Evans H. Nguyen - Issaquah WA, US Jonathan P. Morrow - Mill Creek WA, US Jason R. Crowe - Milwaukee WI, US Zachary P. Haas - Seattle WA, US James V. Curtin - Seattle WA, US
International Classification:
G01R 1/04
US Classification:
324126
Abstract:
Clamp meter with detachable clamp and a clamp storage area. The clamp meter includes a clamp and a housing. The clamp includes a measurement end and a handle portion. The measurement end includes a first measurement portion and a second measurement portion. The handle portion includes a first handle and a second handle. The housing includes a recess configured to removably receive the clamp when the clamp is not in use. The housing is connected to the clamp via a cord. When the clamp is received in the recess, the first measurement portion and the second measurement portion are positioned completely within the recess, the first handle and the second handle extend at least partially from the recess, and the recess prevents the clamp from being used. The clamp is capable of being removed from the recess in a one-handed use position.
Jonathan P. Morrow - Mill Creek WA, US Evans H. Nguyen - Renton WA, US Hu Zenghong - Taian City, CN Lin Jianqin - Tianshui City, CN
International Classification:
G01R 31/44
US Classification:
324414
Abstract:
A combination lighting tester tool. The combination lighting tester tool includes at least three independent testing tools for identifying and diagnosing a problem in a lighting system. For example, the tester includes a lamp testing function in which a high voltage test signal is generated and transmitted using an antenna. When the test signal is in proximity to a gas filled lamp, the voltage is of sufficient magnitude to ionize the gas inside the lamp, causing the lamp to illuminate. The tester also includes a ballast testing function in which the power lines or wires connecting a ballast to a lamp or lighting fixture are tested, and a filament tester for testing the filaments in a lamp for continuity or resistance. The tester also includes a worklight for illuminating an area under test and one or more display devices (e.g., LEDs, an LCD display, or the like) which provide an indication of, for example, a test being performed or a result of a test.
Using Machine Learning Algorithm To Ascertain Network Devices Used With Anonymous Identifiers
- Bellevue WA, US Douglas Galagate - Bellevue WA, US Eric Yatskowitz - Seattle WA, US Chuong Phan - Seattle WA, US Tatiana Dashevskiy - Edmonds WA, US Prem Kumar Bodiga - Bothell WA, US Noah Dahlstrom - Seattle WA, US Ruchir Sinha - Newcastle WA, US Jonathan Morrow - Issaquah WA, US Aaron Drake - Sammamish WA, US
Assignee:
T-Mobile USA, Inc. - Bellevue WA
International Classification:
G06F 21/62 H04L 29/06 H04L 29/08 H04W 12/02
Abstract:
Techniques for identifying certain types of network activity are disclosed, including parsing of a Uniform Resource Locator (URL) to identify a plurality of key-value pairs in a query string of the URL. The plurality of key-value pairs may include one or more potential anonymous identifiers. In an example embodiment, a machine learning algorithm is trained on the URL to determine whether the one or more potential anonymous identifiers are actual anonymous identifiers (i.e., advertising identifiers) that provide advertisers a method to identify a user device without using, for example, a permanent device identifier. In this embodiment, a ranking threshold is used to verify the URL. A verified URL associate the one or more potential anonymous identifiers with the user device as actual anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic.
Ascertaining Network Devices Used With Anonymous Identifiers
- Bellevue WA, US Prem Kumar Bodiga - Bellevue WA, US Noah Dahlstrom - Bellevue WA, US Ruchir Sinha - Newcastle WA, US Jonathan Morrow - Seattle WA, US Aaron Drake - Sammamish WA, US Chuong Phan - Seattle WA, US
International Classification:
G06F 21/62 H04L 29/06 H04L 29/08 H04W 12/02
Abstract:
Techniques for identifying certain types of network activity are disclosed, including parsing network traffic to automatically recognize anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic, and to identify topics relevant to a user of a particular network device so that communications to such a user are more likely to relate to a topic of interest to the user.
- Bellevue WA, US Jonathan Patrick Morrow - Issaquah WA, US
Assignee:
T-Mobile USA, Inc. - Bellevue WA
International Classification:
G06Q 30/02
Abstract:
A method includes receiving identification information with a first electronic device and via a network, wherein the identification information is unique to a particular user device accessing webpage content, determining whether the identification information matches an identifier of a plurality of identifiers stored in a memory associated with the first electronic device, generating a reliability metric based on the determining, and providing the reliability metric to a second electronic device different from the first electronic device via the network. In such methods, the reliability metric is accessible by at least one bidder during a real-time auction associated with the webpage content.
Application Session Event Inference From Network Activity
- Bellevue WA, US Ruchir Sinha - Newcastle WA, US Jonathan Patrick Morrow - Issaquah WA, US Prem Kumar Bodiga - Bellevue WA, US Ijaz Ahamed Meeran Abdul Jabbar - Bellevue WA, US
A computing system may automatically infer one or more events that occur during an application session involving activity on a network, such as the Internet. Such an application session may be interactions with, for example, social networking websites, banking websites, news websites, and so on. Events are any of a number of activities or transactions that may occur during the application session. The computing system may automatically infer an event by gathering network transaction data for network transactions performed by one or more client devices of a wireless communication network. The computing system may generate a network activity signature based, at least in part, on the network transaction data and apply pattern recognition and/or machine learning to the network activity signature to infer events associated with the network activity signature.
Identifying User Intention From Encrypted Browsing Activity
- Bellevue WA, US Ruchir Sinha - Newcastle WA, US Prem Kumar Bodiga - Bellevue WA, US Ijaz Ahamed - Bellevue WA, US Jonathan Morrow - Seattle WA, US
International Classification:
G06F 17/30
Abstract:
Techniques for understanding a user's intentions when the user is searching web sites on the Internet are disclosed. Although search queries are typically encrypted so they cannot be understood by entities other than the user and a host of a search engine being used, the present techniques describe ways that a third party can infer user intentions from encrypted activity. Determination of user intentions in ways described herein can be used to provide content to a user that may be of particular interest to the user. Furthermore, provision of such content is thereby not limited to a host of a search engine, as is typically the case when only the host can comprehend content of search queries.
Ascertaining Network Devices Used With Anonymous Identifiers
- Bellevue WA, US Prem Kumar Bodiga - Bellevue WA, US Noah Dahlstrom - Bellevue WA, US Ruchir Sinha - Newcastle WA, US Jonathan Morrow - Seattle WA, US Aaron Drake - Sammamish WA, US Chuong Phan - Seattle WA, US
International Classification:
G06F 21/62 H04L 29/06 H04W 12/02 H04L 29/08
Abstract:
Techniques for identifying certain types of network activity are disclosed, including parsing network traffic to automatically recognize anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic, and to identify topics relevant to a user of a particular network device so that communications to such a user are more likely to relate to a topic of interest to the user.
Youtube
How Do We Know God Exists? | Jonathan Morrow
How do we know that God exists? There are actually many powerful reaso...
Duration:
2m 16s
Do All Roads Lead to God? | Jonathan Morrow
It has become increasingly popular to make the claim that "all roads l...
Duration:
1m 36s
How Do We Understand and Reach Gen Zers? A Co...
What does the latest research show about the beliefs and behavior of G...
Duration:
1h 3m 54s
10 Reasons We Resist Biblical Authority (with...
READ (Article): "The Biggest Issue We Face in the Church Today," by Jo...
Duration:
1h 10m 46s
How to Make Sense of Challenging Passages in ...
If you've ever read the Bible, you've probably come across a passage t...
Lana Spencer, Judy Cole, Linda Harward, Terry Lassen, Debbie Yow, Wayne Wicker, Lura Guerard, Jean Thomas, Rick Causey, Connie Bowlin, Tilda Johnson, Stella Burns