A computer implemented gambling chip recognition system having the ability to capture an image of a stack of gambling chips and automatically processing the image to determine the number of chips within the stack and the value of each. The system processor determines the classification for each chip in a stack by way of processing performed in real time on the image of the stack of gambling chips. The system further includes the ability to communicate the information derived from the stack of gambling chips to a video monitor and the ability to communicate the information to a main database where information is being compiled and stored about an individual gambler.
A computer implemented gambling chip recognition system having the ability to capture an image of a stack of gambling chips and automatically processing the image to determine the number of chips within the stack and the value of each. The system processor determines the classification for each chip in a stack by way of processing performed in real time on the image of the stack of gambling chips. The system further includes the ability to communicate the information derived from the stack of gambling chips to a video monitor and the ability to communicate the information to a main database where information is being compiled and stored about an individual gambler.
A computer implemented gambling chip recognition system having the ability to capture an image of a stack of gambling chips and automatically processing the image to determine the number of chips within the stack and the value of each. The system processor determines the classification for each chip in a stack by way of processing performed in real time on the image of the stack of gambling chips. The system further includes the ability to communicate the information derived from the stack of gambling chips to a video monitor and the ability to communicate the information to a main database where information is being compiled and stored about an individual gambler.
A computer implemented gambling chip recognition system having the ability to capture an image of a stack of gambling chips and automatically processing the image to determine the number of chips within the stack and the value of each. The system processor determines the classification for each chip in a stack by way of processing performed in real time on the image of the stack of gambling chips. The system further includes the ability to communicate the information derived from the stack of gambling chips to a video monitor and the ability to communicate the information to a main database where information is being compiled and stored about an individual gambler.
Thomas Lindquist - Eden Prairie MN, US William Preska - Woodbury MN, US
International Classification:
G06K 9/40
US Classification:
382254000, 382128000
Abstract:
A method of and system for controlling image quality in a digital image printing system, such as a medical image printing system, is provided a digital medical image including a set of pixels, each of which has a pixel value, is acquired from a medical image source. A medical image printer prints the medical image on media to produce a medical image print. A device measures the density of at least a subset of the set of pixels on said medical image print to produce a measured density image. There is calculated for at least the subset of the set of pixels of the digital medical image a predicted density image. The measured density image and the predicted density image are compared to produce density corrections, if any; and any density corrections are used in printing subsequent digital medical images to improve image quality thereof.
- Minneapolis MN, US Thomas Anthony Lindquist - Minnetonka MN, US
International Classification:
H04L 29/06
Abstract:
Disclosed in some examples are methods, systems, machine-readable mediums, and computing devices for improved network security for network-based services. A firewall service protecting one or more provider computing devices that providing the network-based service may block all traffic by default. This prevents any network intrusions. A client computing device wishing to access a network-based service contacts an authority computing device of the network-based service. If the client computing device is authenticated by the authority computing device, the authority device provides a network address of a provider computing device which provides the network-based service for the account that was authenticated. The authority computing device also sends a message to a firewall service providing the firewall for the provider computing device to open a temporary hole in the firewall for the client computing device.
- Minneapolis MN, US Thomas Anthony Lindquist - Minnetonka MN, US David Gibbens - Forest Lake MN, US
International Classification:
G06F 16/185 G06F 21/62 G06F 16/17 G06N 3/08
Abstract:
Systems and techniques for three-dimensional file event representation are described herein. File event data may be obtained for a file for a time segment. The file event data may include a file system hierarchy for the file. A spatial file operation map may be generated for the file system hierarchy including a file operation map for the file for the time segment. The file operation map for the file may include a plurality of layers with each layer of the plurality of layers representing a file operation class available for the file. It may be determined that a file operation was performed on the file during the time segment based on the file event data. An indication may be generated on a layer of the plurality layers of the file operation map that the file operation was performed. The layer corresponds to a file operation class of the file operation.
- Minneapolis MN, US Brian Bispala - Minneapolis MN, US Samuel Schroeder - Minneapolis MN, US Christopher Gwinn - Minneapolis MN, US Justin Grammens - St. Paul MN, US Thomas Lindquist - Minneapolis MN, US Peter Lindquist - St. Paul MN, US
Disclosed in some examples are predictive storage techniques for use in a distributed data system. The predictive storage techniques may be used to manage locally stored elements of a shared data collection, such as the storage of files on nodes of the distributed data system that are limited in local storage space. The predictive storage techniques may achieve a balance between consumption of local resources and timely access of important elements in the shared data collection. For example, the predictive storage techniques may be used for keeping or pre-caching certain items of a collection that are determined as likely to be used in local storage for convenient access, and allowing access the remaining items on request over a network.
Lindquist Systems Inc Business Consulting Services Custom Computer Programing
16750 Baywood Ter, Edina, MN 55346 9529341016
Thomas R Lindquist Director, Communications
Lockheed Martin Corporation Mfg Electronic Computers
3655 Tampa Rd, Oldsmar, FL 34677 3333 Pilot Knob Rd, Saint Paul, MN 55121 PO Box 64525, Saint Paul, MN 55164 6514562222, 8138547220, 8138547225, 6514563098
Thomas Lindquist Owner
T N J CONSTRUCTION LLC Single-Family House Construction
7577 208 St N, Forest Lake, MN 55025 7577 208 St N, Lino Lakes, MN 55025 6128127468
Thomas M. Lindquist Executive VP, Chief Operating Offi, Executive Vice Presi