At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Management capabilities for a wireless docking experience
This document describes management capabilities for a wireless docking experience. A wireless dock is configured to connect to multiple peripheral devices, such...
Optimization of over-the-top (OTT) services on carrier networks
Methods and apparatus for executing a client-based, over-the-top (OTT) application, the client-based OTT application for maintaining communications with a...
Authentication mechanisms for wireless networks
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control...
Special case handling for merged chroma blocks in intra block copy
Innovations in intra block copy ("BC") prediction facilitate handling of special cases when chroma blocks are merged for purposes of the intra BC prediction....
Multi-layer encoding and decoding
Innovations described herein provide a generic encoding and decoding framework that includes some features of simulcast and some features of scalable video...
Use of chroma quantization parameter offsets in deblocking
Innovations in use of chroma quantization parameter ("QP") offsets when determining a control parameter for deblock filtering. For example, as part of encoding,...
In general, the immersive telepresence implementations described herein allow desired telepresence experiences of users or telepresence travel participants to...
A method of echo cancellation in an acoustic system, comprising a first user device and at least one further user device, the method comprising, at the first...
Prefetching application data for periods of disconnectivity
Application data prefetching embodiments are presented that prefetch and provide application data for use by an application operating on a mobile computing...
Feature set differentiation by tenant and user
A system for online collaboration includes an application for online collaboration, the application including an application feature set, a control module...
Lateral movement detection
Lateral movement detection may be performed by employing different detection models to score logon sessions. The different detection models may be implemented...
Request-specific authentication for accessing web service resources
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
Filtering kernel-mode network communications
Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is...
Lossy data stream decoder
Lossy data stream decoder techniques are described herein. In response to a request for decoded content from a consuming application, a decoder may validate...
System and method for improved synchronization between a server and a
A system and method for improved client and server communications, more particularly, an improved protocol that may be used for communication between a client...
Programmable and high performance switch for data center networks
This application describes routing packets from a source server to a plurality of ports of a switch. The switch is programmed by the control server and is used...
Dynamic collection analysis and reporting of telemetry data
Technologies are generally described for collecting, analyzing and reporting telemetry data. A telemetry engine is built into a client application installed on...
Circuit for introducing signal jitter
A circuit that introduces a calibrated amount of jitter and/or amplitude variation into a signal. By generating a signal with some predetermined amount of...
Scalable high-bandwidth architecture for lossless compression
A method of lossless data compression includes receiving a set of parallel data strings; determining compression hash values for each of the parallel data...
Anti-piracy feature for optical discs
Disclosed are techniques and systems for manufacturing an optical disc having a stochastic (i.e., non-deterministic) anti-piracy feature in the form of a...
Environmentally aware dialog policies and response generation
Environmental conditions, along with other information, are used to adjust a response of a conversational dialog system. The environmental conditions may be...
Pronunciation learning through correction logs
A new pronunciation learning system for dynamically learning new pronunciations assisted by user correction logs. The user correction logs provide a record of...
Adaptive control of display refresh rate based on video frame rate and
A battery operated device, having a display with two or more available refresh rates, has its refresh rate selected so as to match the video frame rate of video...
Copying of animation effects from a source object to at least one target
A method and a processing device may be provided for copying animation effects of a source object to one or more target objects of a presentation. The source...
Particle based visualizations of abstract information
Multivariate data that includes data records may be obtained, each of the data records represented as data values of data attribute variables. A cardinality of...
Search service advertisement selection
Methods, computer systems, and computer storage media are provided for evaluating information retrieval (IR) such as search query results (including...
Using e-mail message characteristics for prioritization
Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected...
Workflow authoring environment and runtime
A workflow authoring system is described herein that provides a design-time authoring environment and a runtime component for displaying interactive, structured...
Integrating custom policy rules with policy validation process
A system is provided for integrating custom policy rules with a policy validation process for validating forms within an organization. The system may enable the...
Automatic recognition and insights of data
Automatic recognition and presentation of insights of data is provided through analysis of overall data to infer locations of a user's data. Statistical,...
Object detection techniques
Object detection techniques are described. In one or more implementations, a plurality of images are received by a computing device. The plurality of images are...
Combining personalization and privacy locally on devices
A profiling service may determine, local to a device, user profile attributes associated with a device user based on interaction of the device user with the...
Behavior based authentication for touch screen devices
A method, system, and one or more computer-readable storage media for behavior based authentication for touch screen devices are provided herein. The method...
Policy for digital rights management
This document describes policies for digital rights management that enable distribution of full-function versions of applications that, while fully functional,...
Discovering expertise using document metadata in part to rank authors
Expertise mining features are provided based in part on the use of an expertise mining algorithm and expertise mining queries. A method of an embodiment...
Platform for continuous graph update and computation
A continuous stream data (e.g., messages, tweets) is received by ingest nodes of a platform. The ingest nodes may analyze the data to create a transaction of...
Filtering content on a role tailored workspace
A workspace display includes a plurality of different groups, each group including a plurality of different components. Each group corresponds to a task, set of...
User information needs based data selection
Techniques for determining user information needs and selecting data based on user information needs are described herein. The present disclosure describes...
Database system for executing parameter-sensitive query
A query is received. The query comprises a plural number of efficiency expressions. A key is generated for the query indicating a first selectivity region in...
Systems and methods for host detection of USB asynchronous notification
Systems and methods for detecting legacy storage devices that may falsely and/or incorrectly report to host systems that they have removable media. Such false...
Sparse datatable data structure
A sparse dataset structure is created by creating column vectors for one or more columns in a dataset that have at least one significant value. Each column...
Displaying images interesting to a user
One or more techniques and/or systems are disclosed for displaying images in a user's online page, such as to provide an engaging and interesting user...
Data classification for adaptive synchronization
In one embodiment, a synchronization engine 116 of an application module 114 may adjust a synchronization scheme 306 based on the implicit data classification...
Application/document collaboration in a multi-device environment
Application/document collaboration in a multi-device environment is provided. An application and associated document or other content, for example, a...
Drag and drop always sum formulas
Inserting a formula at a location on a content surface in a user interface is provided. A user interface showing a status bar which includes one or more...
User-mounted device calibration using external data
Systems, methods, and computer media for calibrating user-mounted devices are provided. An external device capable of providing calibration data to a...
Estimating likelihood of code changes introducing defects
Information about a failed build of a computer software project under development can be accessed, where the information describes symptoms of the failed build....
Remote device automation using a device services bridge
Pairing information is used by the target application to determine how to connect to the correct controller. A network pipe is established between the target...
Time travel debugging for browser components
Various technologies described herein pertain to performing time travel debugging. A computer-executable program can be executed. The computer-executable...
Parallelism-aware memory request scheduling in shared memory controllers
Parallelism-aware scheduling of memory requests of threads in shared memory controllers. Parallel scheduling is achieved by prioritizing threads that already...