At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Metadata driven real-time analytics framework
Methods, systems, and computer program products are provided for developing application definition packages, and deploying the application definition packages...
Network video messaging
Embodiments related to network video messaging are disclosed. One disclosed embodiment provides a method that comprises receiving a video message from a client...
Data parallel searching
A query that includes a search operator and that identifies an input data source is received. The input data source is partitioned into a plurality of...
Matching target strings to known strings
One or more techniques and/or systems are disclosed for matching a target string to a known string. A target string is broken into one or more target terms, and...
Mixing synchronous and asynchronous data streams
A queue can store streams of data acquired from servers asynchronously based upon received data requests and subsequent subscription with respect to one or more...
Instrumenting a website with dynamically generated code
A method, system, and medium are provided that relate to dynamically instrumenting a website. In general, an exemplary aspect of the invention includes storing...
Automated target specific format conversion of context information from a
Providing context to a target minimizes the amount of information that a user must input. Context transfer pages receive context and reformat for the target....
Social network interaction facilitation from search results interface
A user interface providing results to a user's search also facilitates user interaction with their social network. Such interaction includes a search context by...
Entity summarization and comparison
An entity summarization system is described herein that mines the Internet and other data source to provide answers to questions such as the relative sentiment...
Using context to extract entities from a document collection
Described is using context information obtained from entity mentions in likely relevant documents to extract entity mentions from documents that are ambiguous...
Reporting including filling data gaps and handling uncategorized data
A reporting system is described herein that allows a report author to declare data reporting structures that specify to a reporting application how to...
In-memory database system
A computer system includes a memory and a processor coupled to the memory. The processor is configured to execute instructions that cause execution of an...
Partitioning and repartitioning for data parallel operations
A query that identifies an input data source is rewritten to contain data parallel operations that include partitioning and merging. The input data source is...
Compatibly extending offload token size
Aspects of the subject matter described herein relate to offload technology. In aspects, a mechanism is described that allows an offload provider to use larger...
Automatic data request recovery after session failure
Techniques for recovering from session failures between clients and database servers are described herein. A session may be established between a client and a...
Place-based image organization
Systems and methods for image organization are provided. An image organization method in accordance with embodiments of the present disclosure includes, at a...
Translating language characters in media content
Some implementations disclosed herein provide techniques and arrangements to enable translating language characters in media content. For example, some...
Remote debugging as a service
Debugging capabilities for software running in a cloud-computing environment are disclosed. A controller identifies which machines in the cloud are running...
Detecting a repeating execution time sequence in a virtual machine
A generation identifier is provided having a value established upon generating a new virtual machine configuration context or a snapshot of a virtual machine...
A baseline set of graph information associated with a predefined execution environment of a program may be obtained, the baseline set associated with a baseline...
Caching runtime generated code
A program entity that generates code but that does not perturb global state is identified. Code produced by the identified program entity can be assigned an...
Platform extensibility framework
A platform extensibility framework may be provided. A visualization platform may register feature extensions and receive requests to create objects. The objects...
Displaying images for people associated with a message item
Technologies are described herein for displaying a list of people associated with a message item along with images and other personal context information in a...
Searching at a user device
Method, computer program product and user device for searching implemented at the user device, wherein an input is received from a user via a touch screen of...
Providing theme variations in a user interface
A presentation program provides a graphical user interface that includes a theme gallery and a theme variation gallery. Users can apply a theme to a slide by...
Labels and tooltips for context based menus
Tooltips associated with a context based menu are presented for providing information about executable commands on the context based menu. Tooltips may provide...
Auto-grouping of application windows
Described herein are techniques for automatically forming groups of application windows. The techniques may be performed with a computing device executing a...
Capacitive touch surface in close proximity to display
To address the above issues, a display device with a capacitive touch screen display having a touch surface in close proximity to a display stack is provided....
Control exposure techniques are described. In one or more implementations, a determination is made by a computing device as to which of a plurality of controls...
Dynamic magnetometer calibration
A mobile device includes a magnetometer. The mobile device is calibrated during application usage by sampling magnetic information received from the...
Display screen with graphical user interface
Display screen with transitional graphical user interface
Display screen with animated graphical user interface
Visor for a headset
Power saving Wi-Fi tethering
The techniques discussed herein reduce the power consumption of a Wi-Fi tethering device by switching the Wi-Fi functionality of the Wi-Fi tethering device from...
Protected media decoding using a secure operating system
Disclosed herein are representative embodiments of tools and techniques for facilitating decoding of protected media information using a secure operating...
Reducing interference between multiple infra-red depth cameras
Systems and methods for reducing interference between multiple infra-red depth cameras are described. In an embodiment, the system comprises multiple infra-red...
Providing per-application resource usage information
An environment is described in which a processing system provides application-level usage information to users. In one scenario, for example, the processing...
Unified web service discovery
A uniform approach for web service discovery is provided through common auto-discovery logic for cloud-based or enterprise-based deployments for a specific web...
Load balancer bypass
Bypassing a load balancer that initially appeared in a multi-message flow from a source machine served by a source intermediary and a target machine served on a...
Reducing network usage of computing device
Methods and systems for reducing network usage of a computing device are provided herein. The method includes receiving a network call relating to a network...
Secure capability negotiation between a client and server
Embodiments of the present disclosure provide for establishing an authenticated session between a client computing device and a remote computing device. In...
Programmatically enabling user access to CRM secured field instances based
on secured field instance settings
Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to...
Specifying rights in a digital rights license according to events
A digital license specifies rights with regard to corresponding digital content, and in particular specifies at least one event and for the at least one event...
Communicating state information to legacy clients using legacy protocols
When a user account is in an alternate (fault) state, communication or sync between an application provider and a device or client application typically is...
Detection of end-to-end transport quality
In various embodiments, methods and systems are disclosed for the real time detection of network conditions in conjunction with a remote presentation protocol....
Network resource management with prediction
An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user...
Wireless mesh networking with multiple simultaneous transmissions by
nearby network nodes
A wireless mesh network enables multiple devices near each other to transmit simultaneously, thus allowing increased network bandwidth. Prior to transmitting, a...
Automatic utilization of resources in a realtime conference
The architecture facilitates the association of resources (e.g., hardware software) with a meeting location such as a conference room or conference space....