At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Multi-thread spreadsheet processing with dependency levels
This disclosure relates to a method and system of processing chain calculations in spreadsheet applications utilizing multiple processors, each having a...
Power-efficient state setting of data-center elements
An illustrative power-efficient data center is described for operating in an uncontrolled environment in one scenario. The data center includes an air moving...
Request linked digital watermarking
A method for digitally signing information in real-time, based on a user request for the information. In one embodiment, the method is useful in a Web server,...
Systems and methods for embedding media forensic identification markings
The present invention leverages a series of media watermark locations to provide information relating to media ownership and/or distribution source. This...
Methods and mechanisms for proactive memory management
A proactive, resilient and self-tuning memory management system and method that result in actual and perceived performance improvements in memory management, by...
Managing cache data and metadata
Embodiments of the invention provide techniques for managing cache metadata providing a mapping between addresses on a storage medium (e.g., disk storage) and...
Lazy handling of end of interrupt messages in a virtualized environment
Techniques enable reducing a number of intercepts performed by a hypervisor by reducing a number of End Of Interrupt (EOI) messages sent from a virtual central...
Location enabled bookmark and profile
Location based profiles are used to modify the configuration of a computing device based on a detected location. The location based profiles allow features such...
Automatic peripheral device sharing
In accordance with the automatic peripheral device sharing, a peripheral device that has been newly installed on a device is detected and is shared with one or...
Preservation of type information between a client and a server
In a distributed computing system containing multiple entities such as servers and clients, an object passed between the entities is attached with metadata...
Validating change of name server
A Domain Name System (DNS) service provider may be engaged to host DNS service for a domain. Before providing service for a domain, the service provider may...
Asynchronous update of virtualized applications
A determination is made as to whether an updated image for an outdated virtualized application is available on a server. If it is determined that the updated...
Application settings migration using virtualization
Application setting virtualization for a user. Application settings from a source computer are copied to a user-specific location on a destination computer and...
Using distributed queues in an overlay network
The present invention extends to methods, systems, and computer program products for using distributed queues in an overlay network. Embodiments of the...
Identity management user experience
Example embodiment of the present invention provide for assisting a user in managing the user's shared persona on a request-by-request basis. Upon requesting to...
Transformation-based framework for record matching
A transformation-based record matching technique. The technique provides a flexible way to account for synonyms and more general forms of string equivalences...
Using message sampling to determine the most frequent words in a user
A method is presented for generating a list of frequently used words for an email application on a server computer. When a request is received for a word...
Execution of semantic queries using rule expansion
A semantic query may refer to a logical rule, where the rule is defined in terms of constituent expressions. In order to execute the semantic query efficiently,...
Optimizing parameterized queries in a relational database management
Parameterized queries are optimized by a transformational optimizer. The optimizer produces a dynamic plan that embeds multiple plan options that may be...
Generating search result summaries
Embodiments are configured to provide a summary of information associated with one or more search results. In an embodiment, a system includes a summary...
Method, system, and apparatus for providing a document preview
A method and apparatus are provided for generating a document preview. According to the method, a preview handler provides an interface to one or more...
Modification of relational models
Described herein is a system that facilitates modifying a relational model. The relational model is modified based at least in part upon an identity of a user,...
Recommending similar content identified with a neural network
Methods, systems and computer-readable media for finding similarities between visual objects by evaluating user interactions with a collection of visual objects...
Method and identification tag for asset management
A method, identification tag, data signal, and service for asset management are disclosed. Identification data may be retrieved from an identification tag. The...
Using generic predictive models for slot values in language modeling
A generic predictive argument model that can be applied to a set of shot values to predict a target slot value is provided. The generic predictive argument...
Phonetic input using a keypad
A keypad is used to enter complex characters using a phonetic input method editor (IME). The user may enter complex characters by combining consonants, vowels,...
Health-related opportunistic networking
A wireless opportunistic network that can facilitate data transfer by way of interconnected devices is disclosed. In accordance with this opportunistic network,...
Video noise reduction
A video noise reduction technique is presented. Generally, the technique involves first decomposing each frame of the video into low-pass and high-pass...
Categorizing images of software failures
Software failures are processed by categorizing images associated with the failures into groups based on similarities in the images. The categorizing of the...
Dynamic media rendering
Media may be dynamically rendered by receiving signals from one or more types of sensors sensing in an area, and obtaining from the signals information about...
Smooth scanning presenter
Described herein is a technology for the presentation of digital video. One implementation, described herein, smoothly presents variable-speed scanning of a...
Full-duplex wireless communications
Full-duplex wireless communication is described. In an embodiment, a transceiver device having a transmitter circuit and a receiver circuit receives a data...
Fluid displacement mechanism
A fluid displacement mechanism is disclosed. In an embodiment, first and second cavities are separated by a flexible membrane. The first cavity contains a...
Multiple resolution capture in real time communications
During remote communication session, there can be situations where information needs to be sent at a high resolution. Sending information at a high resolution...
Translating two-dimensional user input on three-dimensional scene
A computing system translates two-dimensional (2D) graphical input by a user who is selecting one or more 2D images in a three-dimensional (3D) scene of 3D...
Automatic delivery of game content to a game console
Automatic downloading of game content to a game console is provided. A user enables automatic downloading, and thereafter, game content available from a game...
Light collector for an illumination optic
A light collector is provided to converge light from a light source down to a range of acceptance angles of an illumination optic, and to couple the converged...
Display screen with a user interface
Display screen with a user interface
Game controller with elongated controller element
Protected environments for protecting users against undesirable activities
Various embodiments protect against undesirable activities, in at least some embodiments, by combining the protection of a data or message filter with the...
Providing a wrapper around native synchronization objects
A facility for managing a synchronization mechanism that supports initialization, acquisition, release, and deletion operations is described. When a thread...
Optimal policies for load balancing for distributed and strategic agents
(more technically, optimal...
Providing for scheduling tasks in a distributed system based on an inefficiency of each task on a particular machine as compared with available networked...
Integrating loosely coupled tools using contracts and references
Various technologies and techniques are disclosed for providing an integration framework that enables tools to be integrated. The integration framework enables...
User interface having a carousel view for representing structured data
A carousel view is described. In an implementation, a method includes determining a number of items that are included in data. A carousel is then generated for...
Method and system for operating multiple web pages with anti-spoofing
Method and system for operating tabbed browsing with anti-spoofing protection. Tabbed browsing operates to detect pop-up dialogs sent from malicious web pages...
Context-based management user interface supporting extensible subtractive
A management user interface can be generated at run time via subtractive extensible context-based filtering. Definitions of user interface elements can include...
Methods and systems of merging a first document with at least a second document to generate a third document. Each of the first and second documents includes at...
Visual system for visualizing, navigating, and editing attribute lattices
within OLAP databases
Various technologies and techniques are disclosed for creating and managing a visual representation of OLAP attributes and relationships for a dimension. A...
Systems and methods for updating a secure boot process on a computer with
a hardware security module
Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be...