At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Pluggable model elements
Various technologies and techniques are disclosed for providing pluggable model elements. A modeling application is provided that is operable to allow custom...
Living cursor control mechanics
Disclosed herein are systems and methods for controlling a cursor. A user may control a cursor displayed by a computing environment such as a game console, a...
Multi-modal interaction for a screen magnifier
A multi-model magnification system is described that can be used with multiple forms of input, including natural input such as touch-based devices. Users can...
Virtual desktop view scrolling
Example embodiments of the present disclosure are related to scrolling the view of a virtual desktop on a client. The client can be in communication with a...
Self learning contextual spell corrector
A group of keywords are received, wherein each keyword includes one or more words. A word list is formed from the group of keywords, where the word list...
Modularized web provisioning
A system and method for modularized Web provisioning. Functionalities available for Web provisioning are modularized into individual feature files. A site...
Comparing values of a bounded domain
Methods, systems, and computer-readable media to compare values of a bounded domain are disclosed. A particular method includes, for each value in a bounded...
Backing up data from backup target to backup facility
Aspects of the subject matter described herein relate to backup up data. In aspects, a backup target determines a degree to which a data set included on the...
A cache region can be created in a cache in response to receiving a cache region creation request from an application. A storage request from the application...
Leveraging transactional memory hardware to accelerate virtualization and
Various technologies and techniques are disclosed for using transactional memory hardware to accelerate virtualization or emulation. A central processing unit...
Distributed aggregation on an overlay network
The present invention extends to methods, systems, and computer program products for distributed aggregation on an overlay network. Embodiments of the invention...
Dynamic media asset delivery
Dynamic media asset delivery is described. In embodiments, a request for a media asset can be received from a client device. A transmission rate of a...
Methods of experience-based exception grouping are described. A number of exceptions are read. The exceptions are intelligently associated with one of a number...
Data visualization interactivity architecture
A data visualization interactivity architecture may be provided. The architecture may allow the creation of a data visualization, such as a chart, and may...
Modular forest automata
Modular forest automata (MFA) provide a unified description of partially-ordered regular tree patterns. MFAs provide simple methods for determinization,...
Selection and sorting protocol extensions to the WS-enumeration protocol
Techniques are described herein for providing protocol extensions to the WS-Enumeration protocol. A selection protocol extension to the WS-Enumeration protocol...
Hierarchical locking in B-tree indexes
Portions of a B-tree index in a database are locked for concurrency control. In one example, hierarchical lock modes are provided that permit locking a key, a...
Optimized reverse key indexes
Aspects of the subject matter described herein relate to optimized reverse key indexes. In aspects, a dispersion function disperses index values such that they...
Live volume access
This document describes tools capable of enabling an entity requiring exclusive access to data and metadata of a volume to have that exclusive access while also...
Automatic designation of XBRL taxonomy tags
The embodiments described herein generally relate to new and alternate systems and methods to associate XBRL tags with financial data. A business user creates a...
Method and system for user alteration of the configuration of a data
Disclosed are methods usable by non-experts for altering a configuration of a data warehouse. The initial configuration of the data warehouse is represented in...
Merchant powered click-to-call method
A method is disclosed for enhancing the predictability, scalability and cost effectiveness of online advertising with voice over IP connectivity and event...
Technologies for generating a boosted tag ranking for a media instance, the boosted tag ranking based on probabilistic relevance estimation computed by a...
Seeding in a skill scoring framework
Skill scores represent a ranking or other indication of the skill of the player based on the outcome of the game in a gaming environment. Skills scores can be...
Chromeless user interface
Techniques are described to implement a user interface for a display of a mobile device. In an implementation, the user interface may include a chromeless menu...
Program recording completion
A program recording completion system automatically completes an incomplete program recording of a program. A recording application creates a program recording...
Learning image enhancement
Image enhancement techniques are described to enhance an image in accordance with a set of training images. In an implementation, an image color tone map is...
Embedded system development platform
A modular development platform is described which enables creation of reliable, compact, physically robust and power efficient embedded device prototypes. The...
Embedding a session description message in a real-time control protocol
Embedded within at least some Real-Time Control Protocol (RTCP) messages sent from a media content source to a recipient is a session description message that...
High definition media content processing
High definition media content processing techniques are described in which enhanced media content rendering techniques may be performed to output high...
Pointing and data entry input device
An input device includes an array of adjacent capacitive sensors arranged into rows and columns. Each capacitive sensor exhibits a capacitance characteristic...
Personalization using a hand-pressure signature
A hand-held device having a body with a pressure-sensitive exterior surface. At least a portion of the pressure-sensitive exterior surface is designed to be...
Display screen with an icon
Display screen with user interface with orange colored bar
Secure content pre-distribution to designated systems
Described is a technology by which encrypted content is pre-distributed to recipients during a pre-distribution timeframe, for example to distribute protected...
Authentication and authorization of extranet clients to a secure intranet
business application in a perimeter...
Methods and systems authenticate and authorize an extranet client to a secure intranet business application with a perimeter network topology, where connections...
Two-way authentication using a combined code
An authentication process for a client and a target service to perform mutual authentication. A combined code is received that comprises a combined code hash of...
Systems and processes for managing policy change in a distributed
A method for managing changes to policies in an enterprise includes receiving a systems policy change request to change a systems policy that implements a...
Automatically generated TV favorites list
A favorite channel list for a media system is generated by observing the viewing, surfing, and recording habits of a user. The viewing habits may include the...
Queue dispatch using deferred acknowledgement
Dispatching an incoming message from a queue into message transfer session(s) from which message consumers may draw messages. The message is reversibly received...
User declarative language for formatted data processing
A user declarative language for formatted data processing is provided. The user declarative language may be used to generate constraints which can be projected...
Explicit delimitation of semantic scope
Systems and methods are provided with respect to computer programming. Program behavior can be tuned to provide a seamless mixture of semantic behavior across a...
The claimed subject matter provides techniques to effectuate and facilitate efficient and flexible selection of display objects. The system can include devices...
Resizing an editable area in a web page
Embodiments of the present invention provide for vertically and/or horizontally resizing a zone or DIV element of a Web page via a browser-based Web authoring...
Methods and systems for providing a customized user interface for viewing
and editing meta-data
Systems and methods are disclosed for providing a user interface. The disclosed systems and methods may include receiving a request to initiate an application...
Client session based debugging
Debugging operations on individual client sessions for a remotely executed shared application are enabled to be performed as the client requests are processed...
Universal secure token for obfuscation and tamper resistance
Program obfuscation is accomplished with tamper proof token including an embedded oracle. A public obfuscation function can be applied to any program/circuit to...
Stored value accessors in shared memory regions
Instruction sets in computing environments may execute within one of several domains, such as a natively executing domain, an interpretively executing domain,...
Distributing bandwidth across communication modalities
Embodiments are configured to provide communication environments to communicating participants using a number of modality control features, but are not so...