At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Identifying seed computing devices using estimates in peer-to-peer
Embodiments disclosed herein relate to methods and devices for identifying other computing devices of a peer-to-peer network to which to effect or recommend...
Aggregating content from different content sources at a cloud service
A cloud service stores and aggregates content that is obtained from different content sources using different protocols. For example, the content may include...
Software-based aliasing for accessing multiple shared resources on a
single remote host
In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism...
Seamless authentication with proxy servers
A computer can be configured to provide seamless access to a proxy server by, upon connection to a computer network, determining whether a proxy server using...
Scaling network services using DNS
Lookup requests received by a domain name service (DNS) are processed based on the actual location of data associated with a requested content page rather than...
Crisscross cancellation protocol
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A...
Link-aware throughput acceleration profiles
An arrangement is provided for exposing TCP/IP profiles to a client application operating in a mobile computing environment where each profile comprises a set...
Enriching driving experience with cloud assistance
Described is a technology by which driver safety technology such as collision detection is implemented via mobile device (e.g., smartphone) sensors and a cloud...
Collection rearrangement animation
Collection rearrangement animation techniques are described herein, which can be employed to represent changes made by a rearrangement in a manner that reduces...
Identifying influential users of a social networking service
Techniques for identifying influential users of a social networking service are provided. Influential users may be identified via an algorithm in which an...
Shape recognition using partial shapes
Shape recognition is performed based on determining whether one or more ink strokes is not part of a shape or a partial shape. Ink strokes are divided into...
Incentive-based app execution
Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user...
Personalized deeplinks for search results
Search results are provided with personalized deeplinks for an end user. User behavior information is gathered regarding web pages visited by the end user. When...
Ad-hoc queries integrating usage analytics with search results
Search results returned by ad hoc queries integrate search results with usage analytics calculated from collected usage information for a system, such as a...
Searching a database of listings
A database having listings rather than long documents is searched using a term frequency-inverse document frequency (Tf/Idf) algorithm.
Optimizing data processing using dynamic schemas
A computer system accesses rows of feed data and converts the received feed data into portions of binary blob data. The computer system also sends the binary...
User-selected tags for annotating geographic domains containing
A location-based service is provided that allows a user of a mobile device to tag and track the places he or she visits and share these places with social...
Identifying files stored on client devices as web-based search results
Methods for leveraging a user's social network connections to search files stored on client devices are provided. Upon receipt of a search query, it is...
Searching and placeholders
Aspects of the subject matter described herein relate to file system placeholders. In aspects, placeholders may be used by a client to represent remote file...
Conversion of a document while retaining a format of an element of the
One or more techniques and/or systems are disclosed for high fidelity conversion of a document to a less rich format. A bounding area can be identified in the...
Context sensitive auto-correction
Methods, systems, and computer program products are provided for adaptively autocorrecting text according to context. Text may be received at a mobile...
Protocol and format for communicating an image from a camera to a
A media feed interface may be provided that may be used to extract a media frame from a media feed. The media feed interface may access a capture device, a...
Bitstream manipulation and verification of encoded digital media data
Disclosed herein are representative embodiments of methods, apparatus, and systems for manipulating bitstreams of digital media data compressed according to a...
Providing an unseen message count across devices
Embodiments are directed to providing an indication of unseen email messages to a mobile device user, to establishing an unseen email message count and to...
Message gateway with hybrid proxy/store-and-forward logic
Described is a technology by which an email filtering service or other gateway includes hybrid proxy and store-and-forward logic. A message is initially...
Adaptive bandwidth estimation
It can be determined whether relative one way delay for data packets in a data stream exceeds a delay threshold. If so, then a delay congestion signal...
Network DNA may be determined for a computer network that taxonomically classifies the computer network. Network DNA may include derived network DNA components...
Providing a monitoring service in a cloud-based computing environment
Technologies are described herein for providing a monitoring service in a cloud-based computing environment. A request is received from a user to subscribe to...
System and method for utilizing environment information in UPNP
An environment variable for use cases such as UPnP AV use cases. The environment variable of the present invention is used to store the physical location of the...
Pilot design for wireless system
The description herein relates to pilot designs for an Orthogonal Frequency Division Multiplexing (OFDM) based communication system. In at least one embodiment,...
A computer implemented method enables perception of multiple online personas in an instant messaging communications session by identifying at least two...
Redundant pixel mitigation
Among other things, one or more techniques and/or systems are provided for mitigating redundant pixel texture contribution for texturing a geometry. That is,...
Secure online transactions using a trusted digital identity
Techniques for conducting secure online transactions are provided. Some techniques utilize a trusted, secure device that is distributed to a human user, and...
Calendar repair assistant
Calendar repair may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first...
Cause-chain analysis using objects
Identification of the root cause of a change in the system, as well as any side-effects ("ancillary changes") caused by the change via an object attribute. A...
Secure cloud database platform with encrypted database queries
A cloud computing service to securely process queries on a database. A security device and method of operation are also disclosed. The security device may be...
Using flash storage device to prevent unauthorized use of software
A flash storage device and a method for using the flash storage device to prevent unauthorized use of a software application are provided. An identifier may be...
Analyzing access control configurations
A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and...
Managing applications in non-cooperative environments
The present invention extends to methods, systems, and computer program products for managing applications in non-cooperative environments. Embodiments of the...
Cache and index refreshing strategies for variably dynamic items and
Many computing scenarios involve an item cache or index, comprising items corresponding to source items that may change without notice, rendering the item in...
Mining for statistical enumerated type
Time-based event stream attributes are analyzed to determine whether the attributes are of a statistical enumerated type, or, in other words, whether the...
A user of an online service sends a request to write a review of a media content item, using a text limited device such as a gamepad of a videogame console. In...
Application quality parameter measurement-based development
A development environment provides warnings based on one or more application categories set for an application. Each warning has a trigger threshold and a...
Creating templates of offline resources
Implementations of the present invention allow software resources to be duplicated efficiently and effectively while offline. In one implementation, a...
Maintaining synchronization of virtual machine image differences across
server and host computers
A virtual printer driver or proxy printer driver executed by a virtual machine communicates with a real printer driver executed by a host computer to enable...
Application reporting in an application-selectable user interface
This document describes techniques for application reporting in an application-selectable user interface. These techniques permit a user to view reports for...
Unified communications application functionality in condensed views
A unified communications application is described herein. The unified communications application is displayable in one of two views: a full view and a condensed...
Comprehension and intent-based content for augmented reality displays
A method and system that enhances a user's experience when using a near eye display device, such as a see-through display device or a head mounted display...
Aligning inter-pupillary distance in a near-eye display system
The technology provides for automatic alignment of a see-through near-eye, mixed reality device with an inter-pupillary distance (IPD). A determination is made...
Routing service for computation of a cross-street associated with a
Architecture that computes cross-streets of a geographic location using a dynamic routing service. This also means execution can be local on a mobile device...