At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Progressive stall timer
A progressive stall timer is disclosed. For example, in one disclosed embodiment, a participant in an online turn-based social experience is provided with a...
Parallel programming and execution systems and techniques
Parallel programming and execution systems and techniques are discussed herein. In accordance with one technique, a parallel programming model is used to...
Framework for modeling continuations in workflows
Enabling creation of control flow patterns in a workflow via continuations. Each continuation represents an activity execution context for an activity executing...
Multi-format centralized distribution of localized resources for multiple
A multi-format centralized framework for the distribution of resources. The framework allows product teams to update resources independent of a product build...
Bifocal view: a novel calendar user interface
The claimed subject matter provides a system and/or a method that facilitates creating a calendar that enables optimized awareness of at least one event. An...
Fingerprinting event logs for system management troubleshooting
A technique for automatically detecting and correcting configuration errors in a computing system. In a learning process, recurring event sequences, including...
Unified provisioning of physical and virtual images
A system for the unified provisioning of virtual and physical disk images is created. The system includes a library of disk images. Client devices are able to...
Advertisement refresh rules for network applications
Advertisements are refreshed in an interface based on one or more parameters provided over a network. The parameters can be retrieved from a web service and...
Dynamic buffer settings for media playback
Improved responsiveness and reduced latency of media playback on a media player is achieved by dynamic adjustment of storage parameters for the jitter buffer in...
Wireless synchronization of media content and subscription content
Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device...
High availability message transfer system for side effect messages
Architecture that protects side effect messages by associating the side effect messages with a primary (redundant) message that was received by a transport...
Graph based bot-user detection
Computer implemented methods are disclosed for detecting bot-user groups that send spam email over a web-based email service. Embodiments of the present system...
Peer-to-peer buddy request and response
A system for providing secure asynchronous message publishing and retrieval in a serverless environment. The system may be used on ad-hoc and segmented networks...
Computing device with relatively limited storage space and operating /
file system thereof
A computing device includes a processor, a storage device having an executable file, and a file system for executing the file in place on the storage device on...
Computer system architecture for automatic context associations
A computer system models human memory by deriving associations between objects, events, and the context of the computer user or users. These associations can be...
Preference judgements for relevance
The claimed subject matter provides a system that trains or evaluates ranking techniques by employing or obtaining relative preference judgments. The system can...
Calculating web page importance
The page ranking technique described herein employs a Markov Skeleton Mirror Process (MSMP), which is a particular case of Markov Skeleton Processes, to model...
Configuration of multiple database audits
Various technologies and techniques are disclosed for improving configuration of database audits. Multiple audits can be created for a database. Any one of the...
Interfaces for high availability systems and log shipping
Architecture for replicating a database through log shipping. A replication service replicates data using one or more new internal application program...
Targeted advertising using object identification
Targeted advertising using object identification techniques is described. In an implementation, an object is identified by a client that is placed on a surface...
Quantization and inverse quantization for audio
An audio encoder and decoder use architectures and techniques that improve the efficiency of quantization (e.g., weighting) and inverse quantization (e.g.,...
Multi-channel audio encoding and decoding
An audio encoder and decoder use architectures and techniques that improve the efficiency of multi-channel audio coding and decoding. The described strategies...
Lightweight windowing method for screening harvested data for novelty
Biasing of language model customization due to repetitious data is substantially reduced by introducing novelty screening to data harvesting process. Novelty...
Unified rules for voice and messaging
The claimed subject matter provides a system and/or a method that facilitates managing an incoming data communication in connection with unified communications....
Using distributed timers in an overlay network
The present invention extends to methods, systems, and computer program products for using distributed timers in an overlay network. Embodiments of the...
Methods and systems for estimating network available bandwidth using
packet pairs and spatial filtering
Estimation of available bandwidth on a network uses packet pairs and spatially filtering. Packet pairs are transmitted over the network. The dispersion of the...
Low power operation of networked devices
Methods of reducing power consumption of networked devices are described. When a main processor and associated hardware in a computing device is powered down, a...
Gamut mapping spectral content to reduce perceptible differences in color
Various embodiments provide for gamut mapping spectral content. Source appearance content is created from source spectral data corresponding to a source color...
System and method for users of mobile computing devices to print documents
A print service is provided on a network, such as the Internet or a corporate intranet, for mobile computing devices, such as laptops, PDA's and Web cell...
Manipulation of graphical objects on a display or a proxy device
Methods of manipulating graphical objects are described. One or more graphical objects are displayed in a fixed orientation with reference to a sensed reference...
Parallel texture synthesis by upsampling pixel coordinates
A method and system for synthesizing texture using upsampled pixel coordinates and a multi-resolution approach. The parallel texture synthesis technique, while...
System and method for providing feedback on game players and enhancing
A service that receives feedback from players in a game playing service. The service provides an aggregation of the feedback so that a reputation score can be...
Using asynchronous changes to memory to detect malware
A system and method for using asynchronous changes to memory to detect malware is disclosed. The technology initially receives a memory buffer location to be...
Authenticating a user of a wireless data processing device
A system and method for authenticating a user with a wireless data processing device. For example, a method according to one embodiment of the invention...
Control-based content pricing
In an implementation of control-based content pricing, a content server distributes media content to a client device in response to a request from the client...
Transparently capturing the causal relationships between requests across
Several embodiments disclosed herein are directed to methods, computer program products, and systems configured to track operation dependencies. For example, in...
Enforcing system resource usage limits on query requests based on grouping
query requests into workgroups and...
A database can have multiple requests applied at one time. Each of these requests requires a specific amount of server resources. There can be a differentiation...
Privileged used control of device installation and/or availability
A system and method for entity management is provided. In accordance with an aspect of the present invention, a system administrator is given control over...
Update checking and synchronization for link and offline data
A computer system includes an object oriented framework that provides a set of application integration interfaces that support programmatic updating operations...
Unified data type system and method
A type system includes a dual representation for basic data types. One representation is the basic data type representation common to such basic built-in data...
Dynamic user interface for previewing live content
A dynamic user interface for previewing live content includes multiple tiles. Information for multiple pieces of live content available from a gallery is...
Discovering alternative user experiences for websites
The present invention extends to methods, systems, and computer program products for discovering alternative user experiences for Websites. Embodiments of the...
Systems and methods for defining web content navigation
The described systems and methods are directed at defining web content navigation. The disclosed technique enables the development of web content for a scenario...
Statistical debugging using paths and adaptive profiling
The method executes the application and if there are no errors from the execution of the application, the method ends. If errors exist, the errors are collected...
Obfuscated state store for rights management system and the like
A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a...
Secure processor architecture for use with a digital rights management
(DRM) system on a computing device
A secure processor is operable in normal and preferred modes, and includes a security kernel instantiated when the processor enters into preferred mode and a...
Efficiently synchronizing with separated disk caches
In a method of synchronizing with a separated disk cache, the separated cache is configured to transfer cache data to a staging area of a storage device. An...
Hybrid butterfly cube architecture for modular data centers
A hybrid Butterfly Cube ("BCube") architecture is described herein. The BCube architecture is a server-centric network architectural design, and includes a...
Reciprocal public trust relationship
Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites...
Method and system for supporting the communication of presence information
among computing devices of a network
A method and system for aggregating presence information generated by multiple devices associated with a single user is presented. A server acting as a presence...