At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Mouse dongle storage
A computer mouse for use with a computing device, and a user input device assembly including a computer mouse and a communications dongle, are provided. The...
Stability monitoring using synthetic aperture radar
A stability monitoring system is described that provides an accurate, automated, and remote way of monitoring small movements over a large surface area without...
Optic having a dichroic reflector
Various embodiments are disclosed that are related to an optic with a dichroic coating. In one embodiment, sn optic comprises a wedge-shaped light guide having...
Flexible peripheral device positioner
A peripheral positioner includes a plurality of links that are rotatably coupled to one another. The peripheral positioner can be used to position a peripheral...
End reflector for a flat panel lens
End reflectors, flat panel lens that may utilize the end reflector, and methods are provided. The end reflector for a flat panel lens may include a first...
Flat-panel optical projection apparatus with reduced distortion
A light guide of the tapered-waveguide type includes an input slab (30) for expanding a projected image between an input end and an output end (40); and a...
Methods and apparatus for ultrasonic coupling using micro surface tension
and capillary effects
Apparatus and methods for ultrasonic coupling between a coupling fluid and an object using micro surface tension and capillary effects are provided. The...
Display screen with an icon
Dual display device with animated image
Applying firewalls to virtualized environments
Each virtualized environment on a computer has its own set of firewall rules. The virtualized environments share a single instance of the operating system...
Distributed single sign on technologies including privacy protection and
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
Digital identity management
One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for...
Modifying the behavior of a multimedia transport system in response to
detected capabilities of a client system
Modifying the behavior of a multimedia transport system in response to a detected capability of a client system. A client system may include the capability to...
Simple and dynamic configuration of network devices
The present invention relates to a system and method for configuring and managing network devices. The arrival (and departure) of devices on a network can be...
Environment wide configuration system
An installation and configuration system consolidates workloads of multiple applications and services, including applications or services that may be installed...
Workflow tracking information preview
A method and system for presenting workflow tracking information for approval workflows assigned to business objects is provided. The approval system receives...
Context sensitive help
Systems and methods for providing context sensitive help on an electronic device. The system include a processor, an application attributes discovery module...
Thread interception and analysis
Apparatus and methods for intercepting and analyzing threads are disclosed. In one embodiment, a thread data recorder is configured to instrument one or more...
Master-slave security devices
A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in...
Dynamically resolving recipients to retrieve public keys during
Systems and methods are disclosed that facilitate identifying messages generated on a mobile device while the device is offline as requiring encryption, storing...
Data copy management for faster reads
Multiple copy sets of data are maintained on one or more storage devices. Each copy set includes at least some of the same data units as other sets. Different...
Consistency models in a distributed store
Systems and methods that designate read/write consistency models based on requirements of a distributed store to increase performance or scale. Such sever loads...
Direct memory access filter for virtualized operating systems
Described techniques increase runtime performance of workloads executing on a hypervisor by executing virtualization-aware code in an otherwise non...
Receive window auto-tuning
Methods of tuning a receive window. A receiving device and a sending device may be in communication over a network. The receiving device may advertise a receive...
Providing flow control and moderation in a distributed message processing
Systems and methods for controlling the work load on a distributed system comprising a plurality of stages are provided. The capacity of a present stage is...
Automated peer-to-peer file distribution
Automated file distribution is described. A member of a peer-to-peer network receives from a file server, a file to be distributed. The file is then distributed...
Handling events. A method may be practiced, for example, in a networked computer system including an event handling computer connected to one or more event...
Methods and systems for processing multi-media editing projects
Methods and systems of processing multi-media editing projects are described. In one embodiment, a request for one or more multi-media files is generated on a...
Complex software deployment
Systems and methods of deploying one or more software components to a target computer infrastructure are disclosed. A descriptor file that declares a desired...
Techniques for performing operating system installation on a headless
Techniques are provided for performing software installation on a headless device. A first device is used to interactively obtain answers in connection with...
Automatic grouping of electronic mail
Automatic sorting and grouping of electronic mail items in an electronic mail system is provided. An automatic mail grouping property may be selected for...
Organizing electronic mail messages into conversations
The present invention extends to methods, systems, data structures, and computer program products for organizing electronic mail messages into conversations....
Schema hierarchy for electronic messages
The present invention extends to methods, systems, computer program products, and data structures for efficiently storing and accessing electronic messages....
Method and system for transitioning between synchronous and asynchronous
Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate...
High availability conferencing
A method, system, and architecture for providing a conference system that effectively achieves high availability conferencing is provided. The conference system...
User data profile namespace
A method and data structure for separating application data from user data in a namespace. The data structure provides an intuitive profile layout for...
Multiple database entity model generation using entity models
The claimed subject matter provides a system and/or method that generates or creates database entity models using entity models. The system can include devices...
Mapping from objects to data model
Aspects of the subject matter described herein relate to mapping from application objects to an abstract data model. In aspects, a mapper receives registrations...
Combined web browsing and searching
Context information for a user of a device is identified and is used to identify a set of keywords based at least in part on a current Web page being displayed...
Using joint communication and search data
Conventionally, there are communities of individuals who perform Internet searches and communities of individuals who utilized Internet communications. While...
Semantic table of contents for search results
A table of contents is generated for search results in response to a search query by identifying semantic concepts as topics for inclusion within the table of...
Efficient method for clustering nodes
Methods and computer storage media for clustering nodes are provided. An input file is received that is comprised of primary nodes, secondary nodes and metrics...
Content searching and configuration of search results
Content searching and configuration of search results are described. In an implementation, a method includes in response to a search query, selecting a keyword...
Detecting spiking queries
Methods, systems, and media are provided for identifying and clustering queries that are rising in popularity. Resultant clustered queries can be compared to...
Community driven search using macros
A community custom search or community search macro is created whereby users access a custom search or search macro from their computing devices. The users can...
Accumulating star knowledge in replicated data protocol
A distributed system includes full and partial replicas of a set of data items that may be inserted, modified, or deleted by any replica. Replicas may...
Recovery of a computer that includes virtual disks
Described is the backup and/or restore of virtual disks In general, metadata is backed up for restoring a virtual disk. To restore the disk, a physical disk is...
Lightweight physical design alerter
A lightweight physical design alerter can analyze a workload and determine whether a comprehensive tuning session would result in a configuration improvement...