At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Cross domain presence of web user interface and logic
Various technologies and techniques are disclosed that allow for repurposing content of a source web site for an external web site. The developer uses a...
XSLT/XPATH focus inference for optimized XSLT implementation
Techniques are provided for performing focus inference when compiling an Extensible Markup Language Transforms (XSLT) stylesheet into a compiled XSLT processor....
Inference of contract using declarative program definition
A declarative program definition. The definition is analyzed to produce an application contract that describes semantics for sending and receiving application...
Exception raised notification
An exception notification system is described herein that provides an early notification that a software exception has occurred before exception handling code...
Configuring processors and loads for power management
Controlling processors and processor hardware components in a computing device based on execution load and a power saving preference. The power saving...
Converting luns into files or files into luns in real time
A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is...
Multi-level read caching for multiplexed transactional logging
A transactional logging service is provided to user-mode and kernel-mode log clients by utilizing a marshalling area to buffer a set of log records that a log...
Storage systems using write off-loading
Improved storage systems which use write off-loading are described. When a request to store some data in a particular storage location is received, if the...
Enhanced network system through the combination of networking objects
Reducing the cost of framing network packets in a virtual machine environment combines certain network objects to eliminate the cost of fully framing packets...
Proximity guided data discovery
Techniques are described for sharing content among peers. Locality domains are treated as first order network units. Content is located at the level of a...
Synchronizing clocks in an asynchronous distributed system
The present invention extends to methods, systems, and computer program products for synchronizing clocks in an asynchronous distributed system. Embodiments of...
Message based network configuration of dynamic domain name services
Systems and methodologies that facilitate hosting of a domain name and access of users to the Internet, by using a well defined protocol to interact with a...
Automatically detecting whether a computer is connected to a public or
Automatically detecting whether a local network that a computer is connected to is a public or private network by utilizing a trusted online service and/or...
Multimedia communications using preferred devices
Aspects of the present invention are directed at allowing users to establish a multimedia network session in which each user is allowed to employ multiple...
Proactive load balancing
A load balancing system is described herein that proactively balances client requests among multiple destination servers using information about anticipated...
Aggregating and searching profile data from multiple services
Profile data from multiple networking services can be combined and queried from one networking service. A primary networking service may store user profile data...
Virtual machine image server
Virtual machine image files are stored in a virtual machine storage by a virtual machine image file server. Users at virtual machine clients connect to the...
Inviting a conferencing unaware endpoint to a conference
Systems and methods that enable conference unaware clients to participate in the conference. A conferencing component is aware of what protocol to employ, and...
Method and apparatus for maintaining consistency of a shared space across
multiple endpoints in a peer-to-peer...
In a peer-to-peer collaboration system, deltas containing data change commands are organized in a persistent data structure called a delta log. The delta log is...
Selecting values in a distributed computing system
A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices, and provide a minimum of message...
Non-privileged access to data independent of filesystem implementation
An application programming interface (API) module provides access to data, independent of filesystem implementation in a non-privileged user mode. A discovery...
Systems and methods that transform constructs from domain to domain
The present invention provides systems and methods that isomorphically maps constructs between domain spaces (e.g., object, markup, relational and user...
Extended user profile
A method of extending user profile. A user specific data related to an application is received and stored for integration with a user profile. A template for...
Pre-purchase device interoperability validation
An interoperability assessment between two or more devices can be based on the devices' specifications and on empirical evidence of interoperability....
Pseudo-anchor text extraction
A search method uses pseudo-anchor text associated with search objects to improve search performance. The pseudo-anchor text may be extracted in combination...
Estimating rank on graph streams
The rank of nodes in a graph may be inferred from a calculated probability that each node in the graph appears in a single random walk of the graph. Short...
HTTP cache with URL rewriting
URL rewriting is a common technique for allowing users to interact with internet resources using easy to remember and search engine friendly URLs. When URL...
Co-location visual pattern mining for near-duplicate image retrieval
Described is a technology in which image near-duplicate retrieval is performed using similarities between patterns of query image words and patterns of database...
Preserving user intention in distributed data systems
The present invention extends to methods, systems, and computer program products for preserving user intention in distributed data systems. Embodiments of the...
Graphical model for data validation
Data may be received from the source and based on training; a confidence level may be determined that a specific element in the data is correctly assigned to a...
Method and system for web resource location classification and detection
A method and system for identifying locations associated with a web resource is provided. The location system identifies three different types of geographic...
Disaggregated secure execution environment
An electronic device, such as, a computer, may be adapted for self-monitoring for compliance to an operating policy. The operating policy may specify a...
Truth revealing market equilibrium
To use market clearing methods to determine market equilibrium, a market clearing situation is established by determining a number of items to be sold at the...
Digital content billing via multiple channels
Embodiments related to billing for digital content via multiple billing channels with different permissible prices are disclosed. One disclosed embodiment...
Language detection service
Language detection techniques are described. In implementation, a method comprises determining which human writing system is associated with text characters in...
Aligning hierarchial and sequential document trees to identify parallel
A set of candidate parallel pages is identified based on trigger words in one or more pages downloaded from a given network location (such as a website). A set...
Emulated memory management
A first software program executing on a computing device emulates a second computing device executing a software program using emulated memory. The first...
Dynamic software performance models
Simulating an application. A method that may be practiced in a computing environment configured for simulating an application modeled by an application model...
WiFi and GSM landmarks and neighborhoods for location based services
A system for capturing and delivering location-based information and services captures wireless landmark information sent by mobile devices to build a map of...
Binding a device to a provider
A pay-per-use or pay-as-you-go computer uses a secure memory to store individual unique program identifiers. Each unique program identifier is associated with a...
Using handwriting recognition in computer algebra
Systems and methods for use in handwriting recognition in computer algebra are provided. One disclosed method includes receiving handwriting input from a user...
Spatial audio conferencing
Audio in an audio conference is spatialized using either virtual sound-source positioning or sound-field capture. A spatial audio conference is provided between...
Message recall using digital rights management
Email messages are recalled in accordance with restrictions attached to the message. Use of the message is limited per the restrictions. Example restrictions...
Marking voice messages as heard
In response to receiving a voice message, a telephony service creates an e-mail message directed to the intended recipient of the voice message. The e-mail...
Mashup application and service for wireless devices
Described is a technology, such as implemented as social networking groupware application designed for mobile device users, that provides a data mashup service...
Data recording/reproduction for write-once discs
A file system is enabled to use a Metadata Partition instead of VAT for write-once discs, and is provided by a pseudo-overwrite method with a plurality of...
Request-driven on-demand processing
A rendering system is provided. The rendering system includes a rendering component that receives a request to view a data set and provide output to drive a...
System and method for providing a dynamic expanded timeline
Generating a child timeline on a drawing sheet of a diagramming program such that the child timeline is dynamically linked to a parent timeline. An automated...
Workstation for processing and producing a video signal
A workstation for processing and producing a video signal comprises a video input system, a video graphics processor, and a video output system. The video input...
Ink editing architecture
A system and process for capturing and rendering ink is described. An ink canvas object may contain none, one, or more objects or elements and may specify the...