At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Display screen with a graphical user interface
Centrally accessible policy repository
The present invention extends to methods, systems, and computer program products for a centrally accessible policy repository. Protection policies for...
Data broadcasting receiver power management
Systems and methods for data broadcasting and power management techniques for data broadcast receiving devices are disclosed. A data broadcast receiving device...
Content ratings and recommendations
Content ratings and recommendations is described. In an embodiment, a ratings service compiles ratings of programs for a rating system that is associated with a...
Instrumenting software for enhanced diagnosability
Systems and methods are provided for instrumenting compiled software to include diagnostic information such that an origin of a call to one or more routines may...
Transparent context switching for software code
Systems and methods that alleviate programmers of the burden of writing extensive code to implement a context switch for a particular piece of software code....
N-tiered applications support via common interface
A development system is provided. The system includes a workspace component to visually display one or more model components. A separation component...
Utility object for specialized data entry
An object is associated with one or more controls in a software application. An object associated with a control determines the operation of the data entry user...
Transactions for an application domain manager
Through one or more transaction calls, an application domain manager enables a host application to create, initialize, customize, and otherwise manage an...
Presenting secondary media objects to a user
Systems, methods, computer-readable media, and graphical user interfaces for presenting secondary media objects are provided. A primary media presenting module...
Annotating and sharing content
Aspects of the subject matter described herein relate to annotating and sharing content. In aspects, an annotation tool presents a user interface that allows a...
Failure-model-driven repair and backup
A predictive failure model is used to generate a failure prediction associated with a node. A repair or backup action may also be determined to perform on the...
System and method of client side analysis for identifying failing RAM
after a user mode or kernel mode exception
A process executing on a computing system may encounter an exception. Pointers or other references created by the exception may identify portions of the...
Configuration of memory management techniques selectively using
mitigations to reduce errors
Techniques for performing memory management to mitigate memory errors. In accordance with the principles described herein, a memory management module may be...
Security-enhanced log in
A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any...
Security for network coding file distribution
A content distribution mechanism that relies on cooperative desktop PCs to distribute content is disclosed. The mechanism distributes content in a robust manner...
Virtual media input device
A virtual media device is described for processing one or more input signals from one or more physical media input devices, to thereby generate an output signal...
Scalable dynamic content delivery and feedback system
In an embodiment, a computer system instantiates an intermediary software application configured to intermediate between an event controller and a content...
Reliable delivery of multi-cast conferencing data
Conferencing data is reliably delivered to computer systems participating in a hierarchically arranged multi-cast conferencing session. When a child computer...
Using transport-independent resource status
The present invention extends to methods, systems, and computer program products for using transport-independent resource status. Embodiments of the invention...
Network application performance enhancement using speculative execution
A speculative web browser engine may enable providing transmission of content between a server and a client prior to a user-initiated request for the content...
Managing media synchronization
A computing device for managing media content and a method of its operation are provided. The computing device may be configured to execute a computer program...
Bitmap-based display remoting
Bitmap transfer-based display remoting by a server coupled to a client is described. Specifically, an application executing on the server implements operations...
Method, system, and apparatus for creating an archive routine for
protecting data in a data protection system
A method for creating an archive protection plan for archiving a backup of data is provided. An indication of an archive data protection kind and an archive...
Like processing of owned and for-purchase media
A method for managing a group of owned and for-purchase media items in response to a single user action. The method treats the owned media items and the...
Data viewer management
Embodiments described herein are directed to generating a customized data viewer, where the viewer is configured to display data at any level in a data model....
Configurable view on data models
Data-driven configuration of various views on data models. A framework may be provided that offers one or more parameterized view generation components, each...
Dependency network based model (or pattern)
A dependency network is created from a training data set utilizing a scalable method. A statistical model (or pattern), such as for example a Bayesian network,...
Measuring entity extraction complexity
A named entity input is received and a target sense for which the named entity input is to be extracted from a set of documents is identified. An extraction...
Shared value resolution with multiple runtime containers
Policies and services facilitate sharing values between composition containers in an extensible application environment. A value resolver service receives a...
Constrained physical design tuning
Described is a constraint language and related technology by which complex constraints may be used in selecting configurations for use in physical database...
Preserving individual information privacy by providing anonymized customer
A method of preserving individual information privacy for each of a plurality of customers while providing aggregated information about the plurality of...
Method and apparatus for information transformation and exchange in a
relational database environment
A method and apparatus is disclosed for transforming hierarchical information into a rowset and for transforming a rowset into hierarchical information. In...
Asynchronous database index maintenance
This disclosure provides techniques for asynchronously maintaining database indexes or sub-indexes. For example, a database management server may receive a data...
Commit rate management with decoupled commit operations
Consistency is managed among data operations by coalescing commit operations, adjusting a commit rate to optimize latency, and converging to fairness across...
Relevancy propagation for efficient theory combination
Relevancy propagation for efficient theory combination is described. In one implementation, an efficient SMT solver dynamically applies relevancy propagation to...
Voting on claims pertaining to a resource
A credibility card contains a claim about a resource, a way to identify the claimant, and a set of choices to be voted on about the claim. A resource can be...
User-input scheduling of synchronization operation on a mobile device
based on user activity
Data is synchronized between a mobile device and a computing device over a wireless link. Synchronization operations are scheduled according to a ...
Light table editor for video snippets
A light table video application includes a stackable video snippet player control, a filmstrip video snippet player control, and a timeline video snippet player...
A two-dimensional blur kernel is computed for a digital image by first estimating a sharp image from the digital image. The sharp image is derived from the...
Lifting-based directional lapped transforms
A "directional lapped transform coder" ("DLT Coder") provides various techniques for designing directional lapped transforms. In general, lapped transforms are...
Splitting file types within partitioned images
The claimed subject matter provides a system and/or a method that facilitates optimally and efficiently utilizing an image file format. A server can host an...
Cable management for personal media player accessories
An arrangement for managing cables of accessories such as earphone sets, chargers, and synchronization arrangements used with portable electronic devices is...
Encrypting content in a tuner device and analyzing content protection
A tuning device uses a counter mode encryption cipher to encrypt counters associated with media content in order to protect the media content when it is sent to...
Determining quality of communication
A method, computer-readable medium, and system for providing a quality measurement based on communications within a communication application. Communication...
Strategies for selecting a format for data transmission based on measured
A strategy is described for transmitting data from a first entity to a second entity. The data is transmitted using a format that is selected to accommodate...
Video manipulation of red, green, blue, distance (RGB-Z) data including
segmentation, up-sampling, and...
RGB-Z imaging systems acquire RGB data typically with a high X-Y resolution RGB pixel array, and acquire Z-depth data with an array of physically larger Z...