At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Automatically allocating clients for software program testing
Techniques are described herein that are capable of automatically allocating clients for testing a software program. For instance, a number of the clients that...
Call chain interval resource impact aggregation differencing
Embodiments profile usage of memory and other resources. Stack traces have lifespans, resource impacts, and constituent call chains. Aggregation unifies shared...
Methods and computer program products for collecting storage resource
performance data using file system hooks
Provided are methods and computer program products for collecting storage resource performance data using file system hooks. Methods may include determining a...
Logical grouping of profile data
Profile data can be ascribed to groups as a function of an organizational scheme that defines groups and relationships between groups. The groups can be...
Virtual processor allocation techniques
One or more virtual processors can be added or removed from a virtual machine based on CPU pressure measured within the virtual machine. In addition to the...
Adaptive rendering based on runtime capability check
A runtime capability check determines functionality supported by a client application (e.g. a browser) on a computing device. During the runtime capability...
Simulation of static members and parameterized constructors on an
Embodiments are directed to providing a simulation of a type-level construct on an interface instance and to maintaining a token-based event handling system. In...
Expansion and reduction of source code for code refactoring
An automated programming tool can receive program source code and can expand portions of the program source code to make to make identifiers explicit, insert...
Application configuration using binary large objects
Embodiments provide rule-based application configuration using a network service. A configuration parameter associated with an application includes a rule that...
Data-dependent control flow reduction
A transformation of software control flow to reduce the number of successor blocks in the control flow as well as the number of flow control elements. The...
Web browser having user-configurable address bar button
A web browser has a user interface that includes a content rendering area within the web browser user interface and a control layout area adjacent the content...
Printer driver and application decoupling using event centric registration
Some embodiments of the invention provide a printer user interface (UI) component configured to handle presentation of information to a user during printing...
System and method for multi-touch interactions with a touch sensitive
Embodiments of the invention are directed to interacting with a touch sensitive display screen. A method may include detecting a plurality of interactions with...
Depth camera-based relative gesture detection
The subject disclosure is directed towards using timing and/or relative depth data to reduce false positives in gesture detection within a depth-sensed region....
Making static printed content dynamic with virtual data
The technology provides embodiments for making static printed content being viewed through a see-through, mixed reality display device system more dynamic with...
Systems and methods for estimating a non-visible or occluded body part
A depth image of a scene may be received, observed, or captured by a device. The depth image may include a human target that may have, for example, a portion...
See-through near-eye display glasses with the optical assembly including
absorptive polarizers or...
This disclosure concerns an interactive head-mounted eyepiece with an integrated processor for handling content for display and an integrated image source for...
Display screen with transitional graphical user interface
Display screen with icon
Display screen with graphical user interface
Filtering and clustering crowd-sourced data for determining beacon
Embodiments analyze crowd-sourced data to identify a moved or moving beacon. The crowd-sourced data involving a particular beacon is filtered based on a cluster...
Location determination for white space utilization
A technique for a wireless device to obtain white space information from a component configured for cellular communication, such as a cellular phone. The...
Creation and management of RFID device versions
The claimed subject matter provides a system and/or method that creates, manages, or maintains multiple device versions in a network of Radio Frequency...
Place-specific buddy list services
An information service provides search and notifications to inform when certain people (e.g., friends, family, business contacts, etc.) are nearby so as to...
Searching electronic program guide data
Searching electronic program guide (EPG) data is described. The EPG data may be compartmentalized into channel metadata that describes characteristics of one or...
Proximity and connection based photo sharing
Photos are shared among devices that are in close proximity to one another and for which there is a connection among the devices. The photos can be shared...
Malicious uniform resource locator detection
The techniques described herein use training data to train classification models to detect malicious Uniform Resource Locators (URLs) that target authentic...
Strategies for controlling use of a resource that is shared between
trusted and untrusted environments
A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can...
Proof of device genuineness
A cryptographic process is provided which allows a server to verify that a client device is genuine. The client device is provisioned with first and second data...
Transmission of information relating to a quality of service
Methods of transmitting information relating to a quality of service are shown, which information is to be transmitted in at least one direction between a first...
Controlled data network error recovery
A method, a system and network nodes use an indication of possible duplicates of units, so that these units can be handled differently than other units. The...
Cognitive use of multiple regulatory domains
A wireless communication system that concurrently communicates information in multiple regulatory domains to facilitate audio/video media streaming and other...
An electronic connector includes a base, a tapered extension protruding from the base, and a nose forming a terminal end of the tapered extension. The tapered...
Media content for a mobile media device
Various embodiments enable a user of a mobile media device to select one or more channels to load onto the device. Each channel comprises a collection of media...
Conservatively adapting a deep neural network in a recognition system
Various technologies described herein pertain to conservatively adapting a deep neural network (DNN) in a recognition system for a particular user or context. A...
Virtual surface compaction
Virtual surface update and composition techniques are described. These techniques support the use of initialization and batching of updates, use of updates and...
Space skipping for multi-dimensional image rendering
Space skipping for multi-dimensional image rendering is described. In an embodiment a ray-casting engine is used to form a two dimensional image from an at...
Ad copy quality detection and scoring
Methods, systems, and computer-readable media for evaluating the quality of text within online advertisements using output from a language model are provided....
Single system image via shell database
A single system image is provided for a parallel data warehouse system by exposing a shell database within a database management system comprising metadata and...
Protection from unfamiliar login locations
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication...
Reducing ad impact to browser onload event
Various embodiments pertain to techniques for decreasing an amount of time to a browser onload event by asynchronously loading web page content. In various...
Re-ranking search results based on lexical and ontological concepts
Search result re-ranking is provided by employing a concept graph from a metabase. When a search query is received, a query context of the search query is...
Topical search engines and query context models
Topical search engines can add contextual keywords to an input query to bias results toward a particular topic or domain. In one instance, query context models...
Determining quality of tier assignments
Technologies pertaining to computing a tiering policy that defines how digital items are desirable stored across a plurality of different storage tiers are...
User pipeline configuration for rule-based query transformation,
generation and result display
A query pipeline for an enterprise search system is configurable by a user of the system. A user may create rules for custom query transformation and parallel...
Query constraint encoding with type-based state machine
A query specified in a source programming language can be analyzed as a function of a type-based state machine that encodes query constraints of a target...
Generation based update system
Techniques are directed to managing image generation for desktop and screen sharing systems as well as for large image systems such as mapping. An apparatus may...
Computerized statistical machine translation with phrasal decoder
A computerized system for performing statistical machine translation with a phrasal decoder is provided. The system may include a phrasal decoder trained prior...
Application of multiple content items and functionality to an electronic
Application of content and associated functionality from multiple content sources to an electronic content item is provided. Content from a first document may...