At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Using stages to handle dependencies in parallel tasks
Technologies are described herein for using stages for managing dependencies between tasks executed in parallel. A request for permission to execute a task from...
Driver installation for targeted and non-present devices
A computer-implemented method for managing device drivers includes requesting a device driver update set for a plurality of devices connectable to a computing...
Custom compound types in declarative programs
The present invention extends to methods, systems, and computer program products for creating and manipulating custom compound data types in declarative...
Type system for declarative data scripting language
An efficient, logical and expressive type system is provided for flexibly defining types of a declarative programming language so that efficient and...
Generated object model for test automation
A generated object model engine abstracts actions, used in test cases, in a manner to produce new object model types that are independent of an underlying code...
Media files including programming code and description
The description relates to media files and more particularly to media files that include a program and a human-understandable description of the program. One...
Spatial layout of hierarchical shared resources
A hierarchical shared resources spatial visualization system and method including a visualization runtime user interface that quickly and efficiently displays a...
Creating and maintaining images of browsed documents
Embodiments automatically create dynamic thumbnail images corresponding to accessed web pages. Thumbnails, snapshots, or other images are generated for each of...
Sequential layout builder
Layout processing techniques have been described that allow processing of structured documents to be conducted, and for associated layout to be accomplished in...
Error report processing using call stack similarity
Techniques for error report processing are described herein. Error reports, received by a developer due to program crashes, may be organized into a plurality of...
Controlling access to software component state
A request is received from a software component of a software product to access a value of a public setting of the software component. A check is made as to...
Management of ownership control and data movement in shared-memory systems
A method to exchange data in a shared memory system includes the use of a buffer in communication with a producer processor and a consumer processor. The cache...
Accessory device architecture
An accessory device architecture is described. In one or more implementations, data is received from an accessory device at an intermediate processor of a...
Automatically provisioning a WWAN device
Network connection information is requested by a wireless wide area network device via the internet. Such information may include configuration information,...
Determining whether a device is inside a network
A network address of a computing device is obtained, and an unencrypted request is sent to a resource access manager of a particular network. If both a response...
Session monitoring of virtual desktops in a virtual machine farm
Disclosed are techniques for determining the status of virtual machine sessions on a computing device for a user by reading from a memory location written to by...
Capturing a computing experience
The described implementations relate to capturing a computing experience. In one case, a user session capture tool can launch a remote user session where a...
Providing a witness service
Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that...
Document sharing through browser
Presenters are enabled to broadcast a document to remote viewers from one browser to another. While viewing a document in the web browser, a user can share the...
Asynchronous queued messaging for web applications
Various embodiments enable local web applications to communicate asynchronously with web based services and applications based on a local device's current state...
Email confirmation page for social network notifications
A communication confirmation message provides social networking events in combination with information regarding addresses to a member. The message can be used...
Among other things, one or more techniques and/or systems are provided for pushing a recommendation to a user. That is, a recommendation may be pushed to a...
Building large scale infrastructure using hybrid clusters
A distributed computing system. The system separates management and worker functionality into different clusters thus relieving the worker clusters of...
Automatically matching data sets with storage components
An administrator of an enterprise storage set may be tasked with storing a large number and variety of data sets on a large number and variety of storage...
Techniques to manage file conversions
Techniques to manage file conversions are described. File conversion requests to convert files between different file formats are received. A determination is...
Method for dynamic updating of an index, and a search engine implementing
In a method for a dynamic updating of an index of a search engine, wherein the index is an inverted index comprising a dictionary, a posting file with a posting...
Enhanced views of tagged items in a gallery
Disclosed herein are systems, methods, and software for facilitating gallery environments and views. In at least one implementation an initial view is presented...
Detecting overlapping clusters
A technique for identifying overlapping clusters of items in a data set. The technique may be used in connection with a social network or other on-line...
Social network recommended content and recommending members for
personalized search results
Architecture that provides a data structure to facilitate personalized ranking over recommended content (e.g., documents). The data structure approximates the...
GUI based web search
An exemplary computer implemented graphics-based Web search system includes a search input control and a results presentation control where the search input...
Analysis stack for complex event flows
Methods, systems, and computer-readable media to analyze a CEP query are disclosed. A particular analysis module is configured to receive data associated with...
A data collector may monitor a data source and identify updated data, which may be processed and prepared for inclusion into a search database. The data...
Protecting privacy of personally identifying information when delivering
Techniques are disclosed herein for protecting personally identifying information (PII) and behavioral data while delivering targeted assets. In one aspect, a...
Program code simulator
A system and method for facilitating simulation of a computer program. A program representation is generated from a computer program. A simulation of the...
Channel quality indicator apparatus and method
A method and apparatus are provided for a wireless communication system including a base station and at least one user equipment. A Channel Quality Indicator...
Determining a location of a mobile user terminal
Apparatus comprising a decision processing module arranged to determine whether a first mobile user terminal and a second mobile user terminal are within a...
Companion timeline with timeline events
A time-shifted digital content item is played via a playback screen, and an updateable companion timeline associated with the time-shifted digital content item...
Removal of image artifacts from sensor dust
Removal of the effects of dust or other impurities on image data is described. In one example, a model of artifact formation from sensor dust is determined....
Securely joining a secure wireless communications network
Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless...
Secure protocol for peer-to-peer network
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The...
Mapping a transmission stream in a virtual baseband to a physical baseband
Embodiments include processes, systems, and devices for reshaping virtual baseband signals for transmission on non-contiguous and variable portions of a...
Methods, transmitter, receiver and computer program product for transmitting or receiving data of a real-time communication event, the data being transmitted...
Method, transmitter and computer program product for transmitting data of a real-time communication event from the transmitter to a jitter buffer of a receiver....
Embedded system development platform
A modular development platform is described which enables creation of reliable, compact, physically robust and power efficient embedded device prototypes. The...
Signalling channel and radio system for power saving in wireless devices
Wireless devices, transmitters, systems and methods are provided that have a narrow band signalling channel and a wide band channel, for example an OFDM...
Efficient access to storage devices with usage bitmaps
Upon receiving a request to allocate a storage region, a storage device may initialize the contents of the storage device to default values (e.g., zero) in...
Substantially rigid interconnection structure for devices
A substantially cable-free board connection assembly may include a plurality of printed circuit boards (PCBs) forming an interconnect plane for a plurality of...
Flexible hinge and removable attachment
Fabric outer layer techniques are described. In one or more implementations, an apparatus includes, an input portion having one or more keys configured to...
Printing DIRECT2D-rendered items
Technology described herein is directed to converting display-rendering instructions (e.g., DIRECT2D) into print-rendering instructions (e.g., EMF, WMF, XPS,...
Combining multiple bit rate and scalable video coding
Video streams are generated using a combination of Multiple Bit Rate (MBR) encoding and Scalable Video Coding (SVC). Capabilities and requests of the clients...