At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Local erasure codes for data storage
In some examples, an erasure code can be implemented to provide for fault-tolerant storage of data. Maximally recoverable cloud codes, resilient cloud codes,...
Persistent and resilient worker processes
In the field of computing, many scenarios involve the execution of an application within a virtual environment (e.g., web applications executing within a web...
Inversion-of-control component service models for virtual environments
In the field of computing, many scenarios involve the execution of an application within a virtual environment of a device (e.g., web applications executing...
Aspects of the present invention are directed at providing safe and efficient ways for a program to perform a one-time initialization of a data item in a...
Storing and resuming application runtime state
Execution of an application is suspended and the runtime state of the application is collected and persisted. Maintenance operations may then be performed on...
Augmented allocation of virtual machines for application
The starting up of an application involving multiple virtual machines by overallocating virtual machines. In response to a request to allocate a certain number...
Creating templates of offline resources
Implementations of the present invention allow software resources to be duplicated efficiently and effectively while offline. In one implementation, a...
Hierarchical directives-based management of runtime behaviors
Support for dynamic behavior is specified while reducing reliance on JIT compilation and large runtimes; semantic characteristics are selectively attached to...
Incrementally compiling software artifacts from an interactive development
An interactive development environment receives developer inputs to develop or customize modeled types. A compilation agent receives a request from the IDE to...
Dynamic data and compute resource elasticity
An execution environment in a computer system provides dynamic data and compute resources elasticity for user code to improve execution efficiency. The...
Declarative programming model with a native programming language
An execution environment in a computer system supports a declarative programming model where user code is written with a query syntax in a native programming...
Request ordering support when switching virtual disk replication logs
Storage access requests, such as write requests, are received from a virtual machine. A storage request processing module updates one of multiple virtual disks...
Live configurable storage
A system for storing data in a dynamic fashion. The system includes a storage entity. The storage entity includes portions of a plurality of different...
Asynchronous handling of a user interface manipulation
This document describes techniques and apparatuses for asynchronous handling of a user interface manipulation. These techniques handle a user interface...
Using custom RTF commands to extend chat functionality
A device identifies a location for a custom RFT command in a message. The custom RTF command is stored in the identified location of the message. The device...
Scroll wheel assembly for scrolling an image in multiple directions
A scroll wheel assembly for computer input device having a housing. The scroll wheel assembly includes a housing and an engagable scroll wheel. The scroll wheel...
Increased accuracy corner cube arrays for high resolution retro-reflective
Tooling and optic elements for a retro-imaging system may be formed on order near atomic level of accuracy by making use of either etching or growth techniques...
Companion gaming experience supporting near-real-time gameplay data
A companion gaming experience is associated with a particular game title, but a user interface for the companion gaming experience is generated by a separate...
Locational node device
A node device in a distributed virtual environment captures locational signals projected by another node device into a capture area of the node device and...
Display screen with icon
Display screen with animated graphical user interface
Display screen with graphical user interface
Managing wireless resources
Various embodiments provide for the management of wireless resources, which can reduce call blocking by allowing high priority services, under suitable...
Providing a user interface experience based on inferred vehicle state
A mobile device is described herein that provides a user interface experience to a user who is operating the mobile device within a vehicle. The mobile device...
Managing associations in ad hoc networks
A first wireless devices establishes an association with a second wireless device by sending a connection request packet to a previously-discovered second...
Audio focusing via multiple microphones
Various technologies are applied to focus audio received from a plurality of microphones of a mobile device. A camera can be used to portray a scene, and a...
Automatic image capture
Disclosed herein are exemplary embodiments for automatically capturing images in a mobile electronic device. One embodiment comprises sensing device motion and...
Managed P2P network with content-delivery network
A content-acquisition request is sent to a centralized management service computer via a computer network. The content-acquisition request may query the...
Media session between network endpoints
A media session between an initiating endpoint and a responding endpoint is established via a communication network. A set of candidate pairs is generated, each...
Multi cloud policy enactment via organizations to cloud-provider
A method includes acts for establishing a subscription for an entity. The method includes receiving, at a cloud service provider, a request from an entity to...
Honey monkey network exploration
A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are...
Power efficient storage management
One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage...
Secure protocol for peer-to-peer network
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The...
Firewall with two-phase filtering
Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a...
Identifying first contact unsolicited communications
Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One...
Wake pattern management
Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device...
Scalable data feed system
A scalable data feed system is disclosed. The data feed system may be offered as a cloud service that can serve many enterprises or tenants that require data to...
Dynamically allocating network resources for communication session
A primary call admission controller (CAC) system receives a request from a client to allocate a network resource such as a network bandwidth. The primary CAC...
CMOS three-dimensional image sensor detectors having reduced inter-gate
capacitance, and enhanced modulation...
A CMOS detector with pairs of interdigitated elongated finger-like collection gates includes p+ implanted regions that create charge barrier regions that can...
Transforming data to create layouts
Concepts and technologies are described herein for transforming data to create layouts. In accordance with the concepts and technologies disclosed herein, a...
Persistent user identification
Embodiments are disclosed that relate to persistently identifying a user interacting with a computing device. For example, one disclosed embodiment provides a...
Resource management for cloud computing platforms
A system for managing allocation of resources based on service level agreements between application owners and cloud operators. Under some service level...
Visualizing video within existing still images
Video from a video camera can be integrated into a still image, with which it shares common elements, to provide greater context and understandability....
Method to delay locking of server files on edit
A server is implemented with a modified file open action, which, when a user performs the modified open, initially opens a file without locking the file. When a...
Isolating applications hosted by plug-in code
Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that...
Licensing using a cloud public-messaging infrastructure
In various embodiments, methods and systems for license-messaging using cloud public-messaging infrastructures are provided. A cloud public-messaging...
Application licensing for devices
A method, system, and computer-readable storage media for licensing an application for a device are provided herein. The method includes providing a license for...
Selectively deleting items that are not of interest to a user
Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's...
Methods, systems, and computer-readable media for query simplification are provided. A search engine executed by a server receives a query. In response, the...
Prediction and information retrieval for intrinsically diverse sessions
Various technologies described herein pertain to predicting intrinsically diverse sessions and retrieving information for such intrinsically diverse sessions....