end users based upon the type of computing resource that has been allocated/utilized. For example, more valuable virtual rewards may be provided to end users that dedicated processing capacity relative to end users that only dedicate network bandwidth.
Additionally, the reward module 140 may provide a virtual reward that is based upon an operating period during which access to the computing resources has been allocated/utilized. For example, if an end user allocates computing resources during peak operating hours for the networked gaming environment 130, the virtual reward that is provided by the reward module 140 may be of greater value relative to a virtual reward provided to an end user that allocates computing resources during an off-peak time.
It will be understood that the virtual rewards that are provided to the end user may be provisioned by the reward module 140 within the context of the networked gaming environment 130. As mentioned briefly above, the reward module 140 may provide an almost limitless variety of virtual rewards to the end user. For example, virtual rewards may comprise any of virtual currency, virtual items, gaming points, prioritized access to the networked gaming environment, or any combinations thereof. In particular, virtual items may comprise, but are not limited to, virtual pets, experience points, health points, inventory, armor, weapons, clothing, unlocking codes, cheat codes, hidden game features, and so forth.
The networked gaming environment 130 may provide a dashboard that provides an end user with visual indicators that inform the end user of various metrics. These metrics may comprise dedicated/allocated computing resources, current utilization of allocated computing resources, utilization of allocated computing resources over a given period of time, virtual rewards that have been received, and so forth. For example, the dashboard may comprise a visual indication of the amount of the portion of the computing resources of the end user computing system that are being utilized. In further embodiments the dashboard may comprise a visual indication that virtual rewards have been provided to the end user.
Referring now to
Similar slider bars and graphical displays may be used for other computing resources such as Bandwidth and Storage, 335 and 340, respectively.
The dashboard 320 may also comprise a list 345 of virtual rewards that have been provided to the end user. For example, the end user is shown as having unlocked a CPU master achievement, ostensibly for either allocating a particular amount of CPU resources, the use of an amount of CPU resources by the networked gaming system 105, or a combination thereof. Other rewards such as avatar customization and virtual currency may be provided for other types of computing resource allocation/usage. The dashboard 320 may also include a notification 350 that informs the end user that a reward such as a weapon has been provisioned in response to either their allocation and/or usage of allocated resources.
Notifications may also be provided to end users via the dashboard that includes requests for end users to allocate resources. For example, if the network gaming system is in need of additional processing capacity, the dashboard may provide a notification to a plurality of end users requesting that the end users dedicate a portion of their processing capacities to the system. The request may include an indication that a virtual reward is available to end users that allocate the needed resources. In some instances, a selection of virtual rewards may be provided to the end user. Selecting one of the virtual rewards then provides the networked gaming system with access to the requested computing resource of the end user computing system.
According to some embodiments, the resource manager module 135 may monitor the reaction of end users to the provisioning of virtual rewards and adjust the provisioning of virtual rewards based upon such feedback. That is, the resource manager module 135 may tailor the type of virtual reward that is provided to the end user in order to entice or encourage the end user to dedicate a specific type or amount of a computing resource. For example, the resource manager module 135 may determine that end users readily dedicate more processing capacity when a particular virtual reward is provided. Thus, the resource manager module 135 may select the virtual reward based upon such feedback.
In addition to specifying the type and amount of computing resources that are to be allocated, the end user may also specify time frames that govern when specific computing resources are allocated for use.
Next, the method may comprise a step 210 of the network gaming system receiving access to a portion of computing resources of an end user computing system. This step 210 may comprise the end user computing system establishing a network connection with the network gaming system.
According to some embodiments, the method may comprise an optional step 215 of calculating, over a period of time, a total amount of the computing resources of the end user computing system utilized by a networked gaming environment. Step 215 may be followed by a subsequent optional step 220 of selecting the virtual reward based upon the total amount of the computing resources of the end user computing system utilized by the networked gaming environment.
Regardless of how the virtual reward has been selected, the method may comprise a step 225 of the network gaming system providing a virtual reward within a networked gaming environment to an end user in exchange for utilizing an amount of the portion of the computing resources of the end user computing system.
Again, in some instances, the virtual reward may be provided to the end user upon the end user allocating the computing resources, or alternatively, only after the allocated resources have actually be utilized by the network gaming system.
In addition to specifying the type and amount of computing resources that are to be allocated, the end user may also specify time frames that govern when specific computing resources are allocated for use.
The method 300 may also include a step 310 of establishing a threshold value for the provision of a virtual reward. For example, a threshold value may established which specifies that a virtual reward is to be provided to an end user when the networked gaming system has utilized 5% of processing capacity of the end user computing system for a total of ten hours. Different threshold values may be established for each type of computing resource. For example, the system may provide a virtual reward upon the network gaming system utilizing at least 20 megabytes of storage space on the end user computing system. According to some embodiments, the threshold value may comprise a series of tiered threshold values. For each tier level of the tiered threshold values, a different virtual reward may be provided to the end user. As the threshold values increase the value (or quantity) of the virtual reward(s) may be increased. For example, a first virtual reward may be provided to the end user when the network gaming system has utilized at least 5% of the processing capacity of the CPU of the end user computing system. A second virtual reward may be provided to the end user when the network gaming system has utilized at least 8% of the processing capacity of the CPU of the end user computing system, and a third virtual reward may be provided to the end user when the network gaming system has utilized at least 10% of the processing capacity of the CPU of the end user computing system. In sum, stepwise increases in allocated processing capacity may result in stepwise provisioning of virtual rewards. Additionally, combinations of allocated computing resources may warrant the provisioning of more valuable virtual rewards to the end user. For example, a virtual reward may be provided to the end user when the end user has allocated an amount of processing capacity along with an amount of network bandwidth. The virtual reward may have a greater value relative to another virtual reward that would have been provided to the end user if the end user had only allocated an amount of network bandwidth.
Next, the method 300 may comprise a step 315 of providing a virtual reward to an end user within the networked gaming environment when the amount of computing resources of the end user computing system utilized by the networked gaming environment over the given period of time exceeds a threshold value.
The components shown in
Mass storage device 430, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor 410. Mass storage device 430 can store the system software for implementing embodiments of the present technology for purposes of loading that software into main a memory store 420.
Portable storage medium drive(s) 440 operate in conjunction with a portable non-volatile storage medium, such as a floppy disk, compact disk or digital video disc, to input and output data and code to and from the computing system 400 of
Input devices 460 provide a portion of a user interface. Input devices 460 may include an alphanumeric keypad, such as a keyboard, for inputting alphanumeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the computing system 400 as shown in
Graphics display 470 may include a liquid crystal display (LCD) or other suitable display device. Graphics display 470 receives textual and graphical information, and processes the information for output to the display device.
Peripheral device(s) 480 may include any type of computer support device to add additional functionality to the computing system. Peripheral device(s) 480 may include a modem or a router.
The components contained in the computing system 400 of
Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the technology. Those skilled in the art are familiar with instructions, processor(s), and storage media.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the technology. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. The descriptions are not intended to limit the scope of the technology to the particular forms set forth herein. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments. It should be understood that the above description is illustrative and not restrictive. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the technology as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art. The scope of the technology should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5371852 | Attanasio et al. | Dec 1994 | A |
5384910 | Torres | Jan 1995 | A |
5943052 | Allen et al. | Aug 1999 | A |
6067545 | Wolff | May 2000 | A |
6330605 | Christensen et al. | Dec 2001 | B1 |
6374336 | Peters et al. | Apr 2002 | B1 |
6380933 | Sharir et al. | Apr 2002 | B1 |
6434398 | Inselberg | Aug 2002 | B1 |
6456304 | Angiulo et al. | Sep 2002 | B1 |
6466275 | Honey et al. | Oct 2002 | B1 |
6561811 | Rapoza et al. | May 2003 | B2 |
6571216 | Garg et al. | May 2003 | B1 |
6597375 | Yawitz | Jul 2003 | B1 |
6629129 | Bookspan et al. | Sep 2003 | B1 |
6699127 | Lobb et al. | Mar 2004 | B1 |
6760042 | Zetts | Jul 2004 | B2 |
6760595 | Inselberg | Jul 2004 | B2 |
6772195 | Hatlelid et al. | Aug 2004 | B1 |
6864886 | Cavallaro et al. | Mar 2005 | B1 |
6928485 | Krishnamurthy et al. | Aug 2005 | B1 |
6996413 | Inselberg | Feb 2006 | B2 |
6999083 | Wong et al. | Feb 2006 | B2 |
7075556 | Meier et al. | Jul 2006 | B1 |
7133051 | Sloo et al. | Nov 2006 | B2 |
7219160 | Buchsbaum et al. | May 2007 | B1 |
7350158 | Yamaguchi et al. | Mar 2008 | B2 |
7390254 | Hirai | Jun 2008 | B2 |
7458894 | Danieli et al. | Dec 2008 | B2 |
7490314 | Yuknewicz et al. | Feb 2009 | B2 |
7492363 | Meier et al. | Feb 2009 | B2 |
7506318 | Lindo et al. | Mar 2009 | B1 |
7632186 | Spanton et al. | Dec 2009 | B2 |
7719971 | Issa | May 2010 | B1 |
7729992 | Rose | Jun 2010 | B2 |
7844301 | Lee et al. | Nov 2010 | B2 |
7890701 | Lowery et al. | Feb 2011 | B2 |
7917632 | Lee et al. | Mar 2011 | B2 |
7970820 | Sivasubramanian et al. | Jun 2011 | B1 |
8001063 | Tesauro et al. | Aug 2011 | B2 |
8025569 | Nguyen et al. | Sep 2011 | B2 |
8025572 | Spanton et al. | Sep 2011 | B2 |
8128469 | Hormigo Cebolla et al. | Mar 2012 | B2 |
8128503 | Haot et al. | Mar 2012 | B1 |
8130747 | Li et al. | Mar 2012 | B2 |
8235817 | Zalewski | Aug 2012 | B2 |
20010036356 | Weaver et al. | Nov 2001 | A1 |
20010055991 | Hightower | Dec 2001 | A1 |
20020002074 | White et al. | Jan 2002 | A1 |
20020032056 | Oh | Mar 2002 | A1 |
20020097984 | Abecassis | Jul 2002 | A1 |
20020183115 | Takahashi et al. | Dec 2002 | A1 |
20020198769 | Ratcliff, III | Dec 2002 | A1 |
20030038805 | Wong et al. | Feb 2003 | A1 |
20030084462 | Kubota et al. | May 2003 | A1 |
20030220143 | Shteyn et al. | Nov 2003 | A1 |
20040087363 | Bogenn | May 2004 | A1 |
20040116183 | Prindle | Jun 2004 | A1 |
20040153569 | Savathphoune | Aug 2004 | A1 |
20040192354 | Sawano | Sep 2004 | A1 |
20040248631 | Hirai | Dec 2004 | A1 |
20040259627 | Walker et al. | Dec 2004 | A1 |
20050020359 | Ackley et al. | Jan 2005 | A1 |
20050071736 | Schneider et al. | Mar 2005 | A1 |
20050091597 | Ackley | Apr 2005 | A1 |
20050227771 | Nelson et al. | Oct 2005 | A1 |
20060058103 | Danieli et al. | Mar 2006 | A1 |
20060098013 | Wong et al. | May 2006 | A1 |
20060170778 | Ely et al. | Aug 2006 | A1 |
20060206565 | Ganesan et al. | Sep 2006 | A1 |
20060258446 | Nguyen et al. | Nov 2006 | A1 |
20070055694 | Ruge et al. | Mar 2007 | A1 |
20070063995 | Bailey et al. | Mar 2007 | A1 |
20070117617 | Spanton et al. | May 2007 | A1 |
20070117635 | Spanton et al. | May 2007 | A1 |
20070250901 | McIntire et al. | Oct 2007 | A1 |
20070256030 | Bedingfield, Sr. | Nov 2007 | A1 |
20070298878 | Short | Dec 2007 | A1 |
20080026839 | Alringer | Jan 2008 | A1 |
20080052384 | Marl et al. | Feb 2008 | A1 |
20080119286 | Brunstetter et al. | May 2008 | A1 |
20080125226 | Emmerson | May 2008 | A1 |
20080126357 | Casanova et al. | May 2008 | A1 |
20080146339 | Olsen et al. | Jun 2008 | A1 |
20080146342 | Harvey et al. | Jun 2008 | A1 |
20090005196 | Kessler et al. | Jan 2009 | A1 |
20090017750 | Marcinkiewicz | Jan 2009 | A1 |
20090031227 | Chakrabarti et al. | Jan 2009 | A1 |
20090044113 | Jones et al. | Feb 2009 | A1 |
20090083662 | Fitzmaurice et al. | Mar 2009 | A1 |
20090083665 | Anttila et al. | Mar 2009 | A1 |
20090100366 | Fitzmaurice et al. | Apr 2009 | A1 |
20090118017 | Perlman et al. | May 2009 | A1 |
20090118018 | Perlman et al. | May 2009 | A1 |
20090118019 | Perlman et al. | May 2009 | A1 |
20090118020 | Koivisto et al. | May 2009 | A1 |
20090124387 | Perlman et al. | May 2009 | A1 |
20090144380 | Kallman et al. | Jun 2009 | A1 |
20090172171 | Amir | Jul 2009 | A1 |
20090208181 | Cottrell | Aug 2009 | A1 |
20090215531 | Perlman et al. | Aug 2009 | A1 |
20090215540 | Perlman et al. | Aug 2009 | A1 |
20090249189 | Jania et al. | Oct 2009 | A1 |
20090254998 | Wilson | Oct 2009 | A1 |
20090265473 | Hydrie et al. | Oct 2009 | A1 |
20090290753 | Liu et al. | Nov 2009 | A1 |
20090297118 | Fink et al. | Dec 2009 | A1 |
20090326970 | Estrada et al. | Dec 2009 | A1 |
20100014825 | Curtis et al. | Jan 2010 | A1 |
20100031333 | Mitchell et al. | Feb 2010 | A1 |
20100041475 | Zalewski et al. | Feb 2010 | A1 |
20100064008 | Yan et al. | Mar 2010 | A1 |
20100100849 | Fram | Apr 2010 | A1 |
20100150120 | Schlicht et al. | Jun 2010 | A1 |
20100154050 | Mukkara et al. | Jun 2010 | A1 |
20100167809 | Perlman et al. | Jul 2010 | A1 |
20100167816 | Perlman et al. | Jul 2010 | A1 |
20100169964 | Liu et al. | Jul 2010 | A1 |
20100174782 | Rose | Jul 2010 | A1 |
20100281095 | Wehner et al. | Nov 2010 | A1 |
20100281432 | Geisner et al. | Nov 2010 | A1 |
20110013087 | House et al. | Jan 2011 | A1 |
20110028194 | Tang et al. | Feb 2011 | A1 |
20110029932 | McKaskle et al. | Feb 2011 | A1 |
20110055222 | Choudur et al. | Mar 2011 | A1 |
20110059818 | Blais et al. | Mar 2011 | A1 |
20110093600 | Lee et al. | Apr 2011 | A1 |
20110105226 | Perlman | May 2011 | A1 |
20110111854 | Roberts et al. | May 2011 | A1 |
20110145880 | Wang | Jun 2011 | A1 |
20110151971 | Altshuler et al. | Jun 2011 | A1 |
20110161666 | Gladwin et al. | Jun 2011 | A1 |
20110202562 | Bloch et al. | Aug 2011 | A1 |
20110238618 | Valdiserri et al. | Sep 2011 | A1 |
20110263333 | Dokei et al. | Oct 2011 | A1 |
20110275431 | Hirzel et al. | Nov 2011 | A1 |
20110295666 | Musial et al. | Dec 2011 | A1 |
20120054002 | Rotbard et al. | Mar 2012 | A1 |
20120054685 | Su et al. | Mar 2012 | A1 |
20120130863 | Tedjamulia et al. | May 2012 | A1 |
20120142433 | Perlman et al. | Jun 2012 | A1 |
20120149476 | Perlman et al. | Jun 2012 | A1 |
20120151346 | McClements, IV | Jun 2012 | A1 |
20120151347 | McClements, IV | Jun 2012 | A1 |
20120204107 | Salinas | Aug 2012 | A1 |
20120311624 | Oskolkov et al. | Dec 2012 | A1 |
20130084970 | Geisner et al. | Apr 2013 | A1 |
Number | Date | Country |
---|---|---|
102005034692 | Feb 2007 | DE |
1879381 | Jan 2008 | EP |
2004362149 | Dec 2004 | JP |
9712342 | Apr 1997 | WO |
2006076075 | Jul 2006 | WO |
Entry |
---|
“CPUsage wants to harness idle computer power for others to use” written by D.K. Row, available on or before Jul. 2012 and retrieved from URL <http://www.oregonlive.com/small-business/index.ssf/2012/07/cpusage—wants—to—harness—idle.html>, 3 pages. |
“CPUsage: Let Your PC Earn Money for You” written by Lambert Varias, available on or before Aug. 26, 2011 and retrieved from URL <http://technabob.com/blog/2011/08/26/cpusage-make-money-with-your-pc/>, 3 pages. |
“Need cash? Forget plasma, and donate CPU time instead” written by Stacey Higginbotham, available on or before Jul. 11, 2011 and retrieved from URL <http://gigaom.com/cloud/need-cash-forget-plasma-and-donate-cpu-time-instead/>, pages. |
“Info on Points and Redemption” written by Jeff Martens, available on or before Jul. 20, 2011 and retrieved from URL <http://www.cpusage.com/blog/computer-owners/info-on-points-and-redemption/>, 1 page. |
Abd Ei-Sattar. A Novel Interactive Computer-Based Game Framework: From Design to Implementation. 2008 International Conference Visualisation [Online] 2008, pp. 123-128. |
Blevins. Neverwinter Nights—PC Review at IGN—p. 2. http://pc.ign.com/articles/363/363038p2.html (accessed Aug. 12, 2011). |
Haynes. Dead Space Review—Xbox 360 Review at IGN—pp. 2 & 3. http://xbox360.ign.com/articles/918/918892p2.html & http://xbox360.ign.com/articles/918/918892p3.html (accessed Aug. 12, 2011). |
Hernandez et al. WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching Task. 2011 Eighth International Conference on Information Technology: New Generations [Online] 2011. |
Raskin. Graph Plus. PC Magazine [Online] Oct. 17, 1989. V8, N17, p. 102(3). |
Rowe et al. A Framework for Narrative Adaptation in Interactive Story-Based Learning Environments. Proceedings of the Intelligent Narrative Technologies III Workshop [Online] 2010. |
Ludwig et al., “XEP-0166: Jingle,” XMPP Standards Foundation. pp. 1-53. Dec. 23, 2009. |
Rosenberg, “Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols,” Internet Engineering Task Force (IETF). pp. 1-117, Apr. 2010. |
Zhou et al., “A Method of View-Frustum Culling with OBB Based on Octree,” IET Conference on Wireless, Mobile and Sensor Networks 2007, pp. 680-682, Jan. 1, 2007. XP55023509. |
World of Warcraft Gold, Anything About WOW, Apr. 23, 2007. retrieved from the internet: http://wowgolds.wordpress.com/2007/04/23/how-to-take-and-make-screenshots/ (accessed on Mar. 30, 2012) XP002672710. |
Extended European Search Report with mail date of Mar. 30, 2012, re European Application No. 12151200.8 filed Jan. 16, 2012. |
“Algemagorgic Non-Modal Context Menu,” CodeGuru, May 22, 2004. retrieved from the internet: http://forums.codeguru.com/showthread.php?t=295801 (accessed on Apr. 27, 2012) XP002675225. |
“Context Menu,” Wikipedi, the free encyclopedia, Jun. 16, 2010. retrieved from the internet: http://en.wikipedia.org/w/index.php?title=Context—menu&oldid=368337587 (accessed on May 3, 2012) XP002675226. |
“Maptool Concepts: The Next UI, Look, and Feel,” RPTools.net, Feb. 2010. retrieved from the internet: http://forums.rptools.net/viewtopic.php?f=7&t=13178&sid=107ad2f90d833d6b5669fbeO3587b091&start=45 (accessed May 3, 2012) XP002675227. |
“Pie Menu,” Wikipedia, the free encyclopedia, Jul. 5, 2010. retrieved from the internet: http://en.wikipedia.org/w/index.php?title=Pie—menu&oldid=371797903 (accessed May 3, 2012) XP002675228. |
“Modal Window,” Wikipedia, the free encyclopedia, Aug. 18, 2010. retrieved from the internet: http://en.wikipedia.org/w/index.php?title=Modal—window&oldid=379626221 (accessed on May 3, 2012) XP002675229. |
Extended European Search Report with mail date of May 4, 2012, re European Application No. 11006996.0 filed Aug. 26, 2011. |
“CPUsage wants to harness idle computer power for others to use” written by O.K. Row, available on or before Jul. 2012 and retrieved from URL <http://www.oregonlive.com/small-business/index.ssf/2012/07/cpusage—wants—to—harness—idle.html>, 3 pages. |
“Need cash? Forget plasma, and donate CPU time instead” written by Stacey Higginbotham, available on or before Jul. 11, 2011 and retrieved from URL <http://gigaom.com/cloud/need-cash-forget-plasma-and-donate-cpu-time-instead/>. |
“Info on Points and Redemption” written by Jeff Martens, available on or before Jul. 20,2011 and retrieved from URL<http://www.cpusage.com/blog/computer-owners/info-on-points-and-redemption/>, 1 page. |
“Apr./May 2011 Admin Requirement Application—Europe.” 13d.net. Online. Apr. 24, 2011. Accessed via the Internet Accessed Nov. 8, 2012. <URL: http://forum.i3d.net/battlefield-heroes-ranked-community-servers/170034-apr-may-2011-admin-requirement-application-europe.html#post1270013>. |
BlamDarot, “Achievement Screenshotter”, World of Warcraft Mod, Created Jul. 3, 2009, Last Updated Nov. 4, 2010, description accessed at http://wow.curseforge.com/addons/achievement-screenshotter on Feb. 15, 2013. |
Rytych, “Game-like environments for nuclear engineering education using GECK”, 1st International Nuclear & Renewable Energy Conference (INREC), pp. 1-5, IEEE, Mar. 2010. |
Extended European Search Report with mail date of Dec. 3, 2012, re European Application No. 12170191.6 filed May 31, 2012. |
Zhang, J. et al “WindTalker: A P2P-Based Low-Latency Anonymouns Communication Network,” IEICE Transactions on Communications, Communications Society, Tokyo, JP, vol. E92B, No. 10, Oct. 1, 2009, pp. 3183-3194. |
Extended European Search Report with mail date of Jan. 8, 2013, re European Application No. 12170200.5 filed May 31, 2012. |
International Search Report mailed Feb. 21, 2013 in application No. PCT/US2012/20007, filed Jan. 12, 2012. |
“Neverwinter Nights Platinum”. Game Manual. Copyright 2004, Atari Interactive, Inc. 114 pages. |
“Horse menu”. Neverwinter Nights Wiki page. Http://nwnwikia.com/wiki/Horse—menu. 2 pages. |
“Counter Strike Manual” published on or before May 15, 2006, and retrieved from URL <http://web.archive.org/web/20060515161034/http://voidclan.tripod.com/csmanual.htm>, 17 pages. |
“Spectator FAQ” published on or before Nov. 11, 2011 and retrieved from URL <http://web.archive.org/web/201111110125011/http://na.leagueoflegends.com/spectator-faq>, 4 pages. |
“Killcam Description for Call of Duty” published on or before Nov. 11, 2011 and retrieved from URL <http://web.archive.org/web20111126172904/http:/callofduty.wikia.com/wiki/Kilcam>, 7 pages. |
“Counter-Strike” game description published on or before Nov. 21, 2010 and retrieved from URL <http://web.archive.org/web/20101121144545/http://en.wikipedia.org/wiki/Counter-Strike>, 6 pages. |
“Official Rules of Baseball—2011 Edition”. Major League Baseball. Feb. 16, 2011. Retrieved from the internet. Retrieved Jun. 1, 2013. <URL:http://web.archive.org/web/20120112040330/http://mlb.mlb.com/mlb/official—info/official—rules/foreword.jsp>. |
Murph, Darren. “Editorial: ESPN bypasses corporate red tape with iPad and Xbox 360, wannabe innovators should take note” Jun. 12, 2010. <http://www.engadget.com/2010/06/12/editorial-espn-bypasses-corporate-red-tape-with-ipad-and-xbox-3/>. |
Point-HD Telestrator with Ipad. <http://www.hdtelestrators.com/Ipad%20Telestrator.html>. |
Bloviator, “America's Army Training Guide”, www.gamefaqs.com, Online, Mar. 24, 2008, Accessed via the Internet Sep. 13, 2013, <URL: http://www.gamefaqs.com/pc/561551-americas-army/faqs/45333>. |