At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Monitoring service endpoints
Today, data networks are ever increasing in size and complexity. For example, a datacenter may comprise hundreds of thousands of service endpoints configured to...
Energy-aware server management
The described implementations relate to energy-aware server management. One implementation involves an adaptive control unit configured to manage energy usage...
Hierarchical scalable memory allocator
Aspects of the subject matter described herein relate to memory management. In aspects, a hierarchical, customized memory allocator may be created that...
Controlling memory visibility
Embodiments are disclosed herein that are related to controlling the visibility of a portion of memory in a hardware device. For example, one disclosed...
Mechanism to verify physical proximity
Two participants may observe periodic data sources available only in the vicinity of physical trust (i.e. a wifi beacon). If an initial test of whether each...
Managing stored data on a computer network
A method and system for managing stored data on a computer network organizes data into logical volumes, and each logical volume has a friendly name associated...
Strategies for compressing information using bloom filters
A strategy is described for constructing bloom filter information and exception information. The bloom filter information is constructed to express a set of...
Spam filtration utilizing sender activity data
Spam is identified by computing sender reputation derived from historical activity data across counts for various categories. A spam filter or machine learning...
Missed instant message notification
A method and system for capturing missed communications is provided. An enhanced real-time communication system receives a communication from an initiating...
Relevance-based expiration of data
Technologies are described herein for relevance-based expiration of data. An initial expiration time for the data is computed based upon an expiration duration...
Automatically sharing a user's personal message
Described techniques enable a particular user to automatically share a piece of content with a group of users. To share the content, the particular user...
Object similarity search in high-dimensional vector spaces
An object search system generates a hierarchical clustering of objects of a collection based on similarity of the objects. The object search system generates a...
Relevant individual searching using managed property and ranking features
Embodiments are configured to provide information relevant to individuals of interest to a searching user. In an embodiment, a method includes identifying...
Dynamic update of a web index
Systems and methods are provided for regularly updating a web index with new or updated content, such as meta words or meta streams, for a particular web page...
Search query extension
Methods, systems, and computer-readable media for search query extension are disclosed. A particular method retrieves a set of queries related to a search query...
Graph-processing techniques for a MapReduce engine
Systems, methods, and devices for sorting and processing various types of graph data are described herein. Partitioning graph data into master data and...
Indexing of partitioned external data sources
A computing system hosts a plurality of websites, a plurality of external data sources, and a search service. External resources in each of the external data...
Providing lock-based access to nodes in a concurrent linked list
A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is...
Combined computer disaster recovery and migration tool for effective
disaster recovery as well as the backup...
Computer tools and methods novelly combine periodic backup and restore features with migration features to transfer the components of a failed system to a new...
Checkpoints for a file system
Aspects of the subject matter described herein relate to checkpoints for a file system. In aspects, updates to the file system are organized into checkpoint...
Enterprise data as office content
Techniques for enterprise data as office content are described. An apparatus may comprise a client device having an application program, an insertion component...
Generation, distribution and verification of tokens using a secure hash
Methods, systems, and apparatus for generation, distribution and verification of tokens are described. In an implementation, a method is described in which a...
Method and system for upgrading licenses to installed software
The invention may be considered a method and a system for changing license rights to a software product installed on a computer without reinstalling the...
Peer to peer network personal assistant
Methods and computer storage media for communicating an electronic gift suggestion for a first user to a second user are provided. Accessing an online social...
Speech recognition disambiguation on mobile devices
A method, program storage device and mobile device provide speech disambiguation. Audio for speech recognition processing is transmitted by the mobile device....
Speech and text driven HMM-based body animation synthesis
An "Animation Synthesizer" uses trainable probabilistic models, such as Hidden Markov Models (HMM), Artificial Neural Networks (ANN), etc., to provide speech...
Web server controls for web enabled recognition and/or audible prompting
Web server controls are provided for generating client side markups with recognition and/or audible prompting. Three approaches are disclosed for implementation...
Utterance processing for network-based speech recognition utilizing a
Embodiments are provided for utilizing a client-side cache for utterance processing to facilitate network based speech recognition. An utterance comprising a...
System and method for optimizing network communication in response to
A system and method for facilitating communications between a mobile device and a network application are provided. A mobile device transmits a request for data...
Dynamic viewing of wide angle images
A dynamic wide angle image viewing technique is presented which provides a way to view a wide-angle image while zooming between a wide angle view and a narrower...
Facade rendering system
A facade rendering system is described. In various embodiments, the facade rendering system identifies horizontal waveforms and vertical waveforms from an image...
Appending content to a telephone communication
An interactive information distribution system that facilitates automatic transmission of a variety of information packets to the communication devices of a...
Learning-based image compression
Learning-based image compression is described. In one implementation, an encoder possessing a first set of learned visual knowledge primitives excludes visual...
Hardware accelerated caret rendering
Techniques for hardware accelerated caret rendering are described in which a system based caret is emulated using hardware acceleration technology. The hardware...
Determination of a reputation of an on-line game player
A reputation of an on-line gamer is calculated in accordance with feedback about the gamer provided by other players. The gamer's reputation is determined in...
Display screen with animated graphical user interface
Display screen with animated graphical user interface
Display screen with transitional keyboard user interface
Display screen with animated user interface
Display screen with user interface
Display screen with user interface
Electronic mouse with a grid pattern appearance
Creating secure interactive connections with remote resources
Implementations of the present invention efficiently establish secure connections between a client and server, at least in part by authenticating the client and...
Isolation of user-interactive components
The isolation of user-interactive components form the logical components of an exemplary computing application environment is provided. In an illustrative...
Real-time analysis of performance data of a video game
A method for analyzing the performance of a video game uses a diagnostic tool that is associated with application code of the video game. The diagnostic tool is...
Manipulation of graphical elements on graphical user interface via
Embodiments related to the manipulation of objects on a multi-touch graphical user interface are disclosed. For example, in one disclosed embodiment, a method...
Revealing of truncated content on scrollable grid
Various embodiments related to the revealing of truncated content on a scrollable grid are disclosed. One disclosed embodiment provides a computing device...
Resource authoring with re-usability score and suggested re-usable data
A localization development system includes a platform that receives information to be localized to a target market that is distinct from a source market for...
Validating configuration of distributed applications
The present invention extends to methods, systems, and computer program products for validation configuration of distributed applications. Embodiments of the...
Timer service uses a single timer function to perform timing services for
both relative and absolute timers
A timer service uses a single timer function to perform timing services for both relative and absolute timers. The first timers from a sorted array of absolute...