At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Extensible value types in cells
Individual cells within a spreadsheet may contain an extensible value as defined by an extensible value type. The extensible value type is a user defined value...
Power management for large memory subsystems
A power management system is provided. The system includes a permanent storage medium that has a plurality of storage segments that are individually...
Protocol-Independent remote attestation and sealing
Messages, including messages in conformance with various protocols, can be hashed and the hash values added to an event log and provided to a Trusted Platform...
Heterogeneous storage array optimization through eviction
A storage system can comprise storage devices having storage media with differing characteristics. An eviction handler can receive information regarding the...
Wait loss synchronization
Synchronizing threads on loss of memory access monitoring. Using a processor level instruction included as part of an instruction set architecture for a...
Multiple cache directories
A first portion of an identifier can be used to assign the identifier to a slot in a first directory. The identifier can identify a cache unit in a cache. It...
Adaptable management in sync engines
Synchronization of two or more items can be optimized through the use of parallel execution of synchronization tasks and adaptable processing that monitors and...
Representation, decision models, and user interface for encoding managing
preferences, and performing automated...
The present invention relates to a system and methodology providing a user interface that can be employed by contactors and contactees in conjunction with a...
Authorizing service requests in multi-tiered applications
Services of a multi-tier application can authorize (e.g., including authenticating) each other with one or more service access tokens provided by a security...
Stateless distributed computer architecture with server-oriented
state-caching objects maintained on network or...
A stateless distributed computer architecture allows state-caching objects, which hold server state information, to be maintained on a client or network rather...
XML-based web feed for web access of remote resources
Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining...
Bottom-up analysis of network sites
An approach for identifying suspect network sites in a network environment entails using one or more malware analysis modules to identify distribution sites...
Message data management
A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A...
Rich signaling feedback mechanism for group communication
Managing a web based conference. The web based conference includes one or more presenters connected through a network to one or more conference attendees. The...
Roaming personal information items across multiple computing devices using
an IMAP server
Technologies for roaming personal information items across multiple computing devices using an IMAP server are provided. When a change is detected to a personal...
Supporting serendipitous group interaction based on user activities
The disclosed functionality enables non-sessions users of an activity session to be provided awareness of the session. The non-sessions users are made aware of...
Techniques to automatically syndicate content over a network
Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a...
Distributed routing table interface
Application programming interface (API) for starting and accessing distributed routing table (DRT) functionality. The API facilitates bootstrapping into the DRT...
Electronic data interchange (EDI) data dictionary management and
An EDI data dictionary management and versioning system is provided having reusable EDI building blocks that are stored in relational format. Reusable EDI...
Facilitating advertisement selection using advertisable units
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate advertisement selection using advertising...
Visualizing hyperlinks in a search results list
Generating and displaying an enhanced list of search results appropriate for web searching are described. A method for generating an enhanced list of search...
Index optimization for ranking using a linear model
Technologies are described herein for providing a more efficient approach to ranking search results. One method reduces an amount of ranking data analyzed at...
Efficiently and reliably providing message related data
The principles of the present invention extend to efficiently and reliably providing message related data. Generally, data fields of electronic messages and...
Cross-channel coauthoring consistency
A computing device includes a processing unit, and a memory with instructions that, when executed by the processing unit, cause the processing unit to create: a...
Project management applications utilizing summary tasks for top-down
Embodiments of the present invention are directed toward providing a method utilizing project management software for creating a project plan utilizing a...
Focus tracking in dialogs
Controls are provided for a web server to generate client side markups that include recognition and/or audible prompting. The controls comprise elements of a...
Human-assisted pronunciation generation
Pronunciation generation may be provided. First, a pronunciation interface may be provided. The pronunciation interface may be configured to display a word and...
Piecewise-based variable-parameter Hidden Markov Models and the training
A speech recognition system uses Gaussian mixture variable-parameter hidden Markov models (VPHMMs) to recognize speech under many different conditions. Each...
Flat-panel optical projection apparatus
A light guide of the tapered-waveguide type includes an input slab (30) for expanding a projected image between an input end and an output end, and an output...
Navigating images using image based geometric alignment and object based
Over the past few years there has been a dramatic proliferation of digital cameras, and it has become increasingly easy to share large numbers of photographs...
Method for overlapping visual slices
Image editing tools are commonly used to assist with manipulating and saving visual compositions. Many image editing tools provide slicing functionality to...
Combining online and offline recognizers in a handwriting recognition
Described is a technology by which online recognition of handwritten input data is combined with offline recognition and processing to obtain a combined...
Encoding and decoding methods and systems
Methods and systems enable uncompressed source data, corresponding to previously-compressed data, to be manipulated or otherwise modified, prior to being...
Reducing key picture popping effects in video
Techniques and tools are described for reducing key picture popping effects. In some embodiments, an encoding system filters a video picture that is to be...
Data center interconnect and traffic engineering
A system for commoditizing data center networking is disclosed. The system includes an interconnection topology for a data center having a plurality of servers...
Network connectivity determination based on passive analysis of
connection-oriented path information
Passive analysis connection detection architecture that leverages connection-oriented end-to-end stack protocol information. In a TCP/IP implementation, by...
Remoting sub-pixel resolved characters
Remoting sub-pixel defined text. Text is remoted at sub-pixel precision in a computing environment including a terminal server and a terminal client. At a...
Keyboard with plural key switch matrices to detect ghosting
Keyboard apparatus and methods for processing keyboard depressions are disclosed. One disclosed keyboard apparatus includes a keyboard having a plurality of...
Display screen with an icon
Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
Systematic approach to uncover GUI logic flaws
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is...
Mechanism for evaluating security risks
Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the...
Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
Distribution of information protection policies to client machines
One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining...
Seamless digital channel changing
Seamless channel changing in a digital-television-based entertainment network can be implemented, for example, by providing an intra frame to a client device...
User mode file system serialization and reliability
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC)...
Real-time self tuning of planned actions in a distributed environment
Automatic programming, scheduling, and control of planned activities at "worker nodes" in a distributed environment are provided by a "real-time self tuner"...
A facility for automatically processing software patches is described. The facility receives in a computing system a distinguished patch package for modifying...
Debugging support for tasks in multithreaded environments
A debugger enhancement provides a debug-task-provider interface whose implementation includes routines designed to support debugging of programs that contain...