At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Beacon discovery service
A method that includes acts for resolving information about an entity associated with a beacon is illustrated. The method includes receiving a beacon signal....
Application-driven control of wireless networking settings
Embodiments related to automatically adjusting wireless network settings based upon utilization of a wireless network link by applications are disclosed. For...
Community Wi-Fi network joined access point configuration
Various technologies described herein pertain to configuring an access point in a local network for operation in a community Wi-Fi network. The community Wi-Fi...
Indoor location-finding using magnetic field anomalies
Techniques for indoor location-finding are described herein. Inside buildings, anomalies in the Earth's magnetic field may be caused by the buildings'...
Movie discovery system
A movie browsing system may use a combination of long term and session based preferences to help a user browse movies using microcategories. The user...
Providing a tele-immersive experience using a mirror metaphor
A tele-immersive environment is described that provides interaction among participants of a tele-immersive session. The environment includes two or more...
Displaying video call data
A device comprising: a display; an interface configured to exchange video data between the device and a network during a video call between a user of the device...
Dynamic image result stitching
Methods and systems for compiling image results into compilation images so that multiple image results may be downloaded via a single browser-download...
Hierarchical scale unit values for storing instances of data among nodes
of a distributed store
Techniques are described herein for storing instances of data among nodes of a distributed store based on hierarchical scale unit values. Hierarchical scale...
Aggregation framework using low-power alert sensor
An aggregation framework system and method that automatic configures, aggregates, disaggregates, manages, and optimizes components of a consolidated system of...
Private interaction hubs
In embodiments of private interaction hubs, a mobile device has memory storage to maintain hub data that is associated with a private interaction hub, where the...
Characterizing service levels on an electronic network
The described implementations relate to processing of electronic data. One implementation is manifest as a system that that can include an event analysis...
Trusted internet identity
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by...
Distributed proxy for bi-directional network connectivity over
The subject disclosure is directed towards a technology by which computing devices such as a phone and a personal computer may reliably communicate internet...
Providing network connectivity and access to content and communications
via moving objects
Various techniques for providing network connectivity are described herein. In one example, a moving object includes an uplink device of the moving object to...
Slidable battery door assembly
A slidable battery door assembly is described. In implementations, the slidable battery door assembly (hereinafter "door assembly") includes a door that is...
Intelligent flash reprogramming
Apparatus, methods, and computer-readable media for programming, reading, and servicing non-volatile storage device to improve data retention time and data...
Low-footprint adaptation and personalization for a deep neural network
The adaptation and personalization of a deep neural network (DNN) model for automatic speech recognition is provided. An utterance which includes speech...
Neural network-based speech processing
Pairs of feature vectors are obtained that represent speech. Some pairs represent two samples of speech from the same speakers, and other pairs represent two...
Atlasing and virtual surfaces
Atlasing and virtual surface techniques are described. In one or more implementations, virtual surface functionality is exposed by an operating system for...
Image three-dimensional (3D) modeling
Among other things, one or more techniques and/or systems are disclosed for creating a three-dimensional model of an image. Image data, comprise a series of...
Single pass radiosity from depth peels
Techniques for single pass radiosity from depth peels are described. In one or more embodiments, radiosity for frames of a graphics presentation is computed...
Constraint-based correction of shape positions in a diagram
Technologies are described herein for correcting the layout of shapes in a diagram, and specifically for diagrams having constraint-based layouts, such as with...
Presenting social network connections on a search engine results page
Systems, methods, and computer-readable storage media for presenting social network connections in association with a search engine results page (SERP) are...
Ranking authors in social media systems
The author ranking technique described herein is a technique to rank authors in social media systems along various dimensions, using a variety of statistical...
Contextual solicitation in a starter application
A reduced capability subset of an application referred to as a "starter application" is provided on a computer device prior to purchase and intended for use by...
Techniques to manage remote events
Techniques to manage remote events are described. An apparatus may comprise a processor circuit and a remote event application arranged for execution by the...
Some implementations provide techniques and arrangements to address intrapersonal variations encountered during facial recognition. For example, some...
Educating users and enforcing data dissemination policies
An authoring component determines the sensitivity of an authored document and generates a user interface conveying contextual educational information about data...
Ultra-low cost sandboxing for application appliances
The disclosed architecture facilitates the sandboxing of applications by taking core operating system components that normally run in the operating system...
Search tool using multiple different search engine types across different
Various embodiments provide a search tool that utilizes multiple different search engines. The individual search engines are configured to conduct searches in...
Highlighting of time series data on force directed graph
A force directed graph may display recent activities of a message passing system as highlighted features over a larger graph. The force directed graph may...
Relevant online search for long queries
Online information is retrieved for a user. An original query submitted by the user is received which includes a plurality of query terms the user associates...
Media content catalogs
In a method in a computer system for displaying on a display device a personal catalog of media content, a plurality of media content listings is received from...
Locale-based sorting on mobile devices
Embodiments are directed to implementing locale-based sorting and to creating temporary metadata sorting values. In one scenario, a computer system sends a...
Reading ease of text on a device
One or more techniques and/or systems are disclosed for improving reading ease of text displayed by a device. Reading-related feedback, such as feedback that...
Caching of an immutable buffer that has its data and address prevented from changing during the lifetime of the immutable buffer. A first computing entity...
Iterative bottleneck detector for executing applications
A bottleneck detector may use an iterative method to identify a bottleneck with specificity. An automated checkpoint inserter may place checkpoints in an...
Bottleneck detector for executing applications
A bottleneck detector may analyze individual workloads processed by an application by logging times when the workload may be processed at different checkpoints...
Proactive failure handling in network nodes
Embodiments are directed to predicting the health of a computer node using health report data and to proactively handling failures in computer network nodes. In...
Ensuring thread affinity for interprocess communication in a managed code
A remote procedure call channel for interprocess communication in a managed code environment ensures thread-affinity on both sides of an interprocess...
Virtual machine and/or multi-level scheduling support on systems with
asymmetric processor cores
Different processor cores in a computing device can support different features. In one or more embodiments, the features supported by each of multiple physical...
Capability based device driver framework
Enforcing limitations on hardware drivers. The method includes from a system kernel, assigning I/O resources to the system's root bus. From the root bus, the...
Resource package indexing
One or more techniques and/or systems are provided for generating a bundle package, digitally signing the bundle package, selectively disturbing the bundle...
Assigning priorities to data for hybrid drives
A hybrid drive includes multiple parts: a performance part (e.g., a flash memory device) and a base part (e.g., a magnetic or other rotational disk drive). A...
Utilizing drawing guides in determining the display of smart guides in a
Technologies are described herein for utilizing drawing guides in determining the display of smart guides in a drawing program. The drawing program detects that...
Interactive virtual display system
An "Interactive Virtual Display," as described herein, provides various systems and techniques that facilitate ubiquitous user interaction with both local and...
Digitizer, stylus and method of synchronization therewith
A method for operating a digitizer with an autonomous asynchronous stylus includes sampling outputs from a digitizer, detecting from the outputs at least one...
Enhancing an object of interest in a see-through, mixed reality display
Technology is disclosed for enhancing the experience of a user wearing a see-through, near eye mixed reality display device. Based on an arrangement of gaze...